Loading ...

Play interactive tourEdit tour

Analysis Report systemupdate_ProtectedAUS.exe

Overview

General Information

Joe Sandbox Version:26.0.0 Aquamarine
Analysis ID:934785
Start date:12.08.2019
Start time:21:25:35
Joe Sandbox Product:Cloud
Overall analysis duration:0h 8m 15s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:systemupdate_ProtectedAUS.exe
Cookbook file name:default.jbs
Analysis system description:Windows 7 (Office 2010 SP2, Java 1.8.0_40 1.8.0_191, Flash 16.0.0.305, Acrobat Reader 11.0.08, Internet Explorer 11, Chrome 55, Firefox 43)
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis stop reason:Timeout
Detection:MAL
Classification:mal100.phis.troj.spyw.evad.winEXE@5/5@0/1
EGA Information:
  • Successful, ratio: 100%
HDC Information:
  • Successful, ratio: 3% (good quality ratio 2.2%)
  • Quality average: 59.7%
  • Quality standard deviation: 40.6%
HCA Information:
  • Successful, ratio: 79%
  • Number of executed functions: 96
  • Number of non-executed functions: 77
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): dllhost.exe, conhost.exe, mscorsvw.exe
  • Report size getting too big, too many NtQueryValueKey calls found.

Detection

StrategyScoreRangeReportingWhitelistedThreatDetection
Threshold1000 - 100Report FP / FNfalse
njRat
malicious

Confidence

StrategyScoreRangeFurther Analysis Required?Confidence
Threshold50 - 5false
ConfidenceConfidence


Classification

Analysis Advice

Sample monitors window changes (e.g. starting applications), analyze the sample with the 'Simulates keyboard and window changes' cookbook
Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior



Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and Control
Valid AccountsWindows Remote ManagementRegistry Run Keys / Startup Folder1Access Token Manipulation1Software Packing22Credential Dumping3System Time Discovery12Application Deployment SoftwareInput Capture1Data Encrypted1Uncommonly Used Port1
Replication Through Removable MediaService ExecutionPort MonitorsProcess Injection21Disabling Security Tools1Input Capture1Query Registry1Remote ServicesData from Local System2Exfiltration Over Other Network MediumStandard Cryptographic Protocol2
Drive-by CompromiseWindows Management InstrumentationAccessibility FeaturesPath InterceptionModify Registry1Credentials in Registry1Process Discovery2Windows Remote ManagementData from Network Shared DriveAutomated ExfiltrationCustom Cryptographic Protocol
Exploit Public-Facing ApplicationScheduled TaskSystem FirmwareDLL Search Order HijackingAccess Token Manipulation1Credentials in Files2Application Window Discovery1Logon ScriptsInput CaptureData EncryptedMultiband Communication
Spearphishing LinkCommand-Line InterfaceShortcut ModificationFile System Permissions WeaknessProcess Injection21Account ManipulationSecurity Software Discovery251Shared WebrootData StagedScheduled TransferStandard Cryptographic Protocol
Spearphishing AttachmentGraphical User InterfaceModify Existing ServiceNew ServiceDeobfuscate/Decode Files or Information1Brute ForceFile and Directory Discovery1Third-party SoftwareScreen CaptureData Transfer Size LimitsCommonly Used Port
Spearphishing via ServiceScriptingPath InterceptionScheduled TaskObfuscated Files or Information3Two-Factor Authentication InterceptionSystem Information Discovery23Pass the HashEmail CollectionExfiltration Over Command and Control ChannelUncommonly Used Port
Supply Chain CompromiseThird-party SoftwareLogon ScriptsProcess InjectionDLL Side-Loading1Bash HistoryNetwork Service ScanningRemote Desktop ProtocolClipboard DataExfiltration Over Alternative ProtocolStandard Application Layer Protocol

Signature Overview

Click to jump to signature section


AV Detection:

barindex
Multi AV Scanner detection for dropped fileShow sources
Source: C:\Users\user\SysWOW64\taskeng.exevirustotal: Detection: 47%Perma Link
Multi AV Scanner detection for submitted fileShow sources
Source: systemupdate_ProtectedAUS.exevirustotal: Detection: 47%Perma Link
Antivirus or Machine Learning detection for unpacked fileShow sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackAvira: Label: TR/Dropper.Gen
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackAvira: Label: TR/Dropper.Gen

Cryptography:

barindex
Uses Microsoft's Enhanced Cryptographic ProviderShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00401329 CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptHashData,CryptGetHashParam,swprintf,swprintf,CryptDestroyHash,CryptReleaseContext,4_2_00401329
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004023A8 CLSIDFromString,CredEnumerateA,CryptUnprotectData,___from_strstr_to_strchr,_strstr,swprintf,swprintf,___from_strstr_to_strchr,GetLastError,AuditFree,GetLastError,4_2_004023A8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004014AE CryptAcquireContextA,GetLastError,CryptCreateHash,GetLastError,CryptHashData,CryptGetHashParam,GetLastError,CryptDestroyHash,CryptReleaseContext,4_2_004014AE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00403678 CryptUnprotectData,GetLastError,4_2_00403678
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00402884 CryptUnprotectData,GetLastError,4_2_00402884
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00401CEA RegQueryValueExA,RegQueryValueExA,RegCloseKey,RegQueryValueExA,RegCloseKey,CryptUnprotectData,swprintf,swprintf,WideCharToMultiByte,LocalFree,GetLastError,4_2_00401CEA

Networking:

barindex
Detected TCP or UDP traffic on non-standard portsShow sources
Source: global trafficTCP traffic: 192.168.1.81:49163 -> 160.116.15.134:3361
Connects to IPs without corresponding DNS lookupsShow sources
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Source: unknownTCP traffic detected without corresponding DNS query: 160.116.15.134
Internet Provider seen in connection with other malwareShow sources
Source: Joe Sandbox ViewASN Name: COGENT-174-CogentCommunicationsUS COGENT-174-CogentCommunicationsUS
Found strings which match to known social media urlsShow sources
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: ERR%WindowsLive:name=*%http://hotmail.com9Software\ooVoo\Settings\UserUserQhttp://www.oovoo.com/?Encrypted PasswordPass equals www.hotmail.com (Hotmail)
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809478481.00370000.00000004.00000020.sdmpString found in binary or memory: Microsoft.AspNet.Mvc.Facebook equals www.facebook.com (Facebook)
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: Yahoo equals www.yahoo.com (Yahoo)
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://Yahoo.com48nhH equals www.yahoo.com (Yahoo)
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://hotmail.com equals www.hotmail.com (Hotmail)
Source: vbc.exeString found in binary or memory: http://twitter.com/ equals www.twitter.com (Twitter)
Source: vbc.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://www.facebook.com/http://twitter.com/https://twitter.com/https://login.yahoo.com/config/loginhttps://pinterest.com/login/http://www.linkedin.com/https://my.screenname.aol.com/_cqr/login/login.psphttps://www.amazon.com/ap/signin/190-9059340-4656153https://signin.ebay.com/ws/ebayisapi.dllhttps://accounts.google.com/serviceloginhttps://www.google.com/accounts/serviceloginhttp://digg.comhttp://www.myspace.comhttps://myspace.comhttps://www.amazon.com/gp/css/homepage.htmlhttp://www.stumbleupon.com/sign_up.phphttp://slashdot.org/bookmark.plhttp://www.reddit.com/loginB equals www.facebook.com (Facebook)
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://www.facebook.com/http://twitter.com/https://twitter.com/https://login.yahoo.com/config/loginhttps://pinterest.com/login/http://www.linkedin.com/https://my.screenname.aol.com/_cqr/login/login.psphttps://www.amazon.com/ap/signin/190-9059340-4656153https://signin.ebay.com/ws/ebayisapi.dllhttps://accounts.google.com/serviceloginhttps://www.google.com/accounts/serviceloginhttp://digg.comhttp://www.myspace.comhttps://myspace.comhttps://www.amazon.com/gp/css/homepage.htmlhttp://www.stumbleupon.com/sign_up.phphttp://slashdot.org/bookmark.plhttp://www.reddit.com/loginB equals www.linkedin.com (Linkedin)
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://www.facebook.com/http://twitter.com/https://twitter.com/https://login.yahoo.com/config/loginhttps://pinterest.com/login/http://www.linkedin.com/https://my.screenname.aol.com/_cqr/login/login.psphttps://www.amazon.com/ap/signin/190-9059340-4656153https://signin.ebay.com/ws/ebayisapi.dllhttps://accounts.google.com/serviceloginhttps://www.google.com/accounts/serviceloginhttp://digg.comhttp://www.myspace.comhttps://myspace.comhttps://www.amazon.com/gp/css/homepage.htmlhttp://www.stumbleupon.com/sign_up.phphttp://slashdot.org/bookmark.plhttp://www.reddit.com/loginB equals www.myspace.com (Myspace)
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://www.facebook.com/http://twitter.com/https://twitter.com/https://login.yahoo.com/config/loginhttps://pinterest.com/login/http://www.linkedin.com/https://my.screenname.aol.com/_cqr/login/login.psphttps://www.amazon.com/ap/signin/190-9059340-4656153https://signin.ebay.com/ws/ebayisapi.dllhttps://accounts.google.com/serviceloginhttps://www.google.com/accounts/serviceloginhttp://digg.comhttp://www.myspace.comhttps://myspace.comhttps://www.amazon.com/gp/css/homepage.htmlhttp://www.stumbleupon.com/sign_up.phphttp://slashdot.org/bookmark.plhttp://www.reddit.com/loginB equals www.twitter.com (Twitter)
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://www.facebook.com/https://www.facebook.com/http://twitter.com/https://twitter.com/https://login.yahoo.com/config/loginhttps://pinterest.com/login/http://www.linkedin.com/https://my.screenname.aol.com/_cqr/login/login.psphttps://www.amazon.com/ap/signin/190-9059340-4656153https://signin.ebay.com/ws/ebayisapi.dllhttps://accounts.google.com/serviceloginhttps://www.google.com/accounts/serviceloginhttp://digg.comhttp://www.myspace.comhttps://myspace.comhttps://www.amazon.com/gp/css/homepage.htmlhttp://www.stumbleupon.com/sign_up.phphttp://slashdot.org/bookmark.plhttp://www.reddit.com/loginB equals www.yahoo.com (Yahoo)
Source: vbc.exeString found in binary or memory: http://www.linkedin.com/ equals www.linkedin.com (Linkedin)
Source: vbc.exeString found in binary or memory: http://www.myspace.com equals www.myspace.com (Myspace)
Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
Source: vbc.exeString found in binary or memory: https://myspace.com equals www.myspace.com (Myspace)
Source: vbc.exeString found in binary or memory: https://twitter.com/ equals www.twitter.com (Twitter)
Source: vbc.exeString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: pwd%http://Paltalk.com/Software\Yahoo\Profiles!http://Yahoo.com equals www.yahoo.com (Yahoo)
Urls found in memory or binary dataShow sources
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://Paltalk.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://Paltalk.com/Software
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://Yahoo.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://Yahoo.com48nhH
Source: vbc.exeString found in binary or memory: http://digg.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://hotmail.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://hotmail.com9Software
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://no-ip.com
Source: systemupdate_ProtectedAUS.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: vbc.exe, vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpString found in binary or memory: http://securityxploded.com/browser-password-dump.php
Source: vbc.exeString found in binary or memory: http://slashdot.org/bookmark.pl
Source: vbc.exeString found in binary or memory: http://twitter.com/
Source: vbc.exe, vbc.exe, 00000004.00000002.14657959113.00321000.00000004.00000020.sdmp, 4371570.4.drString found in binary or memory: http://www.SecurityXploded.com
Source: vbc.exeString found in binary or memory: http://www.linkedin.com/
Source: vbc.exeString found in binary or memory: http://www.myspace.com
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://www.noip.com/
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpString found in binary or memory: http://www.oovoo.com/?Encrypted
Source: vbc.exeString found in binary or memory: http://www.reddit.com/login
Source: vbc.exeString found in binary or memory: http://www.stumbleupon.com/sign_up.php
Source: vbc.exeString found in binary or memory: https://accounts.google.com/servicelogin
Source: vbc.exeString found in binary or memory: https://login.yahoo.com/config/login
Source: vbc.exeString found in binary or memory: https://my.screenname.aol.com/_cqr/login/login.psp
Source: vbc.exeString found in binary or memory: https://myspace.com
Source: vbc.exeString found in binary or memory: https://pinterest.com/login/
Source: vbc.exeString found in binary or memory: https://signin.ebay.com/ws/ebayisapi.dll
Source: vbc.exeString found in binary or memory: https://twitter.com/
Source: vbc.exeString found in binary or memory: https://www.amazon.com/ap/signin/190-9059340-4656153
Source: vbc.exeString found in binary or memory: https://www.amazon.com/gp/css/homepage.html
Source: vbc.exeString found in binary or memory: https://www.google.com/accounts/servicelogin

Key, Mouse, Clipboard, Microphone and Screen Capturing:

barindex
Contains functionality to log keystrokes (.Net Source)Show sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, j/kl.cs.Net Code: VKCodeToUnicode
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, j/kl.cs.Net Code: VKCodeToUnicode

System Summary:

barindex
Malicious sample detected (through community Yara rule)Show sources
Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects hacktools by SecurityXploded
Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Detects hacktools by SecurityXploded
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware sample from Burning Umbrella report - Generic Winnti Rule
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set
Source: 4.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects hacktools by SecurityXploded
Source: 4.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects hacktools by SecurityXploded
Source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects hacktools by SecurityXploded
Source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Detects hacktools by SecurityXploded
Contains functionality to call native functionsShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_00551C04 CreateProcessW,NtQueryInformationProcess,NtReadVirtualMemory,NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtWriteVirtualMemory,NtSetContextThread,NtResumeThread,1_2_00551C04
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_005500AD NtOpenSection,NtMapViewOfSection,1_2_005500AD
Creates mutexesShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeMutant created: \Sessions\1\BaseNamedObjects\frenchy_shellcode_002
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeMutant created: \Sessions\1\BaseNamedObjects\Client.exe
Detected potential crypto functionShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A60131_2_001A6013
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001AC8381_2_001AC838
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A89581_2_001A8958
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001AB2101_2_001AB210
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A7DFA1_2_001A7DFA
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001AD6D81_2_001AD6D8
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A97E81_2_001A97E8
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A60A31_2_001A60A3
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A60E31_2_001A60E3
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A62321_2_001A6232
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001A635E1_2_001A635E
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_006822A71_2_006822A7
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C60582_2_003C6058
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003CCCD02_2_003CCCD0
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C79D82_2_003C79D8
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C57682_2_003C5768
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C1B402_2_003C1B40
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C0FEA2_2_003C0FEA
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_003C54182_2_003C5418
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004491824_2_00449182
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00440CD74_2_00440CD7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004080C84_2_004080C8
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0045008C4_2_0045008C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004091014_2_00409101
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044A2484_2_0044A248
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004312234_2_00431223
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004392D44_2_004392D4
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0042B3864_2_0042B386
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044B3BE4_2_0044B3BE
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004354604_2_00435460
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004325134_2_00432513
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004505FC4_2_004505FC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0043F6404_2_0043F640
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0042D61C4_2_0042D61C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0042170A4_2_0042170A
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044A73C4_2_0044A73C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0041C8D54_2_0041C8D5
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004388E74_2_004388E7
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0040494F4_2_0040494F
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044AB544_2_0044AB54
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00451B7C4_2_00451B7C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044FB1C4_2_0044FB1C
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00404BBF4_2_00404BBF
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0041EC164_2_0041EC16
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00404CCC4_2_00404CCC
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00450D784_2_00450D78
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0041ADF64_2_0041ADF6
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00404F444_2_00404F44
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044AF894_2_0044AF89
Found potential string decryption / allocating functionsShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00408E3D appears 37 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 00444860 appears 48 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 004097AF appears 32 times
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: String function: 0040970D appears 102 times
Sample file is different than original file name gathered from version infoShow sources
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810024483.0113C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameuTorrent.exe@ vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809420023.00320000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamemaqUVPsBdw.exe4 vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809365509.002E0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameqbPoogbjlb.dll4 vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809777836.007A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809478481.00370000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809115991.000E0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameSETUPAPI.DLL.MUIj% vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamepw.dllL vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamesHelper.exe< vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14813822585.00610000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14813436263.001E0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameSETUPAPI.DLL.MUIj% vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14816655264.03E20000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000000.14553244545.0113C000.00000002.00020000.sdmpBinary or memory string: OriginalFilenameuTorrent.exe@ vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814024137.00800000.00000008.00000001.sdmpBinary or memory string: OriginalFilenameAVICAP32.DLL.MUIj% vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814015368.007F0000.00000008.00000001.sdmpBinary or memory string: OriginalFilenamemsvfw32.dll.muij% vs systemupdate_ProtectedAUS.exe
Source: systemupdate_ProtectedAUS.exeBinary or memory string: OriginalFilenameuTorrent.exe@ vs systemupdate_ProtectedAUS.exe
Sample reads its own file contentShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeFile read: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeJump to behavior
Tries to load missing DLLsShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeSection loaded: ntdll.dllJump to behavior
Yara signature matchShow sources
Source: 00000002.00000002.14813731660.00402000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 00000001.00000002.14811656068.04500000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 00000001.00000002.14810211843.01DE7000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, type: MEMORYMatched rule: SecurityXploded_Producer_String date = 2017-07-13, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = https://creativecommons.org/licenses/by-nc/4.0/, score = d57847db5458acabc87daee6f30173348ac5956eb25e6b845636e25f5a56ac59
Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, type: MEMORYMatched rule: SecurityXploded_Producer_String_RID33B2 date = 2017-07-13 14:58:51, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 00000001.00000002.14809736152.00682000.00000040.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 00000001.00000002.14810167494.01DAD000.00000004.00000001.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1_RID3003 date = 2018-05-04 12:21:41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c_RID2E71 date = 2018-02-08 11:14:41, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1 date = 2018-05-04, hash1 = 528d9eaaac67716e6b37dd562770190318c8766fa1b2f33c0974f7d5f6725d41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Winnti_Sample_May18_1_RID3003 date = 2018-05-04 12:21:41, author = Florian Roth, description = Detects malware sample from Burning Umbrella report - Generic Winnti Rule, reference = https://401trg.pw/burning-umbrella/, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c_RID2E71 date = 2018-02-08 11:14:41, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
Source: 4.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: SecurityXploded_Producer_String date = 2017-07-13, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = https://creativecommons.org/licenses/by-nc/4.0/, score = d57847db5458acabc87daee6f30173348ac5956eb25e6b845636e25f5a56ac59
Source: 4.2.vbc.exe.400000.1.raw.unpack, type: UNPACKEDPEMatched rule: SecurityXploded_Producer_String_RID33B2 date = 2017-07-13 14:58:51, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
Source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: SecurityXploded_Producer_String date = 2017-07-13, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = https://creativecommons.org/licenses/by-nc/4.0/, score = d57847db5458acabc87daee6f30173348ac5956eb25e6b845636e25f5a56ac59
Source: 4.2.vbc.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: SecurityXploded_Producer_String_RID33B2 date = 2017-07-13 14:58:51, author = Florian Roth, description = Detects hacktools by SecurityXploded, reference = http://securityxploded.com/browser-password-dump.php, license = CC-BY-NC https://creativecommons.org/licenses/by-nc/4.0/, score = demo, minimum_yara = 1.7
.NET source code contains many API calls related to securityShow sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, BotKillers.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, BotKillers.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, BotKillers.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, BotKillers.csSecurity API names: System.Void System.IO.DirectoryInfo::SetAccessControl(System.Security.AccessControl.DirectorySecurity)
Classification labelShow sources
Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@5/5@0/1
Contains functionality for error loggingShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0040AB07 GetTempPathW,GetTempPathA,_free,GetLastError,FormatMessageA,4_2_0040AB07
Contains functionality to adjust token privileges (e.g. debug / backup)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00404399 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,CloseHandle,GetEnvironmentVariableA,_wprintf,_wprintf,4_2_00404399
Contains functionality to check free disk spaceShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0040AFF0 GetDiskFreeSpaceW,GetDiskFreeSpaceA,_free,4_2_0040AFF0
Contains functionality to instantiate COM classesShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00401F3D RegOpenKeyExA,RegEnumValueA,RegEnumValueA,RegCloseKey,CoInitialize,CLSIDFromString,CLSIDFromString,CLSIDFromString,CoCreateInstance,_wcschr,__wcsnicmp,__wcsnicmp,CoUninitialize,4_2_00401F3D
Creates files inside the user directoryShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeFile created: C:\Users\user\SysWOW64Jump to behavior
Creates temporary filesShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile created: C:\Users\user\AppData\Local\Temp\4371570Jump to behavior
PE file has an executable .text section and no other executable sectionShow sources
Source: systemupdate_ProtectedAUS.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Parts of this applications are using the .NET runtime (Probably coded in C#)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\7582400666d289c016013ad0f6e0e3e6\mscorlib.ni.dllJump to behavior
Reads ini filesShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Reads software policiesShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
SQL strings found in memory and binary dataShow sources
Source: vbc.exeBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
Source: vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
Source: vbc.exe, 00000004.00000002.14658008517.00400000.00000040.00000001.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
Source: vbc.exeBinary or memory string: select * from logins where blacklisted_by_user=0;
Source: vbc.exeBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
Source: vbc.exeBinary or memory string: select * from moz_logins;
Source: vbc.exeBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM ' || quote(name) || ';'FROM sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
Source: vbc.exeBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
Sample is known by AntivirusShow sources
Source: systemupdate_ProtectedAUS.exevirustotal: Detection: 47%
Spawns processesShow sources
Source: unknownProcess created: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe 'C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe'
Source: unknownProcess created: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
Source: unknownProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe' -f 'C:\Users\user\AppData\Local\Temp\4371570'
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess created: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe' -f 'C:\Users\user\AppData\Local\Temp\4371570'Jump to behavior
Uses an in-process (OLE) Automation serverShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Uses Microsoft SilverlightShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
PE file contains a COM descriptor data directoryShow sources
Source: systemupdate_ProtectedAUS.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Contains modern PE file flags such as dynamic base (ASLR) or NXShow sources
Source: systemupdate_ProtectedAUS.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Binary contains paths to debug symbolsShow sources
Source: Binary string: C:\Users\Super\Documents\visual studio 2013\Projects\pw plugin\WindowsApplication12\obj\Release\pw.pdb source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmp

Data Obfuscation:

barindex
.NET source code contains potential unpackerShow sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, j/OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, j/OK.cs.Net Code: Plugin System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
Uses code obfuscation techniques (call, push, ret)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_0068973C push es; ret 1_2_00689818
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_00689287 push cs; ret 1_2_00689288
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_010F3A6D push 28060002h; retn 0002h1_2_010F3A72
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 2_2_010F3A6D push 28060002h; retn 0002h2_2_010F3A72
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004448A5 push ecx; ret 4_2_004448B8
Binary may include packed or encrypted codeShow sources
Source: initial sampleStatic PE information: section name: .text entropy: 6.92696568298
Source: initial sampleStatic PE information: section name: .text entropy: 6.92696568298

Persistence and Installation Behavior:

barindex
Drops PE filesShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeFile created: C:\Users\user\SysWOW64\taskeng.exeJump to dropped file

Boot Survival:

barindex
Creates an undocumented autostart registry key Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows LoadJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Detected FrenchyShellcode packerShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeMutex created: \Sessions\1\BaseNamedObjects\frenchy_shellcode_002Jump to behavior
Stores large binary data to the registryShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey value created or modified: HKEY_CURRENT_USER\Software\Client.exe 96bbeae23f13d8b402340f54c661c049Jump to behavior
Disables application error messsages (SetErrorMode)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion:

barindex
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL5SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS\
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809420023.00320000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLLKSOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\WINDOWS\LOAD
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeWindow / User API: threadDelayed 5505Jump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeWindow / User API: threadDelayed 515Jump to behavior
Found evasive API chain (may stop execution after checking a module file name)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_4-43540
May sleep (evasive loops) to hinder dynamic analysisShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe TID: 3012Thread sleep time: -85000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe TID: 3100Thread sleep time: -780000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe TID: 3272Thread sleep time: -60000s >= -30000sJump to behavior
Sample execution stops while process was sleeping (likely an evasion)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeLast function: Thread delayed
Uses the system / local time for branch decision (may execute only at specific dates)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0040B148 GetSystemTime followed by cmp: cmp eax, 04h and CTI: jc 0040B197h4_2_0040B148
May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory)Show sources
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmpBinary or memory string: VMware
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14813731660.00402000.00000040.00000001.sdmpBinary or memory string: VBoxServiceM{00AAC56B-CD44-11d0-8CC2-00C04FC295EE}
Source: systemupdate_ProtectedAUS.exeBinary or memory string: VBoxService
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14809420023.00320000.00000004.00000001.sdmpBinary or memory string: VMwareVBOX
Program exit pointsShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeAPI call chain: ExitProcess graph end nodegraph_4-44485
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeAPI call chain: ExitProcess graph end nodegraph_4-43541
Queries a list of all running processesShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess information queried: ProcessInformationJump to behavior

Anti Debugging:

barindex
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_001ADC28 CheckRemoteDebuggerPresent,1_2_001ADC28
Checks for kernel debuggers (NtQuerySystemInformation(SystemKernelDebuggerInformation))Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeSystem information queried: KernelDebuggerInformationJump to behavior
Checks if the current process is being debuggedShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess queried: DebugPortJump to behavior
Contains functionality to check if a debugger is running (IsDebuggerPresent)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004400AC IsDebuggerPresent,4_2_004400AC
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044C259 RtlEncodePointer,RtlEncodePointer,LoadLibraryExW,GetLastError,LoadLibraryW,74ECFFF6,RtlEncodePointer,74ECFFF6,RtlEncodePointer,74ECFFF6,RtlEncodePointer,74ECFFF6,RtlEncodePointer,74ECFFF6,RtlEncodePointer,IsDebuggerPresent,OutputDebugStringW,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,RtlDecodePointer,4_2_0044C259
Contains functionality to read the PEBShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_005501CB mov eax, dword ptr fs:[00000030h]1_2_005501CB
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_005500AD mov ecx, dword ptr fs:[00000030h]1_2_005500AD
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeCode function: 1_2_005500AD mov eax, dword ptr fs:[00000030h]1_2_005500AD
Contains functionality which may be used to detect a debugger (GetProcessHeap)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00443C67 GetProcessHeap,4_2_00443C67
Enables debug privilegesShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeProcess token adjusted: DebugJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeProcess token adjusted: DebugJump to behavior
Contains functionality to register its own exception handlerShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00447049 SetUnhandledExceptionFilter,4_2_00447049
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_0044706C SetUnhandledExceptionFilter,UnhandledExceptionFilter,4_2_0044706C
Creates guard pages, often used to prevent reverse engineering and debuggingShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
.NET source code references suspicious native API functionsShow sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, j/OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, j/kl.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32'), ('MapVirtualKey', 'MapVirtualKey@user32.dll')
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, j/OK.csReference to suspicious API methods: ('capGetDriverDescriptionA', 'capGetDriverDescriptionA@avicap32.dll')
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, j/kl.csReference to suspicious API methods: ('GetAsyncKeyState', 'GetAsyncKeyState@user32'), ('MapVirtualKey', 'MapVirtualKey@user32.dll')
Maps a DLL or memory area into another processShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeSection loaded: unknown target pid: 3188 protection: execute and read and writeJump to behavior
Modifies the context of a thread in another process (thread injection)Show sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeThread register set: target process: 3188Jump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeThread register set: target process: 2440Jump to behavior
May try to detect the Windows Explorer process (often used for injection)Show sources
Source: systemupdate_ProtectedAUS.exe, 00000002.00000002.14814935251.01D94000.00000004.00000001.sdmpBinary or memory string: Program ManagerHDnh
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810041551.01140000.00000002.00000001.sdmp, systemupdate_ProtectedAUS.exe, 00000002.00000002.14814827949.01140000.00000002.00000001.sdmpBinary or memory string: Progman
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810041551.01140000.00000002.00000001.sdmp, systemupdate_ProtectedAUS.exe, 00000002.00000002.14814935251.01D94000.00000004.00000001.sdmpBinary or memory string: Program Manager
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810041551.01140000.00000002.00000001.sdmp, systemupdate_ProtectedAUS.exe, 00000002.00000002.14814827949.01140000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
Source: systemupdate_ProtectedAUS.exe, 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmp, systemupdate_ProtectedAUS.exe, 00000002.00000002.14813731660.00402000.00000040.00000001.sdmpBinary or memory string: Shell_traywndyHKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\System
Source: systemupdate_ProtectedAUS.exe, systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpBinary or memory string: Shell_traywnd

Language, Device and Operating System Detection:

barindex
Contains functionality to query CPU information (cpuid)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00441B9C cpuid 4_2_00441B9C
Queries the volume information (name, serial number etc) of a deviceShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeQueries volume information: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeQueries volume information: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeQueries volume information: C:\ VolumeInformationJump to behavior
Contains functionality to query local / system timeShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_00448F27 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,RtlQueryPerformanceCounter,4_2_00448F27
Contains functionality to query time zone informationShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004483A1 __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,4_2_004483A1
Contains functionality to query windows versionShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: 4_2_004041A8 _memset,GetVersionExA,FreeLibrary,4_2_004041A8
Queries the cryptographic machine GUIDShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

Stealing of Sensitive Information:

barindex
Contains functionality to steal Internet Explorer form passwordsShow sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: Software\Microsoft\Internet Explorer\IntelliForms\Storage24_2_00401F3D
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeCode function: Software\Microsoft\Internet Explorer\IntelliForms\Storage24_2_00401CEA
Tries to harvest and steal browser information (history, passwords, etc)Show sources
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\signons3.txtJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\signons.txtJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\cert8.dbJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\signons2.txtJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\key3.dbJump to behavior
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles\22qkc0w7.default\secmod.dbJump to behavior
Tries to harvest and steal ftp login credentialsShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
Tries to steal Instant Messenger accounts or passwordsShow sources
Source: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior

Remote Access Functionality:

barindex
Detected njRatShow sources
Source: 1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack, j/OK.cs.Net Code: njRat config detected
Source: 2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack, j/OK.cs.Net Code: njRat config detected
Sample Distance (10 = nearest)
10 9 8 7 6 5 4 3 2 1
Samplename Analysis ID SHA256 Similarity

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 934785 Sample: systemupdate_ProtectedAUS.exe Startdate: 12/08/2019 Architecture: WINDOWS Score: 100 22 Malicious sample detected (through community Yara rule) 2->22 24 Multi AV Scanner detection for dropped file 2->24 26 Multi AV Scanner detection for submitted file 2->26 28 6 other signatures 2->28 7 systemupdate_ProtectedAUS.exe 5 2->7         started        process3 file4 18 C:\Users\user\SysWOW64\taskeng.exe, PE32 7->18 dropped 30 Detected FrenchyShellcode packer 7->30 32 Creates an undocumented autostart registry key 7->32 34 Modifies the context of a thread in another process (thread injection) 7->34 36 2 other signatures 7->36 11 systemupdate_ProtectedAUS.exe 4 7->11         started        signatures5 process6 dnsIp7 20 160.116.15.134, 3361, 49163 COGENT-174-CogentCommunicationsUS South Africa 11->20 38 Tries to steal Instant Messenger accounts or passwords 11->38 40 Tries to harvest and steal ftp login credentials 11->40 42 Modifies the context of a thread in another process (thread injection) 11->42 15 vbc.exe 2 11->15         started        signatures8 44 Detected TCP or UDP traffic on non-standard ports 20->44 process9 signatures10 46 Contains functionality to steal Internet Explorer form passwords 15->46 48 Tries to harvest and steal browser information (history, passwords, etc) 15->48

Simulations

Behavior and APIs

TimeTypeDescription
21:26:34API Interceptor788x Sleep call for process: systemupdate_ProtectedAUS.exe modified
21:27:32API Interceptor3x Sleep call for process: vbc.exe modified

Antivirus and Machine Learning Detection

Initial Sample

SourceDetectionScannerLabelLink
systemupdate_ProtectedAUS.exe48%virustotalBrowse

Dropped Files

SourceDetectionScannerLabelLink
C:\Users\user\SysWOW64\taskeng.exe48%virustotalBrowse

Unpacked PE Files

SourceDetectionScannerLabelLinkDownload
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpack100%AviraTR/Dropper.GenDownload File
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpack100%AviraTR/Dropper.GenDownload File
4.2.vbc.exe.400000.1.unpack100%AviraHEUR/AGEN.1004669Download File

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://no-ip.com0%virustotalBrowse
http://no-ip.com0%Avira URL Cloudsafe
http://Yahoo.com48nhH0%Avira URL Cloudsafe
http://hotmail.com9Software0%Avira URL Cloudsafe

Yara Overview

Initial Sample

No yara matches

PCAP (Network Traffic)

No yara matches

Dropped Files

No yara matches

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.14813731660.00402000.00000040.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xac22:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xaa1c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xaa7c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xad5a:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
00000001.00000002.14810081002.01D40000.00000004.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0x5393e:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0x53738:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0x53798:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0x53a76:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
00000001.00000002.14811656068.04500000.00000004.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xae6a:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xac64:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xacc4:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xafa2:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
00000001.00000002.14810211843.01DE7000.00000004.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xdb3a:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xd934:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xd994:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xdc72:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
00000004.00000002.14658008517.00400000.00000040.00000001.sdmpSecurityXploded_Producer_StringDetects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com
00000004.00000002.14658008517.00400000.00000040.00000001.sdmpSecurityXploded_Producer_String_RID33B2Detects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com
00000001.00000002.14809736152.00682000.00000040.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xac22:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xaa1c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xaa7c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xad5a:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
00000001.00000002.14810167494.01DAD000.00000004.00000001.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0x358ee:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0x356e8:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0x35748:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0x35a26:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00

Unpacked PEs

SourceRuleDescriptionAuthorStrings
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
  • 0xaf5a:$x1: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00 \x00"\x00
  • 0xac62:$s3: E\x00x\x00e\x00c\x00u\x00t\x00e\x00d\x00 \x00A\x00s\x00 \x00
  • 0x90e7:$s5: Stub.exe
  • 0xac40:$s6: D\x00o\x00w\x00n\x00l\x00o\x00a\x00d\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xab7e:$s7: s\x00h\x00u\x00t\x00d\x00o\x00w\x00n\x00 \x00-\x00r\x00 \x00-\x00t\x00 \x000\x000\x00
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
  • 0x9e8e:$s1: w\x00i\x00r\x00e\x00s\x00h\x00a\x00r\x00k\x00
  • 0x9e58:$s2: p\x00r\x00o\x00c\x00e\x00x\x00p\x00
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackMAL_Winnti_Sample_May18_1_RID3003Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
  • 0x9e8e:$s1: w\x00i\x00r\x00e\x00s\x00h\x00a\x00r\x00k\x00
  • 0x9e58:$s2: p\x00r\x00o\x00c\x00e\x00x\x00p\x00
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackCN_disclosed_20180208_c_RID2E71Detects malware from disclosed CN malware setFlorian Roth
  • 0xaf5a:$x1: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00 \x00"\x00
  • 0xac62:$s3: E\x00x\x00e\x00c\x00u\x00t\x00e\x00d\x00 \x00A\x00s\x00 \x00
  • 0x90e7:$s5: Stub.exe
  • 0xac40:$s6: D\x00o\x00w\x00n\x00l\x00o\x00a\x00d\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xab7e:$s7: s\x00h\x00u\x00t\x00d\x00o\x00w\x00n\x00 \x00-\x00r\x00 \x00-\x00t\x00 \x000\x000\x00
1.2.systemupdate_ProtectedAUS.exe.680000.6.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xae22:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xac1c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xac7c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xaf5a:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
  • 0xaf5a:$x1: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00 \x00"\x00
  • 0xac62:$s3: E\x00x\x00e\x00c\x00u\x00t\x00e\x00d\x00 \x00A\x00s\x00 \x00
  • 0x90e7:$s5: Stub.exe
  • 0xac40:$s6: D\x00o\x00w\x00n\x00l\x00o\x00a\x00d\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xab7e:$s7: s\x00h\x00u\x00t\x00d\x00o\x00w\x00n\x00 \x00-\x00r\x00 \x00-\x00t\x00 \x000\x000\x00
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackMAL_Winnti_Sample_May18_1Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
  • 0x9e8e:$s1: w\x00i\x00r\x00e\x00s\x00h\x00a\x00r\x00k\x00
  • 0x9e58:$s2: p\x00r\x00o\x00c\x00e\x00x\x00p\x00
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackMAL_Winnti_Sample_May18_1_RID3003Detects malware sample from Burning Umbrella report - Generic Winnti RuleFlorian Roth
  • 0x9e8e:$s1: w\x00i\x00r\x00e\x00s\x00h\x00a\x00r\x00k\x00
  • 0x9e58:$s2: p\x00r\x00o\x00c\x00e\x00x\x00p\x00
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackCN_disclosed_20180208_c_RID2E71Detects malware from disclosed CN malware setFlorian Roth
  • 0xaf5a:$x1: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00 \x00"\x00
  • 0xac62:$s3: E\x00x\x00e\x00c\x00u\x00t\x00e\x00d\x00 \x00A\x00s\x00 \x00
  • 0x90e7:$s5: Stub.exe
  • 0xac40:$s6: D\x00o\x00w\x00n\x00l\x00o\x00a\x00d\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xab7e:$s7: s\x00h\x00u\x00t\x00d\x00o\x00w\x00n\x00 \x00-\x00r\x00 \x00-\x00t\x00 \x000\x000\x00
2.2.systemupdate_ProtectedAUS.exe.400000.1.unpackNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
  • 0xae22:$reg: S\x00E\x00E\x00_\x00M\x00A\x00S\x00K\x00_\x00N\x00O\x00Z\x00O\x00N\x00E\x00C\x00H\x00E\x00C\x00K\x00S\x00
  • 0xac1c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xac7c:$msg: E\x00x\x00e\x00c\x00u\x00t\x00e\x00 \x00E\x00R\x00R\x00O\x00R\x00
  • 0xaf5a:$ping: c\x00m\x00d\x00.\x00e\x00x\x00e\x00 \x00/\x00c\x00 \x00p\x00i\x00n\x00g\x00 \x000\x00 \x00-\x00n\x00 \x002\x00 \x00&\x00 \x00d\x00e\x00l\x00
4.2.vbc.exe.400000.1.raw.unpackSecurityXploded_Producer_StringDetects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com
4.2.vbc.exe.400000.1.raw.unpackSecurityXploded_Producer_String_RID33B2Detects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com
4.2.vbc.exe.400000.1.unpackSecurityXploded_Producer_StringDetects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com
4.2.vbc.exe.400000.1.unpackSecurityXploded_Producer_String_RID33B2Detects hacktools by SecurityXplodedFlorian Roth
  • 0x58ae0:$x1: http://securityxploded.com

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
COGENT-174-CogentCommunicationsUS61redacted@threatwav.exeGet hashmaliciousBrowse
  • 38.118.12.3
51mai.exeGet hashmaliciousBrowse
  • 192.246.84.2
48Transcrip.exeGet hashmaliciousBrowse
  • 38.118.12.3
Mo2spc6bT8.dllGet hashmaliciousBrowse
  • 206.3.192.64
Quote_Pdf.vbsGet hashmaliciousBrowse
  • 172.81.178.93
65eqgdz.exeGet hashmaliciousBrowse
  • 192.246.84.2
45LETTER.EXEGet hashmaliciousBrowse
  • 38.118.12.3
hakai.x86_64Get hashmaliciousBrowse
  • 38.212.25.216
Wannacr.exeGet hashmaliciousBrowse
  • 149.2.27.53
7messag.exeGet hashmaliciousBrowse
  • 192.246.84.2
3transcript.exeGet hashmaliciousBrowse
  • 38.118.12.3
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
.exeGet hashmaliciousBrowse
  • 154.61.81.54
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
430#U0437.jsGet hashmaliciousBrowse
  • 76.73.17.194
13Mai.exeGet hashmaliciousBrowse
  • 149.122.186.39

JA3 Fingerprints

No context

Dropped Files

No context

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Startup

  • System is w7_1
  • systemupdate_ProtectedAUS.exe (PID: 2312 cmdline: 'C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe' MD5: 812D49BE271E7D49274F94CCACA83A90)
    • systemupdate_ProtectedAUS.exe (PID: 3188 cmdline: C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe MD5: 812D49BE271E7D49274F94CCACA83A90)
      • vbc.exe (PID: 2440 cmdline: 'C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe' -f 'C:\Users\user\AppData\Local\Temp\4371570' MD5: A8CCD298F718423D35CFD925063F082D)
  • cleanup

Created / dropped Files

C:\Users\user\AppData\Local\Temp\4371570
Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):399
Entropy (8bit):3.2821118737659947
Encrypted:false
MD5:E4BF4F7ACCC657622FE419C0D62419AB
SHA1:C2856936DD3DE05BAD0DA5CA94D6B521E40AB5A2
SHA-256:B32FA68B79C5A7CEAA89E8E537EFE33A963C499666202611329944BD2C09318E
SHA-512:85DC223E39A16DDEBA53A4B3D6C9EFF14D30EC67DFDA1E650DA2C9057F640EDD033A31868915A31CAAC0D325D240A7F634F62CD52FBD2ADC68BD1D9CB6281431
Malicious:false
Reputation:moderate, very likely benign file
Preview:.... **********************************************.. Browser Password Recovery Report.. **********************************************............_______________________________________________________________________.. Produced by BrowserPasswordDump from http://www.SecurityXploded.com......
C:\Users\user\AppData\Local\Temp\Login Data
Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
File Type:SQLite 3.x database, last written using SQLite version 3010002
Size (bytes):18432
Entropy (8bit):0.852140055112637
Encrypted:false
MD5:A8621F29FD303FB5ED20DAAD3FD3A8CB
SHA1:F536DE7809F38BC0FCD33A9FCA7A8CF4ECE6DDAC
SHA-256:3A646CB91D47FD9345EED024714DE3AA07AFD2FA1F558D408A1A45A6D76CB572
SHA-512:BA663CD2FAF7AC63536772BC2E6674779C285B297D8B70F783C80BCA658F405A306F5E3C3DDB9225928C1636F5CDB5D3585F7885D509F7B52CCFD75508F32C3F
Malicious:false
Reputation:moderate, very likely benign file
Preview:SQLite format 3......@ .........................................................................-....6........o.....>.H................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................N...%..oindexstats_originstats.CREATE INDEX stats_origin ON stats(origin_domain).@......._tablestatsstats.CREATE TABLE stats (origin_domain VARCHAR NOT NULL, username_value VARCHAR, dismissal_count INTEGER, update_time INTEGER NOT NULL, UNI
C:\Users\user\SysWOW64\taskeng.exe
Process:C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Size (bytes):305152
Entropy (8bit):6.89537174077336
Encrypted:false
MD5:812D49BE271E7D49274F94CCACA83A90
SHA1:E11D287C6D0A33DA2C9C4FF13E826C0D711DDB50
SHA-256:619281BC0A12DAA8A57C1BA3B527843066FAD2ECAB1F4B2E515E5D5B5879AFCE
SHA-512:F02B5B4E455243AADC9FF13EF3948A77E157963CFC9DC98AFE4671A6186024719D624280FB2439B454835BE0DB58EC2707990526DC4867005D1FBF3D2FBD7A38
Malicious:true
Antivirus:
  • Antivirus: virustotal, Detection: 48%, Browse
Reputation:low
Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#G]................................. ........@.. ....................................@....................................O.................................................................................... ............... ..H............text...4.... ...................... ..`.rsrc...............................@..@.reloc..............................@..B........................H...................i...8W..............................................T%.......E.....<..,...j*..2T.......n.D.%.6.N.L...L.N.....XN....t.F.G..m .5.-.>7Z.'S@cM:,.sj]...|.yf....>..p.A.h...K.B.&4.=...=..hx0.......|...."PV./.lZ._~.Lz[`...Q.H.v..r.'.c@.I..9..L...8x..r..^...q..r...Ee.U.@$.0......p..}..*.$...x.......O.......u?S..G..o..a..m......#y.A>.\.b.,.!..q.........A3.~v........_...$.8Y.y._.s.3.,....Q..g....v....c/G....Y........6...^o/.G.?...E.q4"9.t/..4p.R
C:\Users\user\SysWOW64\taskeng.exe:Zone.Identifier
Process:C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
File Type:ASCII text, with CRLF line terminators
Size (bytes):26
Entropy (8bit):3.95006375643621
Encrypted:false
MD5:187F488E27DB4AF347237FE461A079AD
SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
Malicious:false
Reputation:high, very likely benign file
Preview:[ZoneTransfer]....ZoneId=0

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://DynDns.comsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
    high
    http://www.reddit.com/loginvbc.exefalse
      high
      http://Paltalk.com/Softwaresystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
        high
        http://schemas.xmlsoap.org/soap/envelope/systemupdate_ProtectedAUS.exefalse
          high
          http://www.stumbleupon.com/sign_up.phpvbc.exefalse
            high
            http://hotmail.comsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
              high
              https://my.screenname.aol.com/_cqr/login/login.pspvbc.exefalse
                high
                https://twitter.com/vbc.exefalse
                  high
                  http://Yahoo.comsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                    high
                    http://www.myspace.comvbc.exefalse
                      high
                      http://www.oovoo.com/?Encryptedsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                        high
                        http://Paltalk.comsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                          high
                          http://no-ip.comsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                          • 0%, virustotal, Browse
                          • Avira URL Cloud: safe
                          low
                          http://www.noip.com/systemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                            high
                            http://slashdot.org/bookmark.plvbc.exefalse
                              high
                              http://twitter.com/vbc.exefalse
                                high
                                https://pinterest.com/login/vbc.exefalse
                                  high
                                  https://www.amazon.com/ap/signin/190-9059340-4656153vbc.exefalse
                                    high
                                    http://Yahoo.com48nhHsystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://signin.ebay.com/ws/ebayisapi.dllvbc.exefalse
                                      high
                                      https://login.yahoo.com/config/loginvbc.exefalse
                                        high
                                        http://www.linkedin.com/vbc.exefalse
                                          high
                                          http://digg.comvbc.exefalse
                                            high
                                            https://www.amazon.com/gp/css/homepage.htmlvbc.exefalse
                                              high
                                              http://hotmail.com9Softwaresystemupdate_ProtectedAUS.exe, 00000002.00000002.14814863883.01D40000.00000004.00000001.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://myspace.comvbc.exefalse
                                                high

                                                Contacted IPs

                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs

                                                Public

                                                IPCountryFlagASNASN NameMalicious
                                                160.116.15.134
                                                South Africa
                                                174COGENT-174-CogentCommunicationsUStrue

                                                Static File Info

                                                General

                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):6.89537174077336
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.23%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.73%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:systemupdate_ProtectedAUS.exe
                                                File size:305152
                                                MD5:812d49be271e7d49274f94ccaca83a90
                                                SHA1:e11d287c6d0a33da2c9c4ff13e826c0d711ddb50
                                                SHA256:619281bc0a12daa8a57c1ba3b527843066fad2ecab1f4b2e515e5d5b5879afce
                                                SHA512:f02b5b4e455243aadc9ff13ef3948a77e157963cfc9dc98afe4671a6186024719d624280fb2439b454835be0db58ec2707990526dc4867005d1fbf3d2fbd7a38
                                                SSDEEP:6144:ypzbpDZtF1JaicVykjg1072r8+oDE6sZU6jXF47zkhagF:kpDntcVykjg3Y546sZx
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....#G]................................. ........@.. ....................................@................................

                                                File Icon

                                                Icon Hash:cccccccccccccc00

                                                Static PE Info

                                                General

                                                Entrypoint:0x44b82e
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                                                Time Stamp:0x5D4723EF [Sun Aug 4 18:29:03 2019 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:v4.0.30319
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                                                Entrypoint Preview

                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al

                                                Data Directories

                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4b7dc0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x8f8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                                                Sections

                                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x498340x49a00False0.614173254457data6.92696568298IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                .rsrc0x4c0000x8f80xa00False0.378125data3.61215263574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x4e0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                                                Resources

                                                NameRVASizeTypeLanguageCountry
                                                RT_ICON0x4c0e80x537PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
                                                RT_GROUP_ICON0x4c6200x14data
                                                RT_VERSION0x4c6340x2c4dataFrenchFrance

                                                Imports

                                                DLLImport
                                                mscoree.dll_CorExeMain

                                                Version Infos

                                                DescriptionData
                                                LegalCopyright2019 BitTorrent, Inc. All Rights Reserved.
                                                FileVersion3.5.5.45311
                                                CompanyNameBitTorrent Inc.
                                                ProductNameTorrent
                                                ProductVersion3.5.5.45311
                                                FileDescriptionTorrent
                                                OriginalFilenameuTorrent.exe
                                                Translation0x0409 0x04b0

                                                Possible Origin

                                                Language of compilation systemCountry where language is spokenMap
                                                FrenchFrance

                                                Network Behavior

                                                Network Port Distribution

                                                TCP Packets

                                                TimestampSource PortDest PortSource IPDest IP
                                                Aug 12, 2019 21:27:05.537683010 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:05.679543972 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:05.679740906 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:07.271159887 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:07.619154930 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:07.628520966 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:07.994111061 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:11.464479923 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:11.806581020 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:11.838212013 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:11.841814041 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:12.197005987 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:29.915882111 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:29.917114973 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:30.058619022 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:30.270744085 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:30.282128096 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:30.636322021 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:33.041297913 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:33.084368944 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:33.431937933 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:35.569077015 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:35.915757895 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:36.041058064 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:36.085531950 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:36.431539059 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.673293114 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.673326015 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.673607111 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:38.815311909 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.815376043 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.815407038 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.815428019 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.815692902 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:38.957562923 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957592964 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957612038 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957628965 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957689047 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957722902 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957770109 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957815886 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:38.957906008 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:38.958055973 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.099780083 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.099824905 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.099884987 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.099931002 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.099965096 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100008965 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100025892 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.100039005 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100083113 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100117922 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100197077 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100296974 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.100336075 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100368023 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100433111 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100466013 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.100492001 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.100578070 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.241971016 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242072105 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242136002 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242197037 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242239952 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.242265940 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242311001 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242347002 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242383003 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242393017 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.242449045 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242510080 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.242548943 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242577076 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242657900 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.242686033 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242711067 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242733955 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.242809057 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.243086100 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243105888 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243144989 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243175030 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243204117 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243206978 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.243338108 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.243501902 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243527889 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243551016 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243575096 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243598938 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243626118 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.243640900 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.243750095 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.385446072 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385483980 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385505915 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385525942 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385572910 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385637045 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385757923 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385781050 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385850906 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.385854006 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.385984898 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386029959 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386099100 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386176109 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.386183023 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386241913 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386280060 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386329889 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386377096 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.386467934 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386522055 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386552095 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.386580944 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386625051 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386756897 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.386847973 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386885881 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386920929 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.386970997 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387006044 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.387118101 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387144089 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387165070 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387212992 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.387233973 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387305975 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387372971 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387424946 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.387460947 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387587070 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387594938 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.387789011 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387801886 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387825012 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387940884 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.387950897 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.388108015 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388143063 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388231039 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388262987 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.388328075 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388364077 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388448954 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.388489962 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388526917 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388569117 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388642073 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.388766050 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388812065 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388853073 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388911009 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.388916016 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.389020920 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.389100075 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.389182091 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528424025 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528459072 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528487921 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528512001 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528533936 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528557062 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528579950 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.528606892 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.528764009 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.529526949 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529565096 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529592037 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529628992 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529642105 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529679060 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529692888 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529720068 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529748917 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529748917 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.529778004 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529804945 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529829979 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.529937983 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.530003071 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530031919 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530059099 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530085087 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530133963 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530162096 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.530219078 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.531028032 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531060934 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531090975 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531121016 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531152964 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.531158924 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531189919 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531234026 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531270981 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531321049 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531332016 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531351089 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531379938 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531393051 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.531409025 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531436920 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531760931 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.531887054 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531938076 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531948090 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531958103 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.531985998 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532006979 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532028913 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532052040 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532069921 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532087088 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532306910 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.532524109 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532553911 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532625914 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532639980 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.532645941 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532697916 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532741070 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532780886 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532782078 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.532831907 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532871962 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532911062 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532942057 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532970905 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.532989979 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533008099 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533025026 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.533185005 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.533664942 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533685923 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533704042 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533720970 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533739090 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533765078 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533782005 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533808947 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533843994 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533891916 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533895016 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.533961058 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.533981085 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534018993 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534024000 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.534069061 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534105062 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534156084 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534212112 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534216881 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.534775019 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534812927 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534832001 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534868002 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534904003 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534957886 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534957886 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.534979105 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.534991026 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535041094 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535059929 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535079956 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535099030 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535115004 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535118103 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535146952 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.535154104 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535190105 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535212040 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535231113 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535341978 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535377026 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535415888 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.535446882 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.670659065 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.670737982 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.670785904 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.670928955 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.670979977 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671005011 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671159983 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671216011 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671288967 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671322107 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671333075 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671363115 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671380997 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671411037 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671530008 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671576023 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671627998 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671674013 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.671788931 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671895027 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671922922 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671960115 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.671960115 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672107935 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672138929 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672159910 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672331095 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672427893 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672460079 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672530890 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672564030 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672590971 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672595024 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672616959 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672625065 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672662020 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672722101 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672755957 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672771931 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672782898 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672796011 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672806978 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672830105 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.672832012 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.672971964 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673002005 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673023939 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673047066 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673269987 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673332930 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673389912 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673401117 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673424006 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673429012 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673474073 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673552036 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673578024 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673583031 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673599958 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673612118 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.673729897 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.673760891 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.674021959 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.674086094 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.674279928 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.674338102 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.674866915 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.674943924 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.674998999 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675033092 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675064087 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675092936 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675105095 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675142050 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675148964 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675174952 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675216913 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675266027 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675319910 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675343990 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675385952 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.675419092 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675465107 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675509930 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675555944 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675590038 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675621986 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675653934 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675687075 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.675884962 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676035881 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676081896 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676131964 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676182032 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676219940 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676264048 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676292896 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676342964 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676378965 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676422119 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676450014 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676491976 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676521063 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676548004 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676590919 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676625967 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676656961 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676708937 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676781893 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.676923037 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.676976919 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.677011967 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.677409887 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677484989 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677551985 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677650928 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677678108 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.677726030 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.677757978 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.677814960 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677871943 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677932024 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.677983046 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678024054 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678041935 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678055048 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678153038 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678244114 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678256035 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678284883 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678316116 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678373098 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678461075 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678534985 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678554058 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678592920 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678597927 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678608894 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678641081 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678649902 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678704977 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678879976 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678911924 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678914070 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.678982973 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.678992033 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679038048 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679049015 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679066896 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679095030 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679166079 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679276943 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679348946 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679404974 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679403067 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679421902 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679450035 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679457903 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679480076 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679498911 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679514885 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679569006 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679574013 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679644108 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679757118 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679828882 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679838896 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679874897 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679884911 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.679915905 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679961920 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.679992914 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.680011988 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680073977 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680085897 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.680105925 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680114985 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.680136919 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680232048 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:39.680385113 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680440903 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680475950 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680510998 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680560112 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680600882 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.680766106 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:39.747415066 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:40.103245020 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:40.103385925 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:40.447010040 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:41.524847031 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:41.869887114 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:43.568695068 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:43.916764975 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:46.068269014 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:46.148914099 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:46.505647898 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:47.928098917 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:47.928689003 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:48.287018061 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:49.069061995 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:49.115134954 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:49.458712101 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:52.068603039 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:52.113619089 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:52.490313053 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:55.068386078 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:55.109813929 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:55.458758116 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:58.068509102 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:27:58.108050108 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:27:58.458750010 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:01.068474054 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:01.116698027 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:01.458957911 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:05.927841902 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:05.929538012 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:06.271184921 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:07.569901943 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:07.927481890 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:15.569175959 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:15.927508116 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:23.927828074 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:23.929673910 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:24.287122011 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:39.568150997 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:39.911861897 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:41.928092957 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:41.928818941 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:42.286928892 CEST336149163160.116.15.134192.168.1.81
                                                Aug 12, 2019 21:28:47.567831039 CEST491633361192.168.1.81160.116.15.134
                                                Aug 12, 2019 21:28:47.928426981 CEST336149163160.116.15.134192.168.1.81

                                                Code Manipulations

                                                Statistics

                                                CPU Usage

                                                Click to jump to process

                                                Memory Usage

                                                Click to jump to process

                                                High Level Behavior Distribution

                                                Click to dive into process behavior distribution

                                                Behavior

                                                Click to jump to process

                                                System Behavior

                                                General

                                                Start time:21:26:33
                                                Start date:12/08/2019
                                                Path:C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe'
                                                Imagebase:0x10f0000
                                                File size:305152 bytes
                                                MD5 hash:812D49BE271E7D49274F94CCACA83A90
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000002.14810081002.01D40000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000002.14811656068.04500000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000002.14810211843.01DE7000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000002.14809736152.00682000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000002.14810167494.01DAD000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:21:26:47
                                                Start date:12/08/2019
                                                Path:C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
                                                Wow64 process (32bit):false
                                                Commandline:C:\Users\user\Desktop\systemupdate_ProtectedAUS.exe
                                                Imagebase:0x10f0000
                                                File size:305152 bytes
                                                MD5 hash:812D49BE271E7D49274F94CCACA83A90
                                                Has administrator privileges:true
                                                Programmed in:.Net C# or VB.NET
                                                Yara matches:
                                                • Rule: Njrat, Description: detect njRAT in memory, Source: 00000002.00000002.14813731660.00402000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                                                Reputation:low

                                                General

                                                Start time:21:27:31
                                                Start date:12/08/2019
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
                                                Wow64 process (32bit):false
                                                Commandline:'C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe' -f 'C:\Users\user\AppData\Local\Temp\4371570'
                                                Imagebase:0x1250000
                                                File size:2688144 bytes
                                                MD5 hash:A8CCD298F718423D35CFD925063F082D
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: SecurityXploded_Producer_String, Description: Detects hacktools by SecurityXploded, Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Author: Florian Roth
                                                • Rule: SecurityXploded_Producer_String_RID33B2, Description: Detects hacktools by SecurityXploded, Source: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Author: Florian Roth
                                                Reputation:low

                                                Disassembly

                                                Code Analysis

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:26%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:46.3%
                                                  Total number of Nodes:67
                                                  Total number of Limit Nodes:2

                                                  Graph

                                                  execution_graph 10169 1adc28 10170 1adc6c CheckRemoteDebuggerPresent 10169->10170 10171 1adcae 10170->10171 10172 5317a0 10173 5317e1 GetProcessId 10172->10173 10174 53180e 10173->10174 10175 1adba0 10176 1adba9 10175->10176 10179 1af536 10176->10179 10178 1adbbb 10180 1af556 10179->10180 10186 1afab8 10180->10186 10193 1afaa3 10180->10193 10181 1af623 10182 1af71b 10181->10182 10200 531220 10181->10200 10182->10178 10187 1afaec 10186->10187 10191 1afab8 VirtualAlloc 10187->10191 10192 1afaa3 VirtualAlloc 10187->10192 10188 1afaf4 10189 1afdeb 10188->10189 10204 5310c0 10188->10204 10189->10181 10191->10188 10192->10188 10194 1afaa5 10193->10194 10198 1afab8 VirtualAlloc 10194->10198 10199 1afaa3 VirtualAlloc 10194->10199 10195 1afaf4 10196 1afdeb 10195->10196 10197 5310c0 VirtualAlloc 10195->10197 10196->10181 10197->10195 10198->10195 10199->10195 10201 531272 10200->10201 10209 551e97 10201->10209 10206 5310e3 10204->10206 10205 53114c 10205->10188 10206->10205 10207 5311b3 VirtualAlloc 10206->10207 10208 5311e7 10207->10208 10208->10188 10215 5501cb 10209->10215 10211 551ece CreateMutexW 10212 551f99 10211->10212 10213 5312fc 10212->10213 10214 551c04 9 API calls 10212->10214 10214->10212 10239 551ff5 10215->10239 10218 55136f 10241 5500ad GetPEB 10218->10241 10221 551501 10223 5500ad 4 API calls 10221->10223 10222 5500ad 4 API calls 10222->10221 10224 55150f 10223->10224 10225 551521 10224->10225 10226 5500ad 4 API calls 10224->10226 10227 5500ad 4 API calls 10225->10227 10226->10225 10228 55152f 10227->10228 10229 551541 10228->10229 10230 5500ad 4 API calls 10228->10230 10231 5500ad 4 API calls 10229->10231 10230->10229 10232 55154f 10231->10232 10233 551561 10232->10233 10235 5500ad 4 API calls 10232->10235 10234 5500ad 4 API calls 10233->10234 10236 55156f 10234->10236 10235->10233 10237 5500ad 4 API calls 10236->10237 10238 551581 10236->10238 10237->10238 10240 5501d8 GetPEB 10239->10240 10240->10218 10242 550116 10241->10242 10243 55011d 10241->10243 10242->10221 10242->10222 10244 550131 GetPEB 10243->10244 10245 55015f 10244->10245 10246 550165 NtOpenSection 10245->10246 10246->10242 10247 5501a3 NtMapViewOfSection 10246->10247 10247->10242

                                                  Executed Functions

                                                  Control-flow Graph

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809707322.00550000.00000040.00000001.sdmp, Offset: 00550000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_550000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: Section$OpenView
                                                  • String ID: .dll$.dll$.dll$2.dl$2.dl$2.dl$2.dl$32.d$Begi$Clas$CoCr$CoIn$Cont$Cont$Crea$Crea$Crea$Cryp$Cryp$Cryp$Cryp$Cryp$Cryp$Cryp$Cryp$DefW$EndP$Ex$ExW$Expa$File$Fill$Find$Free$GetM$GetP$GetS$Hash$Inst$IsWo$KERNEL32.DLL$Key$Key$KeyP$LdrG$LdrL$Libr$Load$Load$Lock$Memo$Mess$Mess$Muta$NtAd$NtAl$NtCl$NtCo$NtCr$NtCr$NtCr$NtCr$NtCr$NtDe$NtEn$NtFr$NtGe$NtMa$NtOp$NtOp$NtOp$NtOp$NtOp$NtOp$NtPr$NtQu$NtQu$NtQu$NtQu$NtQu$NtRe$NtRe$NtRe$NtSe$NtSe$NtTe$NtWr$NtWr$Ole3$Para$Post$Priv$Proc$Quit$Rect$Regi$Reso$Reso$Reso$Reso$RtlC$RtlC$RtlC$RtlF$RtlS$RtlZ$Sect$Show$Size$Thre$Thre$Thre$Thre$Tran$User$User$W$W$Wind$ZwCr$ZwRo$ZwUn$\Kno$\Kno$\Kno$\Kno$\Kno$\Kno$\Kno$\Kno$\Kno$\Kno$\Ole$\adv$\ker$\ntd$\use$a$ad$ad$ad$adEx$adFi$adVi$age$ageB$aint$alMe$alue$ance$ansa$api3$aryA$ash$at$ateH$ateK$ateP$ath$cW$ce$cess$cess$ckTr$ctio$ctio$ddre$ddre$dll$dll$dll$dvap$eA$eFil$eNam$ePro$eUse$eUse$ead$ease$eate$eate$eate$eate$eate$eate$eate$ecti$ecti$eeVi$emor$en$en$enFi$enKe$enMu$enPr$enPr$enSe$erne$eroM$eryI$eryI$eryS$eryS$eryV$esTo$ess$et$etCu$etPr$ext$extW$ey$ey$fSec$hDat$i32.$iewO$ile$ileg$indo$ings$ion$ion$irtu$iteF$iteV$itia$iveK$just$ken$kernel32.dll$l$l$l$l$l32.$lMem$lMem$lMem$layE$le$le$le$le32$lenW$lize$ll$ll$ll$ll.d$llba$loca$ls32$ls32$ls32$ls32$ls32$ls\O$ls\a$ls\k$ls\n$ls\u$lstr$mInf$mInf$mapV$mati$mati$mbstowcs$memc$mems$mete$mory$mp$n$n$nPai$ndEn$ndow$nel3$nfor$nfor$nmen$nsac$nt$nt$ntin$o$oadD$oced$oces$oces$oces$oces$odul$ofRe$ombs$on$on$onFi$onPr$orma$orma$ory$ory$ory$ose$otec$ow$oxA$pVie$py$py$r32.$rPro$rThr$reat$reat$reat$rent$rmin$rocA$roce$roce$rren$rs$rtua$rtua$rtua$ry$rypt$s$s$sTok$sW$sW$sact$ser3$sour$ss$ss$ss$ss$ster$strlenuser32.dlladvapi32.dll$sume$tAcq$tCon$tCon$tCre$tCur$tDec$tDer$tDes$tDes$tHas$tRel$tStr$tTra$tVal$tVir$tant$tdll$teMu$tePr$teVi$teWi$texW$text$text$tion$tion$tion$tion$troy$troy$tual$ue$ueKe$uire$umer$urce$urce$urce$urce$ureA$viro$w64P$wOfS$wPro$wcsc$wcsc$wcsc$wcsl$wcst$wnDl$wnDl$wnDl$wnDl$wnDl$wnDl$wnDl$wnDl$wnDl$wnDl$xecu$y$y$y$yste$yste
                                                  • API String ID: 2380476227-789266925
                                                  • Opcode ID: 2b54cb4f4d158bb32996e790de4b615c571eca0884c916132d64e0ac5066a678
                                                  • Instruction ID: 9d8bd1895739fa4f4091eef509e19eb343e8463dde3c51237e032f42233dddcc
                                                  • Opcode Fuzzy Hash: 2b54cb4f4d158bb32996e790de4b615c571eca0884c916132d64e0ac5066a678
                                                  • Instruction Fuzzy Hash: C2D2F0B1C0526D8ACF21DFA18D89BCEBBB8BF14301F5091DAD548AB251DB309B84CF59
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 242 551c04-551c93 249 551c95-551cba CreateProcessW 242->249 250 551cc3 242->250 251 551ccc-551cf9 NtQueryInformationProcess NtReadVirtualMemory 249->251 252 551cbc 249->252 253 551cc5-551cc8 250->253 254 551d07-551d0d 251->254 255 551cfb-551d05 251->255 252->250 253->251 256 551d1d-551d44 NtCreateSection 254->256 257 551d0f-551d1b 254->257 255->250 256->255 259 551d46-551d69 NtMapViewOfSection 256->259 257->255 257->256 259->255 260 551d6b-551d7d 259->260 262 551d7f-551d82 260->262 263 551d8e-551dac NtMapViewOfSection 260->263 262->263 264 551d84-551d85 262->264 265 551dae 263->265 266 551dc8-551de6 263->266 264->263 267 551daf-551dc3 265->267 270 551de8-551deb 266->270 271 551e1a-551e53 NtWriteVirtualMemory 266->271 267->250 272 551df2-551e18 270->272 271->255 276 551e59-551e78 NtSetContextThread 271->276 272->271 276->267 277 551e7e-551e89 NtResumeThread 276->277 277->265 278 551e8f-551e92 277->278 278->253
                                                  APIs
                                                  • CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00551CB2
                                                  • NtQueryInformationProcess.NTDLL(?,00000000,?,00000018,00000000), ref: 00551CD7
                                                  • NtReadVirtualMemory.NTDLL(?,?,?,00000004,00000000), ref: 00551CF1
                                                  • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 00551D3C
                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000002,00000000,00000040), ref: 00551D61
                                                  • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000002,00000000,00000040), ref: 00551DA4
                                                  • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 00551E31
                                                  • NtSetContextThread.NTDLL(?,00010007), ref: 00551E6F
                                                  • NtResumeThread.NTDLL(?,00000000), ref: 00551E81
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809707322.00550000.00000040.00000001.sdmp, Offset: 00550000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_550000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: Section$CreateMemoryProcessThreadViewVirtual$ContextInformationQueryReadResumeWrite
                                                  • String ID:
                                                  • API String ID: 3018774213-0
                                                  • Opcode ID: 96ae76fc365d5c28d7c28a07cf9a8eaef0a1b5bf8692d1917c9822d9dabbaf16
                                                  • Instruction ID: 8ef2c486aadbdbbaf4303352e3a569d59a23909225fe1eb0d5e8e14cfaabe8c1
                                                  • Opcode Fuzzy Hash: 96ae76fc365d5c28d7c28a07cf9a8eaef0a1b5bf8692d1917c9822d9dabbaf16
                                                  • Instruction Fuzzy Hash: 8C91E271900649ABDF209FA5CC89FEEBFB8FF49705F004056FA09EA150D731AA85DB64
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 279 5500ad-550114 GetPEB 280 550116-550118 279->280 281 55011d-55019d call 550005 * 2 GetPEB call 550005 NtOpenSection 279->281 282 5501c6-5501ca 280->282 281->280 290 5501a3-5501bd NtMapViewOfSection 281->290 290->280 291 5501c3 290->291 291->282
                                                  APIs
                                                  • NtOpenSection.NTDLL(?,0000000C,?), ref: 00550199
                                                  • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000002), ref: 005501B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809707322.00550000.00000040.00000001.sdmp, Offset: 00550000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_550000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: Section$OpenView
                                                  • String ID: @$NtMapViewOfSectionNtOpenSection$NtOpenSection$en$wcsl
                                                  • API String ID: 2380476227-2634024955
                                                  • Opcode ID: ca8d08bbda82312d277e41b8cb719b15daffc38e68cad09b1ab1bebb54b543c8
                                                  • Instruction ID: ce840fd5c50cd4a4eb54f42f8eb7b26457c447e44771b5b7634e34b14596078e
                                                  • Opcode Fuzzy Hash: ca8d08bbda82312d277e41b8cb719b15daffc38e68cad09b1ab1bebb54b543c8
                                                  • Instruction Fuzzy Hash: 5F3112B1D00259EBCB10CFE4C885ADEBBB8FF08750F20415AE514EB290E774AA05CBA1
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 361 1ab210-1ab218 362 1ab20a-1ab20e 361->362 363 1ab21a-1ab29f 361->363 366 1ab2a5-1ab2c8 363->366 367 1ab2ce-1ab2d6 366->367 368 1ac2ed-1ac372 call 1ac3f8 call 1ac620 366->368 367->366 369 1ab2d8-1ab304 367->369 401 1ac374-1ac3a0 368->401 375 1ac267-1ac26d 369->375 377 1ac26f 375->377 378 1ac280 375->378 379 1ab309-1ab314 377->379 380 1ac275-1ac27a 377->380 447 1ac286 call 1ac308 378->447 448 1ac286 call 1ab210 378->448 382 1ab31a-1ab32d 379->382 380->378 380->379 382->368 384 1ab333-1ab33c 382->384 383 1ac28c 387 1ac293-1ac2ec 383->387 384->368 386 1ab342-1ab34a 384->386 386->382 388 1ab34c-1ab352 386->388 388->368 391 1ab358-1ab364 388->391 391->368 392 1ab36a-1ab389 391->392 392->368 393 1ab38f-1ab3a4 392->393 393->368 396 1ab3aa-1ab3b6 393->396 396->368 397 1ab3bc-1ab3d8 396->397 397->368 400 1ab3de-1ab40c 397->400 400->368 402 1ab412-1ab490 400->402 410 1ac3a2-1ac3e8 call 1ac838 401->410 402->368 404 1ab496-1ab49c 402->404 404->368 406 1ab4a2-1ab4d1 404->406 406->368 408 1ab4d7-1ab524 406->408 408->368 411 1ab52a-1ab54c 408->411 426 1ac3ee-1ac3f4 410->426 411->368 412 1ab552-1ab560 411->412 412->368 414 1ab566-1ab5b9 412->414 414->368 415 1ab5bf-1ab5e2 414->415 415->368 417 1ab5e8-1ab608 415->417 417->368 418 1ab60e-1ab632 417->418 418->368 420 1ab638-1ab6bf 418->420 420->368 421 1ab6c5-1ab730 420->421 421->368 422 1ab736-1ab73c 421->422 422->368 424 1ab742-1ab87e 422->424 424->368 425 1ab884-1ab8c6 424->425 425->368 427 1ab8cc-1ab9df 425->427 427->368 428 1ab9e5-1abb33 427->428 428->368 429 1abb39-1abc29 428->429 429->368 430 1abc2f-1abe23 429->430 430->368 431 1abe29-1abea5 430->431 431->368 432 1abeab-1abf61 431->432 432->368 433 1abf67-1ac029 432->433 433->368 434 1ac02f-1ac053 433->434 434->368 435 1ac059-1ac078 434->435 435->368 436 1ac07e-1ac0f9 435->436 436->368 437 1ac0ff-1ac1a9 436->437 438 1ac1ac-1ac1b1 437->438 438->368 439 1ac1b7-1ac1cf 438->439 439->368 440 1ac1d5-1ac1f0 439->440 440->368 441 1ac1f6-1ac20e 440->441 441->368 442 1ac214-1ac22c 441->442 442->368 443 1ac232-1ac247 442->443 443->368 444 1ac24d-1ac25d 443->444 444->438 445 1ac263 444->445 445->375 447->383 448->383
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: P $SL
                                                  • API String ID: 0-2943038142
                                                  • Opcode ID: 1ba36671000e2d6163fed2767ad98a8b9c8b851281100a81e8d5d7d7798a37be
                                                  • Instruction ID: eff10b67bdeae07004ab9c222e5467d65a8050d836824f9f7378a9c96eef2c12
                                                  • Opcode Fuzzy Hash: 1ba36671000e2d6163fed2767ad98a8b9c8b851281100a81e8d5d7d7798a37be
                                                  • Instruction Fuzzy Hash: DFE2D8B1E0161AAFC784CF69C591A98FBF1FF4D310B50926AD419E7A40E730E9A0CF94
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 771 1adc28-1adcac CheckRemoteDebuggerPresent 773 1adcae 771->773 774 1adcb3-1adcd6 771->774 773->774
                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 001ADC9F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 927b5ee869e86797e6a02e207ab70f3b77a5bf8f7078fda785ea5e50adde4f5a
                                                  • Instruction ID: 4f4a2c31dd246b8f11e84d2df16f309f679983bf4f2585c11f48c2c4e5c70b0e
                                                  • Opcode Fuzzy Hash: 927b5ee869e86797e6a02e207ab70f3b77a5bf8f7078fda785ea5e50adde4f5a
                                                  • Instruction Fuzzy Hash: 972122B59006198FCB10CF9AD480BEEFBF4FB49310F14845AE859B3250C378AA44CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 6.12%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: T
                                                  • API String ID: 0-3187964512
                                                  • Opcode ID: 67cee893756e6db9596bcf7eb9437faaffecf995b41626059ce674904c667eb2
                                                  • Instruction ID: 6d87859b5f3cbb2fc66c3b7f7920e7528b6d0846eb3165a437646ec2a9de6640
                                                  • Opcode Fuzzy Hash: 67cee893756e6db9596bcf7eb9437faaffecf995b41626059ce674904c667eb2
                                                  • Instruction Fuzzy Hash: 75A11A79E11228CFCB14CF99C584C9DB7B2BF5A301B5AC595E419AB262D331EC46CB90
                                                  Uniqueness

                                                  Uniqueness Score: 1.59%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0405d109422e457600c17d40dbfb2bf465c3baf23fbf5830b9b8c5744031807c
                                                  • Instruction ID: c084bf78c5313c749ab1de62e1ec9200ae2303a82bd047b800479014ac9b2b15
                                                  • Opcode Fuzzy Hash: 0405d109422e457600c17d40dbfb2bf465c3baf23fbf5830b9b8c5744031807c
                                                  • Instruction Fuzzy Hash: EF92E3B5E00A1AAFC754CF68C581A99FBF1FB4D310B50926AD419E7A00E730F9A1CF94
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 957f6762514a814c9c8b1358416b714da2608d5c637844a71b6a646d6976b3d6
                                                  • Instruction ID: e4968fc60ddce4b6a5d74dbda041835642274aa2f86788727fbdc909bf24baa7
                                                  • Opcode Fuzzy Hash: 957f6762514a814c9c8b1358416b714da2608d5c637844a71b6a646d6976b3d6
                                                  • Instruction Fuzzy Hash: 5D428B79A00605CFCB14CF68C9949AEFBF2FF8A310B158668D456AB655D730F982CF90
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27155ad09d69243a65f41deb90ebf08694e588c143f55c3980ef9ce17a512816
                                                  • Instruction ID: 109798fa93658ca8b48e28a8f82a2ffee8456985767f69859b7db030fa501d63
                                                  • Opcode Fuzzy Hash: 27155ad09d69243a65f41deb90ebf08694e588c143f55c3980ef9ce17a512816
                                                  • Instruction Fuzzy Hash: 29426C78A00605CFCB14CF68C5949AEFBF2FF8A310B158969D456AB655DB30F982CF90
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d17fa03bc5c71e04400bdf68b22659bf525cc744d3c5e99a38921b4b68368131
                                                  • Instruction ID: ae4e895dd460340f45026bf92042ba79ec4ddaa0fc17e1223c2eb46b618ec928
                                                  • Opcode Fuzzy Hash: d17fa03bc5c71e04400bdf68b22659bf525cc744d3c5e99a38921b4b68368131
                                                  • Instruction Fuzzy Hash: 4B022879E015189FCB04DF99D5808ADBBF2FF8A310F618165E856AB766D330ED81CB90
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11e663c709c542aaeb34eebbba0f8abad24e883406253aea7e593bdcbac6c555
                                                  • Instruction ID: d801e2111dca0ec95cf363829e84c12e5af4b2643258946f2e56b3b91ff552e5
                                                  • Opcode Fuzzy Hash: 11e663c709c542aaeb34eebbba0f8abad24e883406253aea7e593bdcbac6c555
                                                  • Instruction Fuzzy Hash: 4FF1F478E015189FDB04DF99E5808ADFBB2FF8A300F628555E856AB762D330ED41CB94
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5cb53660ec386488d1b1f0b7e70862a2d165ecdc3930202b2736179c93371619
                                                  • Instruction ID: 35d7cc12c3cc3cf923a104792e52693ba8fba35bb000e661bc83ab19ce0dd50e
                                                  • Opcode Fuzzy Hash: 5cb53660ec386488d1b1f0b7e70862a2d165ecdc3930202b2736179c93371619
                                                  • Instruction Fuzzy Hash: 9FA1F978E11228CFCB14DF99D584CADBBF2BF5A301B5AC595E419AB222D331EC46CB50
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8c353e98a4b2a4899c71cd82971b96088dd8145ec85d9bca1996246e7bdf2c36
                                                  • Instruction ID: 418796a2d1b3832559113b0352d1ca245b8440984392273db5f0b0c256f2f055
                                                  • Opcode Fuzzy Hash: 8c353e98a4b2a4899c71cd82971b96088dd8145ec85d9bca1996246e7bdf2c36
                                                  • Instruction Fuzzy Hash: B791D779E11228CFCB14CF99D584CADB7F2BF59301B5AC595E419AB222D331EC86CB90
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 41ff5102ac47051fa952bc07a46fd9d791dd58e3d46f6c3eae47e6c8977c4967
                                                  • Instruction ID: 1b3d2bec66108040ec9e45caafedff2120ac685308365a78c7615379f3ea00a7
                                                  • Opcode Fuzzy Hash: 41ff5102ac47051fa952bc07a46fd9d791dd58e3d46f6c3eae47e6c8977c4967
                                                  • Instruction Fuzzy Hash: CE810679E11228CFCB14CF99D584DADB7F2BF59301B5AC5A5E419AB222D331EC46CB80
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 786cc4153714d1aec16240f8439aa73baa703ef22d770a527b0dcd3997a40133
                                                  • Instruction ID: 4927bee4889fce7329e1bf6eb99536fd56b2381e06348feba59ab1980b549304
                                                  • Opcode Fuzzy Hash: 786cc4153714d1aec16240f8439aa73baa703ef22d770a527b0dcd3997a40133
                                                  • Instruction Fuzzy Hash: 1E81D579E11228CFCB14CF99D584CADB7F2BF59301B5AC5A5E419AB222D331EC46CB90
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 451 551e97-551fb2 call 5501cb CreateMutexW 456 551fb6-551fbb 451->456 457 551fbd-551fdc call 551c04 456->457 458 551fe9-551fee 456->458 460 551fe1-551fe7 457->460 460->456 460->458
                                                  APIs
                                                  • CreateMutexW.KERNEL32(00000000,00000000,?,?), ref: 00551F8B
                                                    • Part of subcall function 00551C04: CreateProcessW.KERNEL32(?,00000000,00000000,00000000,00000000,0800000C,00000000,00000000,?,?), ref: 00551CB2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809707322.00550000.00000040.00000001.sdmp, Offset: 00550000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_550000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: Create$MutexProcess
                                                  • String ID: d
                                                  • API String ID: 2089245102-2564639436
                                                  • Opcode ID: 9150c0aa135747188a0f91637622f4f15ce0ed33650badeca4e6c88fbd847475
                                                  • Instruction ID: 9910dbd1689ba2be41bf903d24ad9deee5a12b98d4e3676de243bf0fe8d82759
                                                  • Opcode Fuzzy Hash: 9150c0aa135747188a0f91637622f4f15ce0ed33650badeca4e6c88fbd847475
                                                  • Instruction Fuzzy Hash: 1F41533615C381A9E6108FA0D811B7BB7A5EFC4B21F105D1FF988CB1D0E7B28694875B
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 766 1adc20-1adcac CheckRemoteDebuggerPresent 769 1adcae 766->769 770 1adcb3-1adcd6 766->770 769->770
                                                  APIs
                                                  • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 001ADC9F
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809300061.001A0000.00000040.00000001.sdmp, Offset: 001A0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_1a0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: CheckDebuggerPresentRemote
                                                  • String ID:
                                                  • API String ID: 3662101638-0
                                                  • Opcode ID: 42951cd954e18c28a1b038ceacf6c6b1a22db88e9f3cb7d93747f5367290256d
                                                  • Instruction ID: a790fe3a5143ea1ed114b2b3b9b2cabd23f9ad1a89ed2f9bf52afb1c5ab9f8b7
                                                  • Opcode Fuzzy Hash: 42951cd954e18c28a1b038ceacf6c6b1a22db88e9f3cb7d93747f5367290256d
                                                  • Instruction Fuzzy Hash: 4B2132B58002198FCB10CF99D480BEEFBF4BB49320F14845AE859B3250C378AA44CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 6.12%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809688883.00530000.00000040.00000001.sdmp, Offset: 00530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_530000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: Process
                                                  • String ID:
                                                  • API String ID: 1235230986-0
                                                  • Opcode ID: e1fc10d171e5755d0444b8bb00cef6d2c5649e89b47c1f9e9aff0cc527f234b5
                                                  • Instruction ID: a16cc14d981f283b0b3ee92993b1e95eb6631f23b0df5b91116bc226b979cb81
                                                  • Opcode Fuzzy Hash: e1fc10d171e5755d0444b8bb00cef6d2c5649e89b47c1f9e9aff0cc527f234b5
                                                  • Instruction Fuzzy Hash: 8B1133B59002088FCB10DFA9D484B9EFBF4FB89324F24886AD418A7310C778A944CFA4
                                                  Uniqueness

                                                  Uniqueness Score: 4.01%

                                                  APIs
                                                  • VirtualAlloc.KERNEL32(?,?,?,?), ref: 005311D8
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809688883.00530000.00000040.00000001.sdmp, Offset: 00530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_530000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: e22b86f377f4eb81e588694a030cc93c07b6636ab201ef7f399feb779fd72e78
                                                  • Instruction ID: 35899ea47e8b8fe0cb2fb2fd399bdd1682eb4415c4e146059f531e26d3edf684
                                                  • Opcode Fuzzy Hash: e22b86f377f4eb81e588694a030cc93c07b6636ab201ef7f399feb779fd72e78
                                                  • Instruction Fuzzy Hash: CD417974A006498FCB10DFA9D880AAEBFF4FF89310F15855AD558A7361C734A944CBA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  APIs
                                                  • VirtualAlloc.KERNEL32(?,?,?,?), ref: 005311D8
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809688883.00530000.00000040.00000001.sdmp, Offset: 00530000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_530000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 619fcd97e8fb686f91622eca9c2019c87fb4d36566951d20f6eaac0c19e09ab8
                                                  • Instruction ID: 07567752a691b1a9a3d4a3ab92f738d36d14767b245a95c484a55e9dbf880334
                                                  • Opcode Fuzzy Hash: 619fcd97e8fb686f91622eca9c2019c87fb4d36566951d20f6eaac0c19e09ab8
                                                  • Instruction Fuzzy Hash: A21126B59006489FCB20DFA9D884BDEBFF4FB89310F248559E558A7210C778A944CFA0
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809166349.0012D000.00000040.00000001.sdmp, Offset: 0012D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_12d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: da11a5ed6638aaa56a3d6969e01d53837e29b26a3398daa6a5233370a8da4f57
                                                  • Instruction ID: 38f239c0ce056a04d26f8301ab3577829006fa90457b590e5b5fb10bf7b66344
                                                  • Opcode Fuzzy Hash: da11a5ed6638aaa56a3d6969e01d53837e29b26a3398daa6a5233370a8da4f57
                                                  • Instruction Fuzzy Hash: 2721F575504284DFDB15EF10F9C0B2BBF65FB98324F24C5A9E8094B646C336E866C7A2
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809166349.0012D000.00000040.00000001.sdmp, Offset: 0012D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_12d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 723cbba9aacd0813bf11378a1c0d3f51e38b3c317050e60caaaf502b4f109324
                                                  • Instruction ID: 7825bb3034c2c60be3bf6b931397acc49079e3cdd5772bc9a3432ab1a08c7616
                                                  • Opcode Fuzzy Hash: 723cbba9aacd0813bf11378a1c0d3f51e38b3c317050e60caaaf502b4f109324
                                                  • Instruction Fuzzy Hash: 44210375504240EFDB15DF14F9C4B2ABF75FB88318F24C5A9E8094B206C376D866C7A1
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809166349.0012D000.00000040.00000001.sdmp, Offset: 0012D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_12d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a55b3225f22547ec31cad3f10bdac74d3526d69ab7a79cc14dcc14148f0f655
                                                  • Instruction ID: 2990299f68dbe4d1d41dbe09d0882dc29ce74998f0c449959ab499e2b06b093a
                                                  • Opcode Fuzzy Hash: 5a55b3225f22547ec31cad3f10bdac74d3526d69ab7a79cc14dcc14148f0f655
                                                  • Instruction Fuzzy Hash: 7D11E976404280DFCF11DF10E9C4B16BF72FB94314F24C6A9D8084B656C336D866CBA2
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.14809166349.0012D000.00000040.00000001.sdmp, Offset: 0012D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_12d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5a55b3225f22547ec31cad3f10bdac74d3526d69ab7a79cc14dcc14148f0f655
                                                  • Instruction ID: f0366f1b34440e2c59e658eec7a6a2bd5da2e525a77a7d865a9d1f9aeecf984e
                                                  • Opcode Fuzzy Hash: 5a55b3225f22547ec31cad3f10bdac74d3526d69ab7a79cc14dcc14148f0f655
                                                  • Instruction Fuzzy Hash: 1F11B676504280DFDF16CF10E9C4B1ABF71FB94314F24C6A9D8094B656C376D866CBA2
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Non-executed Functions

                                                  Execution Graph

                                                  Execution Coverage:25.6%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:106
                                                  Total number of Limit Nodes:2

                                                  Graph

                                                  execution_graph 7489 3cc09e 7490 3cc0ec SetThreadContext 7489->7490 7491 3cc0e2 7489->7491 7492 3cc120 7490->7492 7491->7490 7493 3cd938 7494 3cd98e CredEnumerateW 7493->7494 7496 3cd9e0 7494->7496 7497 3cc158 7498 3cc199 ReadProcessMemory 7497->7498 7499 3cc15b 7497->7499 7500 3cc1e6 7498->7500 7499->7498 7508 3cb338 7509 3cb33f 7508->7509 7510 3cb362 7508->7510 7509->7510 7511 3cb522 10 API calls 7509->7511 7511->7510 7380 3c0b36 7381 3c0b39 7380->7381 7382 3c0c22 7381->7382 7384 3c6d48 7381->7384 7387 3c3c40 7384->7387 7386 3c6d61 7386->7382 7388 3c6df8 GetForegroundWindow 7387->7388 7390 3c6e66 7388->7390 7390->7386 7512 3cafcd 7513 3cafdd 7512->7513 7514 3cb302 7513->7514 7515 3cb522 10 API calls 7513->7515 7515->7514 7391 3c2c48 7392 3c2ca7 GetVolumeInformationA 7391->7392 7394 3c2d5c 7392->7394 7395 3c1920 7396 3c19d5 7395->7396 7397 3c192c 7395->7397 7397->7396 7400 3c7138 7397->7400 7404 3c7127 7397->7404 7401 3c7162 7400->7401 7402 3c7246 7401->7402 7408 3c73c9 7401->7408 7402->7397 7405 3c7162 7404->7405 7406 3c7246 7405->7406 7407 3c73c9 GetForegroundWindow 7405->7407 7406->7397 7407->7406 7409 3c73fe 7408->7409 7410 3c3c40 GetForegroundWindow 7409->7410 7411 3c7441 7409->7411 7410->7411 7411->7402 7416 3cb1c0 7417 3cb1dd 7416->7417 7418 3cb302 7417->7418 7420 3cb522 7417->7420 7421 3cb54b 7420->7421 7425 3cb700 7421->7425 7445 3cb6f8 7421->7445 7422 3cb5e5 7422->7418 7426 3cb766 7425->7426 7435 3cbc8d 7426->7435 7465 3caf50 7426->7465 7431 3cb97f VirtualAllocEx 7432 3cb9d8 7431->7432 7433 3cb9fb VirtualAllocEx 7432->7433 7434 3cba55 7432->7434 7433->7434 7434->7435 7473 3caf68 7434->7473 7435->7422 7437 3cba8f 7437->7435 7438 3cbbb2 7437->7438 7444 3caf68 WriteProcessMemory 7437->7444 7438->7435 7439 3caf68 WriteProcessMemory 7438->7439 7440 3cbbdb 7439->7440 7440->7435 7477 3caf74 7440->7477 7443 3cbc44 ResumeThread 7443->7435 7444->7437 7446 3cb766 7445->7446 7447 3caf50 SetThreadContext 7446->7447 7451 3cbc8d 7446->7451 7448 3cb88f 7447->7448 7449 3caf5c ReadProcessMemory 7448->7449 7448->7451 7450 3cb8d1 7449->7450 7450->7451 7452 3cb97f VirtualAllocEx 7450->7452 7451->7422 7453 3cb9d8 7452->7453 7454 3cb9fb VirtualAllocEx 7453->7454 7455 3cba55 7453->7455 7454->7455 7455->7451 7456 3caf68 WriteProcessMemory 7455->7456 7460 3cba8f 7456->7460 7457 3cbbb2 7457->7451 7458 3caf68 WriteProcessMemory 7457->7458 7459 3cbbdb 7458->7459 7459->7451 7461 3caf74 SetThreadContext 7459->7461 7460->7451 7460->7457 7464 3caf68 WriteProcessMemory 7460->7464 7462 3cbc3c 7461->7462 7462->7451 7463 3cbc44 ResumeThread 7462->7463 7463->7451 7464->7460 7466 3cc0a0 SetThreadContext 7465->7466 7468 3cb88f 7466->7468 7468->7435 7469 3caf5c 7468->7469 7470 3cc160 ReadProcessMemory 7469->7470 7472 3cb8d1 7470->7472 7472->7431 7472->7435 7474 3cc228 WriteProcessMemory 7473->7474 7476 3cc2b9 7474->7476 7476->7437 7478 3cc0a0 SetThreadContext 7477->7478 7480 3cbc3c 7478->7480 7480->7435 7480->7443 7504 3cc220 7505 3cc278 WriteProcessMemory 7504->7505 7506 3cc270 7504->7506 7507 3cc2b9 7505->7507 7506->7505 7481 3c0bc2 7482 3c0bd3 7481->7482 7483 3c0c22 7482->7483 7484 3c6d48 GetForegroundWindow 7482->7484 7484->7483 7485 3c3c22 7486 3c3c35 GetForegroundWindow 7485->7486 7488 3c6e66 7486->7488

                                                  Executed Functions

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LCoh$LCoh$`D6$`D6$`D6$`D6$d7oh$d7oh$d7oh$d7oh$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$fC"h$l{8g$p6oh$p6oh$p6oh$p6oh$p6oh$p6oh$p6oh$p6oh
                                                  • API String ID: 0-168179485
                                                  • Opcode ID: c10762502ff66255959d49d0b1da022028b21c096fefce4d3e7e593bd4723809
                                                  • Instruction ID: b4970eabb4e2c65189b7a32955bea119034d7812d434d9ec8dda33d2a814dd2c
                                                  • Opcode Fuzzy Hash: c10762502ff66255959d49d0b1da022028b21c096fefce4d3e7e593bd4723809
                                                  • Instruction Fuzzy Hash: E6432C74E00218CFDB66DF64C998BADB7B6AF88304F1185E9D409AB391DB359E81CF41
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 870 3c0fea-3c103a 873 3c10ca-3c10cc 870->873 874 3c1040-3c10c8 870->874 875 3c10cf-3c10da 873->875 874->875 876 3c129f-3c12a7 875->876 877 3c10e0-3c1116 875->877 879 3c12b2-3c12fb 876->879 892 3c1118-3c1140 877->892 893 3c1147-3c125f 877->893 883 3c147b-3c1489 879->883 884 3c1301-3c1440 879->884 887 3c148f-3c14c4 883->887 888 3c187a-3c187f 883->888 884->883 905 3c14f4-3c15b7 887->905 906 3c14c6-3c14ed 887->906 892->893 893->876 941 3c15b9-3c15e3 905->941 942 3c15ea-3c17cb 905->942 906->905 941->942 972 3c17cd-3c17da 942->972 973 3c17e2 942->973 972->973 975 3c17e3 973->975 975->975
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LCoh$LCoh$fC"h$fC"h$fC"h$fC"h$fC"h
                                                  • API String ID: 0-4019340232
                                                  • Opcode ID: 9d24d776675b2c4194fd6aa37e2a9df9a0c04150712924d69a3b73811c591c04
                                                  • Instruction ID: f800289a7deaf9017e35d84c33d4b4f0496def040f2515e33892db88486b65fb
                                                  • Opcode Fuzzy Hash: 9d24d776675b2c4194fd6aa37e2a9df9a0c04150712924d69a3b73811c591c04
                                                  • Instruction Fuzzy Hash: F3124C78E40218CFDB19DF64D894BADB7B2BF88304F6084A9E909AB391DB315D91DF50
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1367 3c1b40-3c1b53 1368 3c1b55-3c1b75 1367->1368 1370 3c1f0b-3c1f1a 1368->1370 1371 3c1b7b-3c1b8b 1368->1371 1372 3c1f1c-3c1f55 1370->1372 1373 3c1f76 1370->1373 1374 3c1b8e-3c1b94 1371->1374 1372->1373 1467 3c1f7d call 3c2058 1373->1467 1468 3c1f7d call 3c2118 1373->1468 1469 3c1f7d call 3c2139 1373->1469 1470 3c1f7d call 3c20e4 1373->1470 1375 3c1b9a-3c1ba8 1374->1375 1376 3c1ee7-3c1f06 1374->1376 1379 3c1baa-3c1baf 1375->1379 1380 3c1bb7-3c1bc6 1375->1380 1376->1370 1378 3c1f83-3c1f8d 1378->1370 1382 3c1f93-3c1f9a 1378->1382 1379->1380 1380->1370 1383 3c1bcc-3c1bd4 1380->1383 1382->1368 1385 3c1bdb-3c1be5 1383->1385 1387 3c1bfb-3c1c03 1385->1387 1388 3c1be7-3c1bf4 1385->1388 1391 3c1c0a-3c1c14 1387->1391 1388->1387 1391->1370 1392 3c1c1a-3c1c21 1391->1392 1394 3c1c27 1392->1394 1395 3c1c23-3c1c25 1392->1395 1396 3c1c2c-3c1c2e 1394->1396 1395->1396 1398 3c1c34-3c1c3a 1396->1398 1399 3c1d06-3c1d0e 1396->1399 1400 3c1d01 1398->1400 1401 3c1d15-3c1d18 1399->1401 1405 3c1c4c-3c1c50 1400->1405 1401->1376 1403 3c1d1e-3c1d21 1401->1403 1403->1376 1404 3c1d27-3c1d2a 1403->1404 1404->1376 1406 3c1d30-3c1d32 1404->1406 1407 3c1c56-3c1c59 1405->1407 1409 3c1d3c-3c1d5f 1406->1409 1407->1370 1408 3c1c5f-3c1c61 1407->1408 1410 3c1cc3-3c1cff 1408->1410 1411 3c1c63 1408->1411 1409->1376 1420 3c1d65-3c1d77 1409->1420 1410->1400 1413 3c1c6a-3c1c76 1411->1413 1415 3c1c7c 1413->1415 1416 3c1c78-3c1c7a 1413->1416 1418 3c1c81-3c1c83 1415->1418 1416->1418 1423 3c1c9f-3c1ca7 1418->1423 1424 3c1c85 1418->1424 1421 3c1d79 1420->1421 1422 3c1d80-3c1d82 1420->1422 1425 3c1d7b-3c1d7e 1421->1425 1426 3c1d84 1421->1426 1427 3c1d89-3c1d8b 1422->1427 1432 3c1cae-3c1cb8 1423->1432 1465 3c1c8b call 3c661f 1424->1465 1466 3c1c8b call 3c6b48 1424->1466 1425->1422 1425->1426 1426->1427 1429 3c1d8d-3c1d99 1427->1429 1430 3c1de8-3c1e1c 1427->1430 1429->1376 1433 3c1d9f-3c1da1 1429->1433 1442 3c1e22-3c1e33 1430->1442 1431 3c1c91-3c1c98 1431->1423 1432->1387 1434 3c1cbe 1432->1434 1437 3c1dad-3c1db0 1433->1437 1438 3c1da3-3c1da5 1433->1438 1434->1374 1437->1376 1441 3c1db6-3c1db9 1437->1441 1438->1376 1440 3c1dab 1438->1440 1440->1441 1441->1376 1443 3c1dbf-3c1dc2 1441->1443 1448 3c1e3a-3c1e3c 1442->1448 1449 3c1e35-3c1e38 1442->1449 1443->1376 1445 3c1dc8-3c1dcb 1443->1445 1445->1376 1447 3c1dd1-3c1dd3 1445->1447 1452 3c1ddd 1447->1452 1451 3c1e43-3c1e45 1448->1451 1449->1448 1450 3c1e3e 1449->1450 1450->1451 1451->1374 1453 3c1e4b-3c1e9b 1451->1453 1452->1430 1458 3c1ea1-3c1ea3 1453->1458 1459 3c1eaa-3c1ee2 1458->1459 1459->1374 1465->1431 1466->1431 1467->1378 1468->1378 1469->1378 1470->1378
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: fC"h$Sv
                                                  • API String ID: 0-1303951893
                                                  • Opcode ID: 3be85bdd59ca6cfe855d34229f3e73f15508c430ccaff2a9eae65b0124e5ddc9
                                                  • Instruction ID: b06ddb6159539861a83f67c9188fa24893a4dab33aeb67f144b099a14440cf9b
                                                  • Opcode Fuzzy Hash: 3be85bdd59ca6cfe855d34229f3e73f15508c430ccaff2a9eae65b0124e5ddc9
                                                  • Instruction Fuzzy Hash: F4B19D39A002008FD759DF79C484F6D77E2AF8A324F258668E812DB3A2DB31DD41DB91
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd9e7f4fbd2b5ea62febd044d7305204757f915ef2d86e6438a3db37b102160a
                                                  • Instruction ID: 6158814930ad23bb29f46ed0d4ebc4e2deb6dbb10ffef891557a09b822f16485
                                                  • Opcode Fuzzy Hash: bd9e7f4fbd2b5ea62febd044d7305204757f915ef2d86e6438a3db37b102160a
                                                  • Instruction Fuzzy Hash: B9E17074B002148BDB45DBB8C898AADB7B2EF88315F55852EE406EB395DF35DC81CB81
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a0663815f6e9d01cff3bdc8dfaa07c5946da525dc3616c29adfd03e5ead9d24
                                                  • Instruction ID: e10c38e65d9986efc7ae0a58da36bd1f81296460d87f80a811f62d1afc0a6f40
                                                  • Opcode Fuzzy Hash: 3a0663815f6e9d01cff3bdc8dfaa07c5946da525dc3616c29adfd03e5ead9d24
                                                  • Instruction Fuzzy Hash: 1EB14C74E00609CFDB15CFA9C885BAEBBF2AF88314F15852DD815E7254EB74AC85CB81
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a100816618c2417932364236d7e900af0a65dfbabb68870c2d94efc7ab4a36ed
                                                  • Instruction ID: 0696a61d5a717d7746e2fac86e5f16d7e18fb8f57867fe4dc139d62b818563da
                                                  • Opcode Fuzzy Hash: a100816618c2417932364236d7e900af0a65dfbabb68870c2d94efc7ab4a36ed
                                                  • Instruction Fuzzy Hash: D0B14D74E002498FDF11CFA9C886BADBBF2AF88314F19852DD815EB254DB749C45CB81
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 976 3cb700-3cb7b6 981 3cb7bc-3cb7c1 976->981 982 3cbe3b 976->982 981->982 983 3cb7c7-3cb7d0 981->983 986 3cbe40-3cbe42 982->986 984 3cb7d9-3cb7db 983->984 985 3cb7d2 983->985 988 3cb7dd-3cb7e7 984->988 989 3cb7e9 984->989 985->984 987 3cbe1d-3cbe38 986->987 990 3cb7ee-3cb7f0 988->990 989->990 991 3cb80a-3cb82d call 3caf44 990->991 992 3cb7f2-3cb804 990->992 996 3cbd97-3cbdaa 991->996 997 3cb833-3cb84b 991->997 992->991 1005 3cbdb1-3cbdcf 996->1005 1000 3cbca8 997->1000 1001 3cb851-3cb878 997->1001 1004 3cbcad-3cbcc0 1000->1004 1001->1005 1009 3cb87e-3cb891 call 3caf50 1001->1009 1014 3cbcc7-3cbcda 1004->1014 1022 3cbdd1-3cbdd8 1005->1022 1023 3cbde3-3cbe02 1005->1023 1015 3cbd7d-3cbd90 1009->1015 1016 3cb897-3cb8a1 1009->1016 1036 3cbce1-3cbcf4 1014->1036 1015->996 1016->1005 1017 3cb8a7-3cb8b6 1016->1017 1017->1000 1019 3cb8bc-3cb8d3 call 3caf5c 1017->1019 1032 3cb8d9-3cb8e5 1019->1032 1033 3cbd63-3cbd76 1019->1033 1030 3cbdda-3cbde1 1022->1030 1031 3cbe07-3cbe16 1022->1031 1023->1031 1030->1031 1031->986 1058 3cbe18 1031->1058 1034 3cb94f-3cb958 1032->1034 1035 3cb8e7-3cb934 1032->1035 1033->1015 1034->1000 1041 3cb95e-3cb971 1034->1041 1046 3cb93d-3cb949 1035->1046 1047 3cb936-3cb93c 1035->1047 1059 3cbcfb-3cbd0e 1036->1059 1041->1000 1050 3cb977-3cb9d6 VirtualAllocEx 1041->1050 1046->1034 1051 3cbd49-3cbd5c 1046->1051 1047->1046 1061 3cb9df-3cb9f9 1050->1061 1062 3cb9d8-3cb9de 1050->1062 1051->1033 1058->987 1077 3cbd15-3cbd28 1059->1077 1065 3cba6c-3cba73 1061->1065 1066 3cb9fb-3cba53 VirtualAllocEx 1061->1066 1062->1061 1070 3cbd2f-3cbd42 1065->1070 1071 3cba79-3cba91 call 3caf68 1065->1071 1068 3cba5c-3cba66 1066->1068 1069 3cba55-3cba5b 1066->1069 1068->1065 1069->1068 1070->1051 1071->1077 1078 3cba97-3cbaa3 1071->1078 1077->1070 1078->1000 1079 3cbaa9-3cbab2 1078->1079 1079->1000 1081 3cbab8-3cbac3 1079->1081 1081->1000 1085 3cbac9-3cbad3 1081->1085 1086 3cbad9-3cbade 1085->1086 1087 3cbbb2-3cbbc6 1085->1087 1086->1000 1088 3cbae4-3cbaf7 1086->1088 1087->1000 1090 3cbbcc-3cbbdd call 3caf68 1087->1090 1088->1000 1093 3cbafd-3cbb0c 1088->1093 1090->1036 1095 3cbbe3-3cbbec 1090->1095 1093->1000 1098 3cbb12-3cbb22 1093->1098 1095->1000 1097 3cbbf2-3cbc00 1095->1097 1103 3cbc0e-3cbc16 1097->1103 1104 3cbc02-3cbc08 1097->1104 1101 3cbb94-3cbb97 1098->1101 1102 3cbb24-3cbb27 1098->1102 1101->1000 1107 3cbb9d-3cbba0 1101->1107 1102->1000 1105 3cbb2d-3cbb30 1102->1105 1103->1000 1106 3cbc1c-3cbc26 1103->1106 1104->1103 1105->1000 1108 3cbb36-3cbb39 1105->1108 1106->1005 1109 3cbc2c-3cbc3e call 3caf74 1106->1109 1107->1000 1110 3cbba6-3cbbac 1107->1110 1108->1000 1111 3cbb3f-3cbb42 1108->1111 1109->1014 1115 3cbc44-3cbc8b ResumeThread 1109->1115 1110->1086 1110->1087 1111->1000 1113 3cbb48-3cbb76 1111->1113 1113->1000 1122 3cbb7c-3cbb87 call 3caf68 1113->1122 1116 3cbc8d-3cbc93 1115->1116 1117 3cbc94-3cbca1 1115->1117 1116->1117 1117->1004 1119 3cbca3 1117->1119 1119->1058 1124 3cbb8c-3cbb8e 1122->1124 1124->1059 1124->1101
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040,?,00000000,00000000,02D41158), ref: 003CB9B6
                                                  • VirtualAllocEx.KERNEL32(?,00000000,00000000,00003000,00000040,?,00000000,00000000,02D41158), ref: 003CBA33
                                                  • ResumeThread.KERNELBASE(?,?,00000000,00000000,02D41158), ref: 003CBC6B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual$ResumeThread
                                                  • String ID: .@"h
                                                  • API String ID: 3804112640-4125631899
                                                  • Opcode ID: 2b5cec16153d3dc4bc4348f248400bb7657bf0c298aff1f47adae02c1f7bf77a
                                                  • Instruction ID: cf96ec97c75c551cc939bc1c79d0fbb6294fbe3827f2e653e5e9288696e53c91
                                                  • Opcode Fuzzy Hash: 2b5cec16153d3dc4bc4348f248400bb7657bf0c298aff1f47adae02c1f7bf77a
                                                  • Instruction Fuzzy Hash: D0029034A102288FDB25DF64CC95BADB7B6AF85304F54809CD50AEB391CF749E85CB92
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1125 3cb690-3cb691 1126 3cb6d1-3cb6d4 1125->1126 1127 3cb693-3cb699 1125->1127 1128 3cb6d9-3cb6de 1126->1128 1127->1128 1129 3cb69b-3cb6a9 1127->1129 1131 3cb6b4 1128->1131 1132 3cb6e0-3cb6e4 1128->1132 1130 3cb6aa-3cb6ab 1129->1130 1133 3cb6ad-3cb6db 1130->1133 1134 3cb6e6-3cb6ed 1130->1134 1131->1130 1135 3cb6b6-3cb6ce 1131->1135 1132->1134 1133->1134 1135->1126
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .@"h
                                                  • API String ID: 0-4125631899
                                                  • Opcode ID: 0bd0ebd1bdd160caa4d65a39e591b7b84c056d5be716e24b746aaf6fa89e8b95
                                                  • Instruction ID: 1c0a48593d9dfd75c74db16e45e5ecc128eaec2aa6fa0de77cd255d7c28420b5
                                                  • Opcode Fuzzy Hash: 0bd0ebd1bdd160caa4d65a39e591b7b84c056d5be716e24b746aaf6fa89e8b95
                                                  • Instruction Fuzzy Hash: 23F19C74A10218DFDB26CF24CC95FA9BBB6AF85305F14809CE549EB292CB709E85CF51
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1143 3cb6f8-3cb7b6 1148 3cb7bc-3cb7c1 1143->1148 1149 3cbe3b 1143->1149 1148->1149 1150 3cb7c7-3cb7d0 1148->1150 1153 3cbe40-3cbe42 1149->1153 1151 3cb7d9-3cb7db 1150->1151 1152 3cb7d2 1150->1152 1155 3cb7dd-3cb7e7 1151->1155 1156 3cb7e9 1151->1156 1152->1151 1154 3cbe1d-3cbe38 1153->1154 1157 3cb7ee-3cb7f0 1155->1157 1156->1157 1158 3cb80a-3cb82d call 3caf44 1157->1158 1159 3cb7f2-3cb804 1157->1159 1163 3cbd97-3cbdaa 1158->1163 1164 3cb833-3cb84b 1158->1164 1159->1158 1172 3cbdb1-3cbdcf 1163->1172 1167 3cbca8 1164->1167 1168 3cb851-3cb878 1164->1168 1171 3cbcad-3cbcc0 1167->1171 1168->1172 1176 3cb87e-3cb891 call 3caf50 1168->1176 1181 3cbcc7-3cbcda 1171->1181 1189 3cbdd1-3cbdd8 1172->1189 1190 3cbde3-3cbe02 1172->1190 1182 3cbd7d-3cbd90 1176->1182 1183 3cb897-3cb8a1 1176->1183 1203 3cbce1-3cbcf4 1181->1203 1182->1163 1183->1172 1184 3cb8a7-3cb8b6 1183->1184 1184->1167 1186 3cb8bc-3cb8d3 call 3caf5c 1184->1186 1199 3cb8d9-3cb8e5 1186->1199 1200 3cbd63-3cbd76 1186->1200 1197 3cbdda-3cbde1 1189->1197 1198 3cbe07-3cbe16 1189->1198 1190->1198 1197->1198 1198->1153 1225 3cbe18 1198->1225 1201 3cb94f-3cb958 1199->1201 1202 3cb8e7-3cb934 1199->1202 1200->1182 1201->1167 1208 3cb95e-3cb971 1201->1208 1213 3cb93d-3cb949 1202->1213 1214 3cb936-3cb93c 1202->1214 1226 3cbcfb-3cbd0e 1203->1226 1208->1167 1217 3cb977-3cb9d6 VirtualAllocEx 1208->1217 1213->1201 1218 3cbd49-3cbd5c 1213->1218 1214->1213 1228 3cb9df-3cb9f9 1217->1228 1229 3cb9d8-3cb9de 1217->1229 1218->1200 1225->1154 1244 3cbd15-3cbd28 1226->1244 1232 3cba6c-3cba73 1228->1232 1233 3cb9fb-3cba53 VirtualAllocEx 1228->1233 1229->1228 1237 3cbd2f-3cbd42 1232->1237 1238 3cba79-3cba91 call 3caf68 1232->1238 1235 3cba5c-3cba66 1233->1235 1236 3cba55-3cba5b 1233->1236 1235->1232 1236->1235 1237->1218 1238->1244 1245 3cba97-3cbaa3 1238->1245 1244->1237 1245->1167 1246 3cbaa9-3cbab2 1245->1246 1246->1167 1248 3cbab8-3cbac3 1246->1248 1248->1167 1252 3cbac9-3cbad3 1248->1252 1253 3cbad9-3cbade 1252->1253 1254 3cbbb2-3cbbc6 1252->1254 1253->1167 1255 3cbae4-3cbaf7 1253->1255 1254->1167 1257 3cbbcc-3cbbdd call 3caf68 1254->1257 1255->1167 1260 3cbafd-3cbb0c 1255->1260 1257->1203 1262 3cbbe3-3cbbec 1257->1262 1260->1167 1265 3cbb12-3cbb22 1260->1265 1262->1167 1264 3cbbf2-3cbc00 1262->1264 1270 3cbc0e-3cbc16 1264->1270 1271 3cbc02-3cbc08 1264->1271 1268 3cbb94-3cbb97 1265->1268 1269 3cbb24-3cbb27 1265->1269 1268->1167 1274 3cbb9d-3cbba0 1268->1274 1269->1167 1272 3cbb2d-3cbb30 1269->1272 1270->1167 1273 3cbc1c-3cbc26 1270->1273 1271->1270 1272->1167 1275 3cbb36-3cbb39 1272->1275 1273->1172 1276 3cbc2c-3cbc3e call 3caf74 1273->1276 1274->1167 1277 3cbba6-3cbbac 1274->1277 1275->1167 1278 3cbb3f-3cbb42 1275->1278 1276->1181 1282 3cbc44-3cbc8b ResumeThread 1276->1282 1277->1253 1277->1254 1278->1167 1280 3cbb48-3cbb76 1278->1280 1280->1167 1289 3cbb7c-3cbb87 call 3caf68 1280->1289 1283 3cbc8d-3cbc93 1282->1283 1284 3cbc94-3cbca1 1282->1284 1283->1284 1284->1171 1286 3cbca3 1284->1286 1286->1225 1291 3cbb8c-3cbb8e 1289->1291 1291->1226 1291->1268
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: .@"h
                                                  • API String ID: 0-4125631899
                                                  • Opcode ID: 65fee687fb23eac7a265d56bf4d93ed85b315969b1b271a5a05def1690dee358
                                                  • Instruction ID: 355b980228845198cc78b4269a44aa45610220a805d47662690db87101b97adc
                                                  • Opcode Fuzzy Hash: 65fee687fb23eac7a265d56bf4d93ed85b315969b1b271a5a05def1690dee358
                                                  • Instruction Fuzzy Hash: C9E17874A102189FDB25CF24CC85FAABBB6AF85305F14809DE90DEB291CB709E85CF51
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1471 3c2c48-3c2d5a GetVolumeInformationA 1476 3c2d5c-3c2d62 1471->1476 1477 3c2d63-3c2de0 1471->1477 1476->1477 1487 3c2dea-3c2dee 1477->1487 1488 3c2de2 1477->1488 1489 3c2df8-3c2dfc 1487->1489 1490 3c2df0 1487->1490 1488->1487 1491 3c2dfe 1489->1491 1492 3c2e06 1489->1492 1490->1489 1491->1492 1493 3c2e07 1492->1493 1493->1493
                                                  APIs
                                                  • GetVolumeInformationA.KERNEL32(?,?,?,?,?,?,?,?), ref: 003C2D44
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: InformationVolume
                                                  • String ID:
                                                  • API String ID: 2039140958-0
                                                  • Opcode ID: e3f203b7a2fa2657c7e16eb24588af7d3ab80d40ec18f8d06b9fb769fea77940
                                                  • Instruction ID: 9057e0a596add57f444c0590f26e2f313d67727c894a8af973d5cda16c4405ca
                                                  • Opcode Fuzzy Hash: e3f203b7a2fa2657c7e16eb24588af7d3ab80d40ec18f8d06b9fb769fea77940
                                                  • Instruction Fuzzy Hash: 5B51DEB5D00208DFCB10DFE8C594BDEBBB5BF48304F608069E409AB251CB71A949CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.02%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1494 3cd938-3cd992 1496 3cd99a-3cd9de CredEnumerateW 1494->1496 1497 3cd994-3cd997 1494->1497 1498 3cd9e7-3cda0f 1496->1498 1499 3cd9e0-3cd9e6 1496->1499 1497->1496 1499->1498
                                                  APIs
                                                  • CredEnumerateW.ADVAPI32(00000000,?,?,?), ref: 003CD9CB
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: CredEnumerate
                                                  • String ID:
                                                  • API String ID: 3404281133-0
                                                  • Opcode ID: e5065c9b2dff1d7b67824ba5b284e2318b43374210d7241aa7453302308830fc
                                                  • Instruction ID: 090c025972e146a945821c8a631642c7a4aebfc8d40534b12c657954475d7b12
                                                  • Opcode Fuzzy Hash: e5065c9b2dff1d7b67824ba5b284e2318b43374210d7241aa7453302308830fc
                                                  • Instruction Fuzzy Hash: 773124B5D0121A9FCB10DF99D484BDEFBB0FF48320F10856AE858A7340D374AA54CBA1
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1502 3cd940-3cd992 1504 3cd99a-3cd9de CredEnumerateW 1502->1504 1505 3cd994-3cd997 1502->1505 1506 3cd9e7-3cda0f 1504->1506 1507 3cd9e0-3cd9e6 1504->1507 1505->1504 1507->1506
                                                  APIs
                                                  • CredEnumerateW.ADVAPI32(00000000,?,?,?), ref: 003CD9CB
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: CredEnumerate
                                                  • String ID:
                                                  • API String ID: 3404281133-0
                                                  • Opcode ID: 54aecbd02e5bdc6cc38ac15be8fb8d2c5843cc81e1fe53098866119e7ba80a90
                                                  • Instruction ID: a5d81fc1676ebd4357d0fc6e5dccec02ad4d7bc705b500435474efd8d2f90a43
                                                  • Opcode Fuzzy Hash: 54aecbd02e5bdc6cc38ac15be8fb8d2c5843cc81e1fe53098866119e7ba80a90
                                                  • Instruction Fuzzy Hash: 242105B5D01219AFCB10DF99D484BDEFBB4FF48324F10856AE858A7340D774AA54CBA1
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1510 3caf68-3cc26e 1512 3cc278-3cc2b7 WriteProcessMemory 1510->1512 1513 3cc270-3cc276 1510->1513 1514 3cc2b9-3cc2bf 1512->1514 1515 3cc2c0-3cc2e1 1512->1515 1513->1512 1514->1515
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,00000000,00000000,?,00000001), ref: 003CC2A4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: 3be54b72276efbbb6b9f48cf28ce448244419ce6799d7d57df580ce8a7ef58f4
                                                  • Instruction ID: 8c2f1d2d172392d76cc6774b86af52602cf8cecbcf363779dab6fabd7b1970ac
                                                  • Opcode Fuzzy Hash: 3be54b72276efbbb6b9f48cf28ce448244419ce6799d7d57df580ce8a7ef58f4
                                                  • Instruction Fuzzy Hash: AF21E3B59102499FDF10CFD9D984BDEBBF4FB49314F10842AE918A7240D378AA44CBA5
                                                  Uniqueness

                                                  Uniqueness Score: 0.04%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1517 3cc220-3cc26e 1518 3cc278-3cc2b7 WriteProcessMemory 1517->1518 1519 3cc270-3cc276 1517->1519 1520 3cc2b9-3cc2bf 1518->1520 1521 3cc2c0-3cc2e1 1518->1521 1519->1518 1520->1521
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,00000000,00000000,?,00000001), ref: 003CC2A4
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID:
                                                  • API String ID: 3559483778-0
                                                  • Opcode ID: b3f1c6a2afb30c669b2443d01f13d0fcdb16a8ff9bb9bb4cdb6754c1c08d7fe3
                                                  • Instruction ID: 0cd5dd2fa8a11bfeee1466c0b5da80e4ebffc50bbd0b70e68756b517603b5001
                                                  • Opcode Fuzzy Hash: b3f1c6a2afb30c669b2443d01f13d0fcdb16a8ff9bb9bb4cdb6754c1c08d7fe3
                                                  • Instruction Fuzzy Hash: 7421E0B5910249DFDF10CFA9D884BDEBBF4FB49314F10846AE958A7240D378AA44CF61
                                                  Uniqueness

                                                  Uniqueness Score: 0.04%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1523 3caf5c-3cc1e4 ReadProcessMemory 1526 3cc1ed-3cc20e 1523->1526 1527 3cc1e6-3cc1ec 1523->1527 1527->1526
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,00000004,?,?,00000000,00000000,02D41158), ref: 003CC1D1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 435b55f1cca7143e068d5ffd1d204a82d5acf62cc93e17dc0071a00d63020d70
                                                  • Instruction ID: 62aaedd0bc55959094690ef8ddbdf2f84125fed31ec114c0fd1f9d03fa8b9d78
                                                  • Opcode Fuzzy Hash: 435b55f1cca7143e068d5ffd1d204a82d5acf62cc93e17dc0071a00d63020d70
                                                  • Instruction Fuzzy Hash: 3C21F3B59102499FDB11CF9AD884BEEBBF4FB08314F10846EE918A7201D374AA44CBA5
                                                  Uniqueness

                                                  Uniqueness Score: 0.11%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1543 3cc158-3cc159 1544 3cc199-3cc1e4 ReadProcessMemory 1543->1544 1545 3cc15b-3cc192 1543->1545 1546 3cc1ed-3cc20e 1544->1546 1547 3cc1e6-3cc1ec 1544->1547 1545->1544 1547->1546
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,00000004,?,?,00000000,00000000,02D41158), ref: 003CC1D1
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID:
                                                  • API String ID: 1726664587-0
                                                  • Opcode ID: 55ed789f053d1ba4aa5b899c37cee61095648340bc19d6db297d5048892604bf
                                                  • Instruction ID: 3155a2a9e10bb4f54d17c089376003d9be7a8053319d27377af1c346fe4bde39
                                                  • Opcode Fuzzy Hash: 55ed789f053d1ba4aa5b899c37cee61095648340bc19d6db297d5048892604bf
                                                  • Instruction Fuzzy Hash: 9D21EDB5D102499FDB11CF9AD884BDEBBB4FB48314F14846EE858A7241D378AA44CBA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.11%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1536 3caf74-3cc0e0 1538 3cc0ec-3cc11e SetThreadContext 1536->1538 1539 3cc0e2-3cc0ea 1536->1539 1540 3cc127-3cc148 1538->1540 1541 3cc120-3cc126 1538->1541 1539->1538 1541->1540
                                                  APIs
                                                  • SetThreadContext.KERNEL32(?,00000000,?,?,?,?,003CB88F,?,00000000,00000000,02D41158), ref: 003CC10B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: c0bc87f9e2e1006df5e64497302a4f74111c5852a24287867551263a0a24d533
                                                  • Instruction ID: e851a466dbfcbb86a4405298e1f904c0de0deae3478d9a7fad42e3aef3ee17a9
                                                  • Opcode Fuzzy Hash: c0bc87f9e2e1006df5e64497302a4f74111c5852a24287867551263a0a24d533
                                                  • Instruction Fuzzy Hash: 4F2133B5D102098FDB10CF9AC844BEEBBF4EB89324F14C46ED858A3200D378A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.78%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1529 3caf50-3cc0e0 1531 3cc0ec-3cc11e SetThreadContext 1529->1531 1532 3cc0e2-3cc0ea 1529->1532 1533 3cc127-3cc148 1531->1533 1534 3cc120-3cc126 1531->1534 1532->1531 1534->1533
                                                  APIs
                                                  • SetThreadContext.KERNEL32(?,00000000,?,?,?,?,003CB88F,?,00000000,00000000,02D41158), ref: 003CC10B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: f91f273effc2446467359ce6b062300afbdd51b0dbf67138211ef148ed448cb2
                                                  • Instruction ID: fdf4d0130a7ced2824f0808a083939f919dd941fc73a81f335f63718f74f70c8
                                                  • Opcode Fuzzy Hash: f91f273effc2446467359ce6b062300afbdd51b0dbf67138211ef148ed448cb2
                                                  • Instruction Fuzzy Hash: D921F2B59102098FDB10CF9AC844BEEBBF4EB89324F14846ED858A7240D779A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.78%

                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 003C6E54
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ForegroundWindow
                                                  • String ID:
                                                  • API String ID: 2020703349-0
                                                  • Opcode ID: 4dd42fc31cf0ab76a85beeb7fc27ffcfd43c6d5484c7211a4f4d8dfcd979d635
                                                  • Instruction ID: 7ee44a8051c4fa8bb9d7b965e331835ec2a6bcf3f9a071de4ac58dbb114f6639
                                                  • Opcode Fuzzy Hash: 4dd42fc31cf0ab76a85beeb7fc27ffcfd43c6d5484c7211a4f4d8dfcd979d635
                                                  • Instruction Fuzzy Hash: A7219AB48043888FCB11DFA9C855BDFBFF4EF49214F14849EC469A7291C378A844CBA2
                                                  Uniqueness

                                                  Uniqueness Score: 0.32%

                                                  APIs
                                                  • SetThreadContext.KERNEL32(?,00000000,?,?,?,?,003CB88F,?,00000000,00000000,02D41158), ref: 003CC10B
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ContextThread
                                                  • String ID:
                                                  • API String ID: 1591575202-0
                                                  • Opcode ID: 83577bd2c5e74e64ecccd0349e5f72804469b6ce6b38b508ce18ca6b799f5860
                                                  • Instruction ID: de7cca8d9e7064b1e2f4ca776ddee984fa8f265f066c5344153549f078f723f9
                                                  • Opcode Fuzzy Hash: 83577bd2c5e74e64ecccd0349e5f72804469b6ce6b38b508ce18ca6b799f5860
                                                  • Instruction Fuzzy Hash: 3F2103B5D102498FDB10CF9AD844BDEBBF4EB88314F14856ED858A3240D379A945CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.78%

                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 003C6E54
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ForegroundWindow
                                                  • String ID:
                                                  • API String ID: 2020703349-0
                                                  • Opcode ID: 3796b0388347d12daa2b771eed57015d3ef8bf65cb6f8d166681d3df3d5cb4c1
                                                  • Instruction ID: 7de1a77809f905682c125e50152214830a272c6a684e930db00628f69ce8a8ef
                                                  • Opcode Fuzzy Hash: 3796b0388347d12daa2b771eed57015d3ef8bf65cb6f8d166681d3df3d5cb4c1
                                                  • Instruction Fuzzy Hash: 3B1125B8D002098FCB10DF99C545B9EFBF4EB48314F10885AD829A7310D774A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.32%

                                                  APIs
                                                  • GetForegroundWindow.USER32 ref: 003C6E54
                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID: ForegroundWindow
                                                  • String ID:
                                                  • API String ID: 2020703349-0
                                                  • Opcode ID: 9ece8c05092b560efb26dd20bffe80cc1d5109858ddb4912386e40139efe6809
                                                  • Instruction ID: 2cb524351e54e868c09dba842e519e03dc211861e551cee8468e01797826d95b
                                                  • Opcode Fuzzy Hash: 9ece8c05092b560efb26dd20bffe80cc1d5109858ddb4912386e40139efe6809
                                                  • Instruction Fuzzy Hash: AE1104B89002498FCB10DFA9D585BDEFBF0AF48214F14895AD859A7350D378A944CFA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.32%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813588602.0036D000.00000040.00000001.sdmp, Offset: 0036D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_36d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: a5ad51d6dc95ed98ae5ef6b25cbc4438c50145f52138d8d11b2e36df89608c18
                                                  • Instruction ID: 4bb1700177eaab304aeb1b2236edf0e926d2a0340dabe19bd0bcaf5766430853
                                                  • Opcode Fuzzy Hash: a5ad51d6dc95ed98ae5ef6b25cbc4438c50145f52138d8d11b2e36df89608c18
                                                  • Instruction Fuzzy Hash: 84210778A04244DFCB12CF10D5C0B2ABB65FB88318F34C5ADE8094B749C336D806CB62
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813588602.0036D000.00000040.00000001.sdmp, Offset: 0036D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_36d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca7cf9f7417af184999f98e15a1e29f76a5b0059672c4d9a47b112a84831012a
                                                  • Instruction ID: 1881b3cfb1151078568f1a30fb711c6bec4ecbf676afd4a9e76f38e998b52175
                                                  • Opcode Fuzzy Hash: ca7cf9f7417af184999f98e15a1e29f76a5b0059672c4d9a47b112a84831012a
                                                  • Instruction Fuzzy Hash: 5521F574A04244DFCB16DF10D8C4B26BB65EB84318F24C569D8094B64AC337D806CAA1
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813588602.0036D000.00000040.00000001.sdmp, Offset: 0036D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_36d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 00cb6254f7c47b96390276d06076bfe19cf885635d13f8954bc2b2e87f2a4134
                                                  • Instruction ID: 3782c243ae145d17c24081c9e9a3645e6d7a65c94bccd56f3034c7ba6a825629
                                                  • Opcode Fuzzy Hash: 00cb6254f7c47b96390276d06076bfe19cf885635d13f8954bc2b2e87f2a4134
                                                  • Instruction Fuzzy Hash: 63119075904280DFCB12CF14D5C4B15FB71FB85314F24C6A9D8094B65AC33AD84ACB61
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813588602.0036D000.00000040.00000001.sdmp, Offset: 0036D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_36d000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 00cb6254f7c47b96390276d06076bfe19cf885635d13f8954bc2b2e87f2a4134
                                                  • Instruction ID: 2a73fd3199bc8baaa9207caf2795e75fc352a2331f68610fc8f068ff5a193aa6
                                                  • Opcode Fuzzy Hash: 00cb6254f7c47b96390276d06076bfe19cf885635d13f8954bc2b2e87f2a4134
                                                  • Instruction Fuzzy Hash: 04119079904680DFCB12CF10D5C4B19BB61FB84314F38C6A9D8494B756C33AD85ACB62
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Non-executed Functions

                                                  Memory Dump Source
                                                  • Source File: 00000002.00000002.14813675053.003C0000.00000040.00000001.sdmp, Offset: 003C0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_2_2_3c0000_systemupdate_ProtectedAUS.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 11310b5191507a27e53b0d685f6d85d78165068b4ead5f732246794e0d638c21
                                                  • Instruction ID: a8b4280e0dc6d6cf532c43352e426d627125376715668dbafc1d8233f3ac7bcc
                                                  • Opcode Fuzzy Hash: 11310b5191507a27e53b0d685f6d85d78165068b4ead5f732246794e0d638c21
                                                  • Instruction Fuzzy Hash: 7CA14A74E006098FDF15CFA9C981BAEBBF2AF88314F14812DD415EB254EB74AC85CB91
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Execution Graph

                                                  Execution Coverage:4.4%
                                                  Dynamic/Decrypted Code Coverage:11.8%
                                                  Signature Coverage:6.2%
                                                  Total number of Nodes:2000
                                                  Total number of Limit Nodes:188

                                                  Graph

                                                  execution_graph 43287 441a17 43288 441a23 ___FrameUnwindToState 43287->43288 43322 443c67 GetProcessHeap 43288->43322 43290 441a78 43291 441a83 43290->43291 43463 441b6b 68 API calls 3 library calls 43290->43463 43323 443937 43291->43323 43294 441a89 43295 441a94 __RTC_Initialize 43294->43295 43464 441b6b 68 API calls 3 library calls 43294->43464 43344 444a55 43295->43344 43298 441aa3 43299 441aaf GetCommandLineA 43298->43299 43465 441b6b 68 API calls 3 library calls 43298->43465 43363 448fc1 GetEnvironmentStringsW 43299->43363 43302 441aae 43302->43299 43306 441ad4 43389 448df9 43306->43389 43309 441ada 43310 441ae5 43309->43310 43467 440bf8 68 API calls 3 library calls 43309->43467 43405 440c32 43310->43405 43313 441aed 43314 441af8 43313->43314 43468 440bf8 68 API calls 3 library calls 43313->43468 43411 404399 43314->43411 43317 441b15 43318 441b27 43317->43318 43460 440e8e 43317->43460 43469 440c23 68 API calls _doexit 43318->43469 43321 441b2c ___FrameUnwindToState 43322->43290 43470 440cd7 RtlEncodePointer 43323->43470 43325 44393c 43475 4474de InitializeCriticalSectionAndSpinCount 43325->43475 43327 443941 43328 443945 43327->43328 43477 446d4e TlsAlloc 43327->43477 43476 4439ad 71 API calls 2 library calls 43328->43476 43331 44394a 43331->43294 43332 443957 43332->43328 43333 443962 43332->43333 43478 44781b 43333->43478 43335 44396f 43336 4439a4 43335->43336 43484 446daa TlsSetValue 43335->43484 43486 4439ad 71 API calls 2 library calls 43336->43486 43339 443983 43339->43336 43341 443989 43339->43341 43340 4439a9 43340->43294 43485 443884 68 API calls 4 library calls 43341->43485 43343 443991 GetCurrentThreadId 43343->43294 43345 444a61 ___FrameUnwindToState 43344->43345 43498 4473af 43345->43498 43347 444a68 43348 44781b __calloc_crt 68 API calls 43347->43348 43350 444a79 43348->43350 43349 444ae4 GetStartupInfoW 43357 444c22 43349->43357 43360 444af9 43349->43360 43350->43349 43351 444a84 ___FrameUnwindToState @_EH4_CallFilterFunc@8 43350->43351 43351->43298 43352 444ce6 43505 444cfa RtlLeaveCriticalSection _doexit 43352->43505 43354 444c6b GetStdHandle 43354->43357 43355 44781b __calloc_crt 68 API calls 43355->43360 43356 444c7d GetFileType 43356->43357 43357->43352 43357->43354 43357->43356 43359 444caa InitializeCriticalSectionAndSpinCount 43357->43359 43358 444b47 43358->43357 43361 444b87 InitializeCriticalSectionAndSpinCount 43358->43361 43362 444b79 GetFileType 43358->43362 43359->43357 43360->43355 43360->43357 43360->43358 43361->43358 43362->43358 43362->43361 43364 448fd4 WideCharToMultiByte 43363->43364 43365 441abf 43363->43365 43367 449007 43364->43367 43368 44903e FreeEnvironmentStringsW 43364->43368 43376 448bcc 43365->43376 43543 447865 68 API calls _malloc 43367->43543 43368->43365 43370 44900d 43370->43368 43371 449014 WideCharToMultiByte 43370->43371 43372 449033 FreeEnvironmentStringsW 43371->43372 43373 44902a 43371->43373 43372->43365 43544 43ee47 68 API calls 2 library calls 43373->43544 43375 449030 43375->43372 43377 448bdf GetModuleFileNameA 43376->43377 43378 448bda 43376->43378 43380 448c0c 43377->43380 43551 442f14 94 API calls __setmbcp 43378->43551 43545 448c7d 43380->43545 43383 441ac9 43383->43306 43466 440bf8 68 API calls 3 library calls 43383->43466 43384 448c3f 43552 447865 68 API calls _malloc 43384->43552 43386 448c45 43386->43383 43387 448c7d _parse_cmdline 78 API calls 43386->43387 43388 448c5f 43387->43388 43388->43383 43390 448e02 43389->43390 43392 448e07 _strlen 43389->43392 43555 442f14 94 API calls __setmbcp 43390->43555 43393 44781b __calloc_crt 68 API calls 43392->43393 43396 448e15 43392->43396 43401 448e3d _strlen 43393->43401 43394 448e8f 43565 43ee47 68 API calls 2 library calls 43394->43565 43396->43309 43397 44781b __calloc_crt 68 API calls 43397->43401 43398 448eb6 43566 43ee47 68 API calls 2 library calls 43398->43566 43401->43394 43401->43396 43401->43397 43401->43398 43402 448ecd 43401->43402 43556 43eab4 43401->43556 43567 441e40 8 API calls 2 library calls 43402->43567 43404 448ed9 43404->43309 43406 440c3e __IsNonwritableInCurrentImage 43405->43406 43571 44794a 43406->43571 43408 440c5c __initterm_e 43410 440c7d __IsNonwritableInCurrentImage 43408->43410 43574 447806 43408->43574 43410->43313 43613 4015c5 GetStdHandle GetConsoleScreenBufferInfo 43411->43613 43414 40441a 43417 404422 CloseHandle 43414->43417 43418 40442e 43414->43418 43415 4043ec LookupPrivilegeValueA 43415->43414 43416 404403 AdjustTokenPrivileges 43415->43416 43416->43414 43417->43418 43419 404434 43418->43419 43420 404467 43418->43420 43617 4042a3 43419->43617 43421 404477 43420->43421 43422 40446d 43420->43422 43425 404492 43421->43425 43426 40447d 43421->43426 43650 401619 109 API calls _wprintf 43422->43650 43652 43ec53 85 API calls 2 library calls 43425->43652 43651 401619 109 API calls _wprintf 43426->43651 43427 40443b 43649 401601 GetStdHandle SetConsoleTextAttribute 43427->43649 43431 404443 GetEnvironmentVariableA 43437 404462 43431->43437 43438 404472 43431->43438 43432 40449f 43434 4044f2 43432->43434 43435 4044a5 43432->43435 43654 401619 109 API calls _wprintf 43434->43654 43436 43eab4 _$I10_OUTPUT 68 API calls 43435->43436 43441 4044b9 43436->43441 43663 401601 GetStdHandle SetConsoleTextAttribute 43437->43663 43667 401601 GetStdHandle SetConsoleTextAttribute 43438->43667 43439 40453a 43443 440e8e 68 API calls 43439->43443 43450 4044d3 43441->43450 43451 4044e5 43441->43451 43445 404540 43443->43445 43444 404517 43664 43fc61 105 API calls 7 library calls 43444->43664 43445->43317 43447 4044fe 43656 43e722 43447->43656 43653 401619 109 API calls _wprintf 43450->43653 43456 4042a3 328 API calls 43451->43456 43452 404521 43665 43fc61 105 API calls 7 library calls 43452->43665 43453 40450d 43453->43317 43457 4044d8 43456->43457 43655 401601 GetStdHandle SetConsoleTextAttribute 43457->43655 43458 40452d 43666 440936 72 API calls 3 library calls 43458->43666 45296 440d5f 43460->45296 43462 440e9d 43462->43318 43463->43291 43464->43295 43465->43302 43469->43321 43471 440ce8 __init_pointers __initp_misc_winsig 43470->43471 43487 4479e8 RtlEncodePointer 43471->43487 43473 440d06 30 API calls 43473->43325 43475->43327 43476->43331 43477->43332 43480 447822 43478->43480 43481 44785f 43480->43481 43482 447840 Sleep 43480->43482 43488 44d235 43480->43488 43481->43335 43483 447857 43482->43483 43483->43480 43483->43481 43484->43339 43485->43343 43486->43340 43487->43473 43489 44d240 43488->43489 43492 44d25b 43488->43492 43490 44d24c 43489->43490 43489->43492 43496 442b74 68 API calls __getptd_noexit 43490->43496 43493 44d26b RtlAllocateHeap 43492->43493 43494 44d251 43492->43494 43497 443a1c RtlDecodePointer 43492->43497 43493->43492 43493->43494 43494->43480 43496->43494 43497->43492 43499 4473c0 43498->43499 43500 4473d3 RtlEnterCriticalSection 43498->43500 43506 447437 43499->43506 43500->43347 43502 4473c6 43502->43500 43530 440bf8 68 API calls 3 library calls 43502->43530 43505->43351 43507 447443 ___FrameUnwindToState 43506->43507 43508 447464 43507->43508 43509 44744c 43507->43509 43515 4474cc ___FrameUnwindToState 43508->43515 43524 447462 43508->43524 43531 443a4f 68 API calls __NMSG_WRITE 43509->43531 43512 447451 43532 443aac 68 API calls 6 library calls 43512->43532 43513 447478 43516 44748e 43513->43516 43517 44747f 43513->43517 43515->43502 43520 4473af __lock 67 API calls 43516->43520 43537 442b74 68 API calls __getptd_noexit 43517->43537 43518 447458 43533 440be2 43518->43533 43523 447495 43520->43523 43522 447484 43522->43515 43525 4474a4 InitializeCriticalSectionAndSpinCount 43523->43525 43526 4474b9 43523->43526 43524->43508 43536 447865 68 API calls _malloc 43524->43536 43527 4474bf 43525->43527 43538 43ee47 68 API calls 2 library calls 43526->43538 43539 4474d5 RtlLeaveCriticalSection _doexit 43527->43539 43531->43512 43532->43518 43540 440bb0 GetModuleHandleExW 43533->43540 43536->43513 43537->43522 43538->43527 43539->43515 43541 440bdb ExitProcess 43540->43541 43542 440bc9 74ECFFF6 43540->43542 43542->43541 43543->43370 43544->43375 43547 448c9f 43545->43547 43549 448d03 43547->43549 43553 44d4d7 78 API calls x_ismbbtype_l 43547->43553 43548 448c22 43548->43383 43548->43384 43549->43548 43554 44d4d7 78 API calls x_ismbbtype_l 43549->43554 43551->43377 43552->43386 43553->43547 43554->43549 43555->43392 43557 43eacd 43556->43557 43558 43eabf 43556->43558 43568 442b74 68 API calls __getptd_noexit 43557->43568 43558->43557 43561 43eae3 43558->43561 43562 43eade 43561->43562 43570 442b74 68 API calls __getptd_noexit 43561->43570 43562->43401 43564 43ead4 43569 441e30 9 API calls _memcpy_s 43564->43569 43565->43396 43566->43396 43567->43404 43568->43564 43569->43562 43570->43564 43572 44794d RtlEncodePointer 43571->43572 43572->43572 43573 447967 43572->43573 43573->43408 43577 447710 43574->43577 43576 447811 43576->43410 43578 44771c ___FrameUnwindToState 43577->43578 43585 440d4d 43578->43585 43584 44773f ___FrameUnwindToState 43584->43576 43586 4473af __lock 68 API calls 43585->43586 43587 440d54 43586->43587 43588 447750 RtlDecodePointer RtlDecodePointer 43587->43588 43589 44777d 43588->43589 43590 44772d 43588->43590 43589->43590 43602 44d19b 43589->43602 43601 44774a RtlLeaveCriticalSection __cinit 43590->43601 43592 44778f 43593 4477e0 RtlEncodePointer RtlEncodePointer 43592->43593 43594 4477ad 43592->43594 43595 4477ba 43592->43595 43593->43590 43609 4478ae 72 API calls __realloc_crt 43594->43609 43595->43590 43596 4477b4 43595->43596 43596->43595 43600 4477ce RtlEncodePointer 43596->43600 43610 4478ae 72 API calls __realloc_crt 43596->43610 43599 4477c8 43599->43590 43599->43600 43600->43593 43601->43584 43603 44d1a4 43602->43603 43604 44d1b9 RtlSizeHeap 43602->43604 43611 442b74 68 API calls __getptd_noexit 43603->43611 43604->43592 43606 44d1a9 43612 441e30 9 API calls _memcpy_s 43606->43612 43608 44d1b4 43608->43592 43609->43596 43610->43599 43611->43606 43612->43608 43614 4015ec 43613->43614 43615 43e722 __atodbl_l 6 API calls 43614->43615 43616 4015ff GetCurrentProcess OpenProcessToken 43615->43616 43616->43414 43616->43415 43618 404308 43617->43618 43619 4042aa 43617->43619 43758 4016e2 109 API calls _wprintf 43618->43758 43668 43f970 43619->43668 43628 4042f8 43628->43427 43630 4042d6 43756 43f2c0 100 API calls 7 library calls 43630->43756 43633 4042f6 43678 4041a8 43633->43678 43634 4042e6 43757 43f2c0 100 API calls 7 library calls 43634->43757 43638 404349 43719 43ff7c 43638->43719 43639 40437e 43759 401601 GetStdHandle SetConsoleTextAttribute 43639->43759 43642 404386 43760 43fc61 105 API calls 7 library calls 43642->43760 43643 404359 43645 43ff7c _fprintf 105 API calls 43643->43645 43646 40436e 43645->43646 43742 4408bf 43646->43742 43648 404379 43648->43427 43649->43431 43652->43432 43655->43447 43657 43e72a 43656->43657 43658 43e72c IsProcessorFeaturePresent 43656->43658 43657->43453 43660 4400fd 43658->43660 45295 4400ac 5 API calls 2 library calls 43660->45295 43662 4401e0 43662->43453 43663->43444 43664->43452 43665->43458 43666->43438 43667->43439 43669 43f97b 43668->43669 43670 43f98e 43668->43670 43780 442b74 68 API calls __getptd_noexit 43669->43780 43761 43f8ac 43670->43761 43673 43f99e 43675 4042ba 43673->43675 43782 442b74 68 API calls __getptd_noexit 43673->43782 43674 43f980 43781 441e30 9 API calls _memcpy_s 43674->43781 43675->43628 43755 43f2c0 100 API calls 7 library calls 43675->43755 44052 401230 43678->44052 43680 4041c8 _memset 43681 4041df GetVersionExA 43680->43681 43682 404215 43681->43682 43683 40421a 43681->43683 44308 4040b8 10 API calls 43682->44308 44066 402c57 43683->44066 43687 402c57 151 API calls 43688 40422a 43687->43688 43689 402c57 151 API calls 43688->43689 43690 404232 43689->43690 43691 402c57 151 API calls 43690->43691 43692 40423a 43691->43692 43693 402c57 151 API calls 43692->43693 43694 404242 43693->43694 44124 4035af 43694->44124 43697 4035af 221 API calls 43698 404252 43697->43698 43699 404262 43698->43699 43700 40425b 43698->43700 44145 4023a8 43699->44145 44309 40173d 123 API calls 8 library calls 43700->44309 43703 404260 43705 404271 43703->43705 44202 4028d1 43705->44202 43715 404290 43717 43e722 __atodbl_l 6 API calls 43715->43717 43716 404289 FreeLibrary 43716->43715 43718 40429f 43717->43718 43718->43638 43718->43639 43720 43ff88 ___FrameUnwindToState 43719->43720 43721 43ff9b 43720->43721 43723 43ffbf 43720->43723 45224 442b74 68 API calls __getptd_noexit 43721->45224 43725 444492 __lock_file 69 API calls 43723->43725 43724 43ffa0 45225 441e30 9 API calls _memcpy_s 43724->45225 43727 43ffc8 43725->43727 43728 44003d 43727->43728 43729 4443ce __flush 68 API calls 43727->43729 43730 440069 43728->43730 45228 444f1c 68 API calls 3 library calls 43728->45228 43737 43ffd8 43729->43737 45231 440086 RtlLeaveCriticalSection RtlLeaveCriticalSection __fsopen 43730->45231 43733 43ffab ___FrameUnwindToState 43733->43643 43734 44004d 45229 441fb8 103 API calls 13 library calls 43734->45229 43736 44005d 45230 444eeb 98 API calls __flush 43736->45230 43737->43728 45226 442b74 68 API calls __getptd_noexit 43737->45226 43740 440032 45227 441e30 9 API calls _memcpy_s 43740->45227 43743 4408cb ___FrameUnwindToState 43742->43743 43744 4408f7 43743->43744 43745 4408df 43743->43745 43748 444492 __lock_file 69 API calls 43744->43748 43751 4408ef ___FrameUnwindToState 43744->43751 45248 442b74 68 API calls __getptd_noexit 43745->45248 43747 4408e4 45249 441e30 9 API calls _memcpy_s 43747->45249 43750 440909 43748->43750 45232 440853 43750->45232 43751->43648 43755->43630 43756->43634 43757->43633 43759->43642 43760->43628 43762 43f8b8 ___FrameUnwindToState 43761->43762 43763 43f8ca 43762->43763 43766 43f8f7 43762->43766 43814 442b74 68 API calls __getptd_noexit 43763->43814 43765 43f8cf 43815 441e30 9 API calls _memcpy_s 43765->43815 43783 445010 43766->43783 43769 43f8fc 43770 43f912 43769->43770 43771 43f905 43769->43771 43773 43f93b 43770->43773 43774 43f91b 43770->43774 43816 442b74 68 API calls __getptd_noexit 43771->43816 43797 445128 43773->43797 43817 442b74 68 API calls __getptd_noexit 43774->43817 43776 43f8da ___FrameUnwindToState @_EH4_CallFilterFunc@8 43776->43673 43780->43674 43781->43675 43782->43675 43784 44501c ___FrameUnwindToState 43783->43784 43785 4473af __lock 68 API calls 43784->43785 43787 44502a 43785->43787 43786 4450a1 43824 447865 68 API calls _malloc 43786->43824 43787->43786 43794 447437 __mtinitlocknum 68 API calls 43787->43794 43795 44509a 43787->43795 43822 4444d1 69 API calls __lock 43787->43822 43823 44453b RtlLeaveCriticalSection RtlLeaveCriticalSection _doexit 43787->43823 43790 445114 ___FrameUnwindToState 43790->43769 43791 4450a8 43792 4450b7 InitializeCriticalSectionAndSpinCount RtlEnterCriticalSection 43791->43792 43791->43795 43792->43795 43794->43787 43819 44511f 43795->43819 43806 445145 43797->43806 43798 445159 43829 442b74 68 API calls __getptd_noexit 43798->43829 43799 445300 43799->43798 43803 44535c 43799->43803 43801 44515e 43830 441e30 9 API calls _memcpy_s 43801->43830 43826 44cb22 43803->43826 43804 43f946 43818 43f968 RtlLeaveCriticalSection RtlLeaveCriticalSection __fsopen 43804->43818 43806->43798 43806->43799 43831 44cb40 78 API calls __mbsnbcmp_l 43806->43831 43808 4452c6 43808->43798 43832 44cc6d 85 API calls __mbsnbicmp_l 43808->43832 43810 4452f9 43810->43799 43833 44cc6d 85 API calls __mbsnbicmp_l 43810->43833 43812 445318 43812->43799 43834 44cc6d 85 API calls __mbsnbicmp_l 43812->43834 43814->43765 43815->43776 43816->43776 43817->43776 43818->43776 43825 447513 RtlLeaveCriticalSection 43819->43825 43821 445126 43821->43790 43822->43787 43823->43787 43824->43791 43825->43821 43835 44ca0f 43826->43835 43828 44cb3b 43828->43804 43829->43801 43830->43804 43831->43808 43832->43810 43833->43812 43834->43799 43838 44ca1b ___FrameUnwindToState 43835->43838 43836 44ca2d 43854 442b74 68 API calls __getptd_noexit 43836->43854 43838->43836 43839 44ca64 43838->43839 43846 44cad6 43839->43846 43840 44ca32 43855 441e30 9 API calls _memcpy_s 43840->43855 43843 44ca81 43856 44caaa RtlLeaveCriticalSection __unlock_fhandle 43843->43856 43845 44ca3c ___FrameUnwindToState 43845->43828 43857 440b00 43846->43857 43849 44caf0 43849->43843 43851 44cb10 43952 43ee47 68 API calls 2 library calls 43851->43952 43853 44cb1a 43853->43843 43854->43840 43855->43845 43856->43845 43858 440b23 43857->43858 43859 440b0d 43857->43859 43858->43859 43861 440b2a ___crtMessageBoxW 43858->43861 43953 442b74 68 API calls __getptd_noexit 43859->43953 43864 440b40 MultiByteToWideChar 43861->43864 43865 440b33 AreFileApisANSI 43861->43865 43862 440b12 43954 441e30 9 API calls _memcpy_s 43862->43954 43867 440b5a GetLastError 43864->43867 43868 440b6b 43864->43868 43865->43864 43866 440b3d 43865->43866 43866->43864 43955 442b53 68 API calls 3 library calls 43867->43955 43956 447865 68 API calls _malloc 43868->43956 43871 440b73 43872 440b1c 43871->43872 43873 440b7a MultiByteToWideChar 43871->43873 43872->43849 43879 44d57e 43872->43879 43874 440b90 GetLastError 43873->43874 43875 440ba3 43873->43875 43957 442b53 68 API calls 3 library calls 43874->43957 43875->43872 43877 440b9c 43958 43ee47 68 API calls 2 library calls 43877->43958 43880 44d59e 43879->43880 43959 44e012 43880->43959 43883 44d5ba 43886 44d5f4 43883->43886 43892 44d617 43883->43892 43951 44d6f1 43883->43951 43884 44dcce 43885 44dce5 43884->43885 43887 44dcde CloseHandle 43884->43887 43885->43851 43991 442b40 68 API calls __getptd_noexit 43886->43991 43887->43885 43889 44d5f9 43992 442b74 68 API calls __getptd_noexit 43889->43992 43891 44d606 43993 441e30 9 API calls _memcpy_s 43891->43993 43893 44d6d5 43892->43893 43901 44d6b3 43892->43901 43994 442b40 68 API calls __getptd_noexit 43893->43994 43896 44d610 43896->43851 43897 44d6da 43995 442b74 68 API calls __getptd_noexit 43897->43995 43899 44d6e7 43996 441e30 9 API calls _memcpy_s 43899->43996 43966 44c5ef 43901->43966 43903 44d781 43904 44d7ac 43903->43904 43905 44d78b 43903->43905 43984 44d4ed 43904->43984 43997 442b40 68 API calls __getptd_noexit 43905->43997 43908 44d790 43998 442b74 68 API calls __getptd_noexit 43908->43998 43910 44d84c GetFileType 43912 44d857 GetLastError 43910->43912 43913 44d899 43910->43913 43911 44d79a 43999 442b74 68 API calls __getptd_noexit 43911->43999 44002 442b53 68 API calls 3 library calls 43912->44002 44004 44c881 69 API calls 2 library calls 43913->44004 43914 44d81a GetLastError 44000 442b53 68 API calls 3 library calls 43914->44000 43919 44d83f 44001 442b74 68 API calls __getptd_noexit 43919->44001 43920 44d87e CloseHandle 43920->43919 43924 44d88c 43920->43924 43921 44d4ed ___createFile 3 API calls 43922 44d80f 43921->43922 43922->43910 43922->43914 44003 442b74 68 API calls __getptd_noexit 43924->44003 43927 44d891 43927->43919 43928 44d8b7 43929 44da72 43928->43929 43947 44d938 43928->43947 44005 44717e 70 API calls 3 library calls 43928->44005 43931 44dc45 CloseHandle 43929->43931 43929->43951 43933 44d4ed ___createFile 3 API calls 43931->43933 43932 44d921 43932->43947 44006 442b40 68 API calls __getptd_noexit 43932->44006 43934 44dc6c 43933->43934 43936 44dc74 GetLastError 43934->43936 43937 44dca0 43934->43937 44049 442b53 68 API calls 3 library calls 43936->44049 43937->43951 43939 44dc80 44050 44c794 69 API calls 2 library calls 43939->44050 43940 446488 80 API calls __filbuf 43940->43947 43945 44daef 43946 4472e5 __close_nolock 71 API calls 43945->43946 43948 44daf6 43946->43948 43947->43929 43947->43940 43947->43945 43950 44717e 70 API calls __lseeki64_nolock 43947->43950 44007 4472e5 43947->44007 44022 44de5e 101 API calls 4 library calls 43947->44022 44024 4490a0 43947->44024 44023 442b74 68 API calls __getptd_noexit 43948->44023 43950->43947 44051 441e40 8 API calls 2 library calls 43951->44051 43952->43853 43953->43862 43954->43872 43955->43872 43956->43871 43957->43877 43958->43875 43960 44e031 43959->43960 43961 44e01c 43959->43961 43960->43883 43962 442b74 _memcpy_s 68 API calls 43961->43962 43963 44e021 43962->43963 43964 441e30 _memcpy_s 9 API calls 43963->43964 43965 44e02c 43964->43965 43965->43883 43967 44c5fb ___FrameUnwindToState 43966->43967 43968 447437 __mtinitlocknum 68 API calls 43967->43968 43969 44c60c 43968->43969 43970 4473af __lock 68 API calls 43969->43970 43971 44c611 ___FrameUnwindToState 43969->43971 43977 44c61f 43970->43977 43971->43903 43972 44c6fb 43974 44781b __calloc_crt 68 API calls 43972->43974 43973 44c78b __wsopen_helper RtlLeaveCriticalSection 43973->43971 43978 44c704 43974->43978 43975 4473af __lock 68 API calls 43975->43977 43976 44c69b RtlEnterCriticalSection 43976->43977 43979 44c6ab RtlLeaveCriticalSection 43976->43979 43977->43972 43977->43975 43977->43976 43980 44c679 InitializeCriticalSectionAndSpinCount 43977->43980 43982 44c6c3 __wsopen_helper RtlLeaveCriticalSection 43977->43982 43983 44c769 43977->43983 43981 44c563 ___lock_fhandle 70 API calls 43978->43981 43978->43983 43979->43977 43980->43977 43981->43983 43982->43977 43983->43973 43985 44d4f9 ___crtMessageBoxW 43984->43985 43986 44d4fd GetModuleHandleW 74ECFFF6 43985->43986 43988 44d51f ___crtMessageBoxW 43985->43988 43987 44d51a 43986->43987 43986->43988 43990 44d52e 43987->43990 43989 44d560 CreateFileW 43988->43989 43988->43990 43989->43990 43990->43910 43990->43914 43990->43921 43991->43889 43992->43891 43993->43896 43994->43897 43995->43899 43996->43951 43997->43908 43998->43911 43999->43896 44000->43919 44001->43951 44002->43920 44003->43927 44004->43928 44005->43932 44006->43947 44008 44c81a __chsize_nolock 68 API calls 44007->44008 44010 4472f3 44008->44010 44009 447349 44011 44c794 __free_osfhnd 69 API calls 44009->44011 44010->44009 44013 44c81a __chsize_nolock 68 API calls 44010->44013 44021 447327 44010->44021 44012 447351 44011->44012 44017 442b53 __dosmaperr 68 API calls 44012->44017 44018 447373 44012->44018 44015 44731e 44013->44015 44014 44c81a __chsize_nolock 68 API calls 44016 447333 CloseHandle 44014->44016 44019 44c81a __chsize_nolock 68 API calls 44015->44019 44016->44009 44020 44733f GetLastError 44016->44020 44017->44018 44018->43947 44019->44021 44020->44009 44021->44009 44021->44014 44022->43947 44023->43951 44025 4490ac ___FrameUnwindToState 44024->44025 44026 4490b4 44025->44026 44027 4490cc 44025->44027 44028 442b40 __chsize_nolock 68 API calls 44026->44028 44029 449161 44027->44029 44033 4490fe 44027->44033 44030 4490b9 44028->44030 44031 442b40 __chsize_nolock 68 API calls 44029->44031 44032 442b74 _memcpy_s 68 API calls 44030->44032 44034 449166 44031->44034 44037 4490c1 ___FrameUnwindToState 44032->44037 44035 44c563 ___lock_fhandle 70 API calls 44033->44035 44036 442b74 _memcpy_s 68 API calls 44034->44036 44038 449104 44035->44038 44039 44916e 44036->44039 44037->43947 44040 449117 44038->44040 44041 44912a 44038->44041 44042 441e30 _memcpy_s 9 API calls 44039->44042 44043 449182 __chsize_nolock 95 API calls 44040->44043 44044 442b74 _memcpy_s 68 API calls 44041->44044 44042->44037 44045 449123 44043->44045 44046 44912f 44044->44046 44048 449159 __flush RtlLeaveCriticalSection 44045->44048 44047 442b40 __chsize_nolock 68 API calls 44046->44047 44047->44045 44048->44037 44049->43939 44050->43937 44051->43884 44053 43eab4 _$I10_OUTPUT 68 API calls 44052->44053 44054 40125d RegOpenKeyExA 44053->44054 44055 401286 RegQueryValueExA 44054->44055 44056 401319 44054->44056 44057 4012b8 RegQueryValueExA 44055->44057 44058 4012ea 44055->44058 44059 43e722 __atodbl_l 6 API calls 44056->44059 44057->44058 44061 40130d RegCloseKey 44057->44061 44310 43ea97 81 API calls __wcstoi64 44058->44310 44060 401327 44059->44060 44060->43680 44061->44056 44063 4012f6 44064 43eab4 _$I10_OUTPUT 68 API calls 44063->44064 44065 40130a 44064->44065 44065->44061 44067 402c64 _memset __ftell_nolock 44066->44067 44068 43eab4 _$I10_OUTPUT 68 API calls 44067->44068 44069 402d16 SHGetFolderPathA 44068->44069 44070 402d35 44069->44070 44071 40300e 44069->44071 44311 43eb09 44070->44311 44072 43e722 __atodbl_l 6 API calls 44071->44072 44075 40301b 44072->44075 44075->43687 44076 403008 GetLastError 44076->44071 44077 402d69 44077->44076 44078 402d71 44077->44078 44079 43eab4 _$I10_OUTPUT 68 API calls 44078->44079 44080 402d85 44079->44080 44081 402da4 44080->44081 44082 402dbd 44080->44082 44083 43eb09 68 API calls 44081->44083 44084 43eb09 68 API calls 44082->44084 44085 402db8 GetFileAttributesA 44083->44085 44086 402dcf 44084->44086 44089 402df4 44085->44089 44088 43eb09 68 API calls 44086->44088 44088->44085 44090 402e89 GetTempPathA 44089->44090 44091 43eab4 _$I10_OUTPUT 68 API calls 44089->44091 44092 43eb09 68 API calls 44090->44092 44093 402e10 44091->44093 44094 402eb0 CopyFileA 44092->44094 44095 43eab4 _$I10_OUTPUT 68 API calls 44093->44095 44096 402edc 44094->44096 44097 402ece GetLastError 44094->44097 44098 402e28 44095->44098 44320 43e066 44096->44320 44097->44096 44100 402e60 44098->44100 44101 402e47 44098->44101 44103 43eb09 68 API calls 44100->44103 44102 43eb09 68 API calls 44101->44102 44104 402e5b 44102->44104 44105 402e72 44103->44105 44104->44090 44107 43eb09 68 API calls 44105->44107 44107->44104 44109 402f27 44109->44071 44370 418e40 44109->44370 44111 402fe1 44385 418878 44111->44385 44113 4192f5 68 API calls 44122 402f49 44113->44122 44114 402fec 44391 43d5b9 44114->44391 44116 43eab4 _$I10_OUTPUT 68 API calls 44116->44122 44117 402ff7 DeleteFileA 44117->44071 44122->44111 44122->44113 44122->44116 44123 418e40 112 API calls 44122->44123 44404 4191ff 68 API calls 44122->44404 44405 419224 68 API calls 44122->44405 44406 402884 CryptUnprotectData GetLastError _memcpy_s 44122->44406 44407 403f04 107 API calls 4 library calls 44122->44407 44123->44122 44821 4046e6 44124->44821 44127 4035c6 GetFileAttributesA 44128 4035d5 44127->44128 44142 40361e 44127->44142 44128->44142 44860 40454e 44128->44860 44131 4035e6 GetFileAttributesA 44132 4035ee 44131->44132 44131->44142 44132->44142 44879 405bc5 44132->44879 44134 4035f9 44135 4035fd SetDllDirectoryA 44134->44135 44134->44142 44136 403614 44135->44136 44137 403625 SetDllDirectoryA 44136->44137 44138 403619 44136->44138 44143 403638 44137->44143 44941 4053f5 44138->44941 44140 40366a 44141 4053f5 FreeLibrary 44140->44141 44141->44142 44142->43697 44143->44140 44890 405778 44143->44890 44146 4023b5 __ftell_nolock 44145->44146 44147 4023dd CredEnumerateA 44146->44147 44148 4025b4 GetLastError 44147->44148 44149 40240e ___from_strstr_to_strchr _strstr 44147->44149 44151 4025ba 44148->44151 44150 4025a6 AuditFree 44149->44150 44155 40244e CryptUnprotectData 44149->44155 44157 43e86b 98 API calls swprintf 44149->44157 44158 43eab4 68 API calls _$I10_OUTPUT 44149->44158 45177 43ed2d 85 API calls 2 library calls 44149->45177 45178 403f04 107 API calls 4 library calls 44149->45178 44150->44151 44152 43e722 __atodbl_l 6 API calls 44151->44152 44153 4025c7 44152->44153 44160 401f3d 44153->44160 44155->44149 44156 402593 GetLastError 44155->44156 44156->44149 44157->44149 44158->44149 45179 4471f0 44160->45179 44163 402393 44165 43e722 __atodbl_l 6 API calls 44163->44165 44164 401f9c RegEnumValueA 44166 402049 RegCloseKey 44164->44166 44171 401fce 44164->44171 44167 4023a0 44165->44167 44166->44163 44176 40205e 44166->44176 44190 4025c9 44167->44190 44168 402043 44168->44166 44170 402010 RegEnumValueA 44170->44168 44170->44171 44171->44168 44171->44170 44172 43eab4 _$I10_OUTPUT 68 API calls 44171->44172 44172->44171 44173 4020d3 CoInitialize CLSIDFromString CLSIDFromString CoCreateInstance 44174 40238d CoUninitialize 44173->44174 44187 402153 _wcschr 44173->44187 44174->44163 44176->44173 45181 401329 106 API calls 3 library calls 44176->45181 45182 43ec53 85 API calls 2 library calls 44176->45182 45183 401cea 116 API calls 2 library calls 44176->45183 44177 402375 44177->44174 44181 4023a2 45187 4401e2 6 API calls ___report_securityfailure 44181->45187 44182 43f056 80 API calls __wcsnicmp 44182->44187 44184 4023a7 44186 401329 106 API calls 44186->44187 44187->44177 44187->44181 44187->44182 44187->44186 44188 43ec53 85 API calls 44187->44188 44189 401cea 116 API calls 44187->44189 45184 4407f7 68 API calls _memcpy_s 44187->45184 45185 43f865 79 API calls __strlwr_s_l 44187->45185 45186 44067d 68 API calls _memcpy_s 44187->45186 44188->44187 44189->44187 44191 402875 44190->44191 44200 402603 _strstr 44190->44200 44192 43e722 __atodbl_l 6 API calls 44191->44192 44193 402882 44192->44193 44193->43705 44194 40283b 44194->44191 45190 43fc61 105 API calls 7 library calls 44194->45190 44196 4026ab WideCharToMultiByte 44196->44200 44198 402706 WideCharToMultiByte WideCharToMultiByte 44198->44200 44199 40278e WideCharToMultiByte 44199->44200 44200->44194 44200->44196 44200->44198 44200->44199 45188 43f00f 82 API calls __strlwr_s_l 44200->45188 45189 403f04 107 API calls 4 library calls 44200->45189 44203 4028de _memset __ftell_nolock 44202->44203 44204 402929 SHGetFolderPathA 44203->44204 44205 402973 44204->44205 44206 402c48 44204->44206 44207 43eb09 68 API calls 44205->44207 44208 43e722 __atodbl_l 6 API calls 44206->44208 44209 402989 GetFileAttributesA 44207->44209 44210 402c55 44208->44210 44211 402c42 GetLastError 44209->44211 44212 4029a4 44209->44212 44259 40344f 44210->44259 44211->44206 44212->44211 44213 4029ac 44212->44213 44214 43eab4 _$I10_OUTPUT 68 API calls 44213->44214 44215 4029c0 44214->44215 44216 4029f8 44215->44216 44217 4029df 44215->44217 44219 43eb09 68 API calls 44216->44219 44218 43eb09 68 API calls 44217->44218 44220 4029f3 GetFileAttributesA 44218->44220 44221 402a0a 44219->44221 44224 402a2f 44220->44224 44223 43eb09 68 API calls 44221->44223 44223->44220 44225 402ac4 GetTempPathA 44224->44225 44226 43eab4 _$I10_OUTPUT 68 API calls 44224->44226 44227 43eb09 68 API calls 44225->44227 44228 402a4b 44226->44228 44229 402aeb 44227->44229 44230 43eab4 _$I10_OUTPUT 68 API calls 44228->44230 44232 402b15 44229->44232 44233 402b07 GetLastError 44229->44233 44231 402a63 44230->44231 44234 402a82 44231->44234 44235 402a9b 44231->44235 44236 43e066 99 API calls 44232->44236 44233->44232 44237 43eb09 68 API calls 44234->44237 44238 43eb09 68 API calls 44235->44238 44242 402b29 44236->44242 44239 402a96 44237->44239 44240 402aad 44238->44240 44239->44225 44241 43eb09 68 API calls 44240->44241 44241->44239 44242->44206 44243 42f9e8 112 API calls 44242->44243 44244 402b60 44243->44244 44244->44206 44245 418e40 112 API calls 44244->44245 44256 402b82 44245->44256 44246 402c1b 44247 418878 82 API calls 44246->44247 44249 402c26 44247->44249 44248 4192f5 68 API calls 44248->44256 44250 43d5b9 82 API calls 44249->44250 44252 402c31 44250->44252 44251 43eab4 _$I10_OUTPUT 68 API calls 44251->44256 44252->44206 44256->44246 44256->44248 44256->44251 44258 418e40 112 API calls 44256->44258 45191 4191ff 68 API calls 44256->45191 45192 419224 68 API calls 44256->45192 45193 402884 CryptUnprotectData GetLastError _memcpy_s 44256->45193 45194 403f04 107 API calls 4 library calls 44256->45194 44258->44256 45195 4462f0 44259->45195 44262 4034c2 44263 43eab4 _$I10_OUTPUT 68 API calls 44262->44263 44265 4034da 44263->44265 44264 43e722 __atodbl_l 6 API calls 44266 4035ab 44264->44266 44267 43eb09 68 API calls 44265->44267 44283 403d44 44266->44283 44268 4034ee 44267->44268 44269 43eb09 68 API calls 44268->44269 44270 403501 44269->44270 44271 43eb09 68 API calls 44270->44271 44272 403514 GetFileAttributesA 44271->44272 44273 403529 44272->44273 44274 43eab4 _$I10_OUTPUT 68 API calls 44273->44274 44275 403549 44274->44275 44276 43eb09 68 API calls 44275->44276 44277 403558 44276->44277 44278 43eb09 68 API calls 44277->44278 44279 40356b 44278->44279 44280 43eb09 68 API calls 44279->44280 44281 40357e GetFileAttributesA 44280->44281 44282 40358d 44281->44282 44282->44264 44284 4462f0 _memset 44283->44284 44285 403d74 SHGetFolderPathA 44284->44285 44286 403da1 44285->44286 44287 403eed GetLastError 44285->44287 45197 43e86b 44286->45197 44289 403ef5 44287->44289 44291 43e722 __atodbl_l 6 API calls 44289->44291 44293 403f02 44291->44293 44292 403dde 44292->44287 44294 403de6 44292->44294 44293->43715 44293->43716 45200 403c38 108 API calls 3 library calls 44294->45200 44296 403df1 44296->44287 44297 403df9 GetTempPathA 44296->44297 44298 43e86b swprintf 98 API calls 44297->44298 44299 403e20 44298->44299 44300 43e86b swprintf 98 API calls 44299->44300 44301 403e47 _memset 44300->44301 44302 403e58 CreateProcessA 44301->44302 44302->44287 44303 403e9a WaitForSingleObject CloseHandle CloseHandle GetFileAttributesA 44302->44303 44303->44287 44304 403ecc 44303->44304 44304->44287 44305 403ed0 44304->44305 45201 403835 157 API calls 7 library calls 44305->45201 44307 403edb 44307->44289 44308->43683 44309->43703 44310->44063 44312 43eb23 44311->44312 44314 43eb15 44311->44314 44408 442b74 68 API calls __getptd_noexit 44312->44408 44314->44312 44317 43eb4a 44314->44317 44316 402d4e GetFileAttributesA 44316->44076 44316->44077 44317->44316 44410 442b74 68 API calls __getptd_noexit 44317->44410 44319 43eb2b 44409 441e30 9 API calls _memcpy_s 44319->44409 44322 43e084 44320->44322 44321 402ef0 44321->44071 44362 42f9e8 44321->44362 44322->44321 44411 407e4b 44322->44411 44324 43d5b9 82 API calls 44324->44321 44325 43e0c6 44326 43e197 44325->44326 44327 43e1af 44325->44327 44349 43e0df 44325->44349 44328 409698 68 API calls 44326->44328 44414 43df12 44327->44414 44328->44349 44331 43df12 68 API calls 44332 43e1d6 44331->44332 44333 43df12 68 API calls 44332->44333 44334 43e1e7 44333->44334 44335 43df12 68 API calls 44334->44335 44336 43e1f9 44335->44336 44336->44349 44425 428a4b 44336->44425 44339 43df12 68 API calls 44340 43e22f 44339->44340 44341 428a4b 68 API calls 44340->44341 44342 43e241 44341->44342 44429 43dd5a 44342->44429 44344 43e271 44345 43e293 44344->44345 44346 43e278 44344->44346 44433 428d3d 44345->44433 44347 409698 68 API calls 44346->44347 44347->44349 44349->44321 44349->44324 44351 428d3d 68 API calls 44352 43e2af 44351->44352 44352->44349 44439 409698 44352->44439 44354 43e2eb 44447 42ad1b 44354->44447 44358 43e2f9 44358->44349 44359 409698 68 API calls 44358->44359 44360 43e30e 44359->44360 44458 43d3ef 44360->44458 44363 42fa57 44362->44363 44364 42fa04 44362->44364 44363->44109 44364->44363 44616 42f744 44364->44616 44367 418878 82 API calls 44368 42fa41 44367->44368 44369 42f744 112 API calls 44368->44369 44369->44363 44371 418e5d 44370->44371 44375 418fc2 44370->44375 44760 418bf7 44371->44760 44373 418fa9 44773 408040 68 API calls 44373->44773 44375->44122 44376 42f9e8 112 API calls 44383 418e78 44376->44383 44377 418f69 44377->44373 44771 41650d 68 API calls 44377->44771 44380 418f89 44380->44373 44772 407fa2 68 API calls _memcpy_s 44380->44772 44383->44373 44383->44376 44383->44377 44384 418bf7 82 API calls 44383->44384 44769 417ea4 82 API calls 44383->44769 44770 4188b5 82 API calls 44383->44770 44384->44383 44386 418889 44385->44386 44390 418885 44385->44390 44816 417ea4 82 API calls 44386->44816 44388 41889c 44817 408040 68 API calls 44388->44817 44390->44114 44392 43d5cd 44391->44392 44396 43d5c6 44391->44396 44392->44396 44818 425824 68 API calls _memset 44392->44818 44394 43d607 44395 409698 68 API calls 44394->44395 44395->44396 44396->44117 44397 43d5f3 44397->44394 44401 43d636 44397->44401 44398 43d67c 44820 425824 68 API calls _memset 44398->44820 44401->44398 44819 4104cd 82 API calls 44401->44819 44402 43d685 44403 409698 68 API calls 44402->44403 44403->44396 44404->44122 44405->44122 44406->44122 44407->44122 44408->44319 44409->44316 44410->44319 44462 407a77 44411->44462 44413 407e56 _memset 44413->44325 44415 43df29 44414->44415 44416 428a4b 68 API calls 44415->44416 44423 43df87 44415->44423 44417 43df5c 44416->44417 44419 43df7a 44417->44419 44424 43df91 44417->44424 44418 428a4b 68 API calls 44420 43dff8 44418->44420 44421 409698 68 API calls 44419->44421 44422 409698 68 API calls 44420->44422 44421->44423 44422->44423 44423->44331 44424->44418 44426 428a60 44425->44426 44427 428a58 44425->44427 44426->44339 44490 4289bb 68 API calls _memcpy_s 44427->44490 44430 43dd77 44429->44430 44491 40fff6 44430->44491 44432 43ddb8 44432->44344 44434 428d46 44433->44434 44435 428d58 44433->44435 44596 4151d3 68 API calls 44434->44596 44437 407e4b 68 API calls 44435->44437 44438 428d55 44437->44438 44438->44351 44440 4096a7 44439->44440 44446 4096f4 44439->44446 44442 4096b7 44440->44442 44597 41658f 68 API calls 44440->44597 44442->44446 44598 408da9 68 API calls __atodbl_l 44442->44598 44444 4096d9 44444->44446 44599 416109 68 API calls _memcpy_s 44444->44599 44446->44354 44600 43d9d8 44447->44600 44450 43d9d8 68 API calls 44451 42ad4f 44450->44451 44452 42ad65 44451->44452 44613 43dbd8 68 API calls 44451->44613 44454 42d2ee 44452->44454 44455 42d37b 44454->44455 44456 42d304 44454->44456 44455->44358 44456->44455 44457 409698 68 API calls 44456->44457 44457->44456 44459 43d3fe 44458->44459 44460 43d406 44458->44460 44459->44349 44460->44459 44461 407a77 68 API calls 44460->44461 44461->44459 44463 407a88 44462->44463 44464 407aa7 44462->44464 44463->44464 44466 4079eb 44463->44466 44464->44413 44467 4079f9 44466->44467 44470 40753c 44467->44470 44468 407a38 44468->44464 44473 43ea05 44470->44473 44474 43ea80 44473->44474 44486 43ea11 44473->44486 44475 443a1c __calloc_impl RtlDecodePointer 44474->44475 44476 43ea86 44475->44476 44477 442b74 _memcpy_s 67 API calls 44476->44477 44480 407551 44477->44480 44478 443a4f __FF_MSGBANNER 67 API calls 44488 43ea1c 44478->44488 44479 43ea44 RtlAllocateHeap 44479->44480 44479->44486 44480->44468 44481 443aac __NMSG_WRITE 67 API calls 44481->44488 44482 43ea6c 44484 442b74 _memcpy_s 67 API calls 44482->44484 44483 443a1c __calloc_impl RtlDecodePointer 44483->44486 44487 43ea6a 44484->44487 44485 440be2 __mtinitlocknum GetModuleHandleExW 74ECFFF6 ExitProcess 44485->44488 44486->44479 44486->44482 44486->44483 44486->44487 44486->44488 44489 442b74 _memcpy_s 67 API calls 44487->44489 44488->44478 44488->44481 44488->44485 44488->44486 44489->44480 44490->44426 44492 41002d _memcmp 44491->44492 44493 407e4b 68 API calls 44492->44493 44494 410060 44493->44494 44499 407a77 68 API calls 44494->44499 44506 4100b3 44494->44506 44507 410066 44494->44507 44495 43e722 __atodbl_l 6 API calls 44497 4103c8 44495->44497 44496 407e4b 68 API calls 44498 4101b3 44496->44498 44497->44432 44498->44507 44509 40dd3d 44498->44509 44499->44506 44502 41020c _memset 44504 410247 44502->44504 44505 410328 44502->44505 44521 40a55b SetFilePointer 44502->44521 44504->44505 44526 40d7e2 68 API calls 44504->44526 44505->44507 44527 40d98b 82 API calls 44505->44527 44506->44496 44506->44507 44507->44495 44510 40dd88 44509->44510 44511 407a77 68 API calls 44510->44511 44515 40ddb3 _memcmp 44510->44515 44511->44515 44512 407e4b 68 API calls 44513 40de33 _memcpy_s 44512->44513 44517 40deff 44513->44517 44518 40ddbd _memset 44513->44518 44528 40ac83 44513->44528 44515->44512 44515->44518 44516 40df55 44516->44518 44550 40739c 44516->44550 44517->44516 44549 40d7e2 68 API calls 44517->44549 44518->44502 44522 40a58b GetLastError 44521->44522 44523 40a59d ReadFile 44521->44523 44522->44523 44525 40a595 _memset 44522->44525 44524 40a5b8 GetLastError 44523->44524 44523->44525 44524->44525 44525->44504 44526->44505 44527->44507 44529 40acc6 44528->44529 44530 40accf 44528->44530 44588 40ab07 79 API calls 2 library calls 44529->44588 44548 40acee 44530->44548 44554 40aacb 44530->44554 44534 43e722 __atodbl_l 6 API calls 44535 40ae02 44534->44535 44535->44517 44538 40ad64 44540 40ad71 44538->44540 44541 40ada7 44538->44541 44539 40ad5c CreateFileW 44539->44538 44589 43ee47 68 API calls 2 library calls 44540->44589 44571 40aff0 44541->44571 44543 40ad77 44547 40ac83 90 API calls 44543->44547 44543->44548 44547->44548 44548->44534 44549->44516 44551 4073a7 44550->44551 44552 4073ab 44550->44552 44591 40a524 44551->44591 44552->44518 44555 40a347 7 API calls 44554->44555 44556 40aad3 44555->44556 44557 40aae2 44556->44557 44558 40aad9 44556->44558 44559 40a3a2 70 API calls 44557->44559 44560 40a3a2 70 API calls 44558->44560 44561 40aae8 44559->44561 44562 40aade 44560->44562 44561->44562 44563 40a44e 71 API calls 44561->44563 44562->44548 44566 40a347 44562->44566 44564 40aaf9 44563->44564 44565 43ee47 _free 68 API calls 44564->44565 44565->44562 44567 40a364 GetVersionExA 44566->44567 44568 40a38e 44566->44568 44567->44568 44569 43e722 __atodbl_l 6 API calls 44568->44569 44570 40a3a0 44569->44570 44570->44538 44570->44539 44572 40af25 83 API calls 44571->44572 44573 40b024 44572->44573 44574 40b0c4 44573->44574 44575 40aacb 74 API calls 44573->44575 44577 43e722 __atodbl_l 6 API calls 44574->44577 44576 40b03a 44575->44576 44576->44574 44579 40a347 7 API calls 44576->44579 44578 40ade2 44577->44578 44590 43ee47 68 API calls 2 library calls 44578->44590 44580 40b049 44579->44580 44581 40b08a 44580->44581 44582 40b04f GetDiskFreeSpaceW 44580->44582 44588->44530 44589->44543 44590->44548 44592 40a53e CloseHandle 44591->44592 44593 40a530 44592->44593 44594 40a54d 44592->44594 44593->44594 44595 40a536 Sleep 44593->44595 44594->44552 44595->44592 44596->44438 44597->44442 44598->44444 44599->44446 44601 43d9f2 44600->44601 44612 42ad37 44600->44612 44603 43d9d8 68 API calls 44601->44603 44608 43da2d 44601->44608 44601->44612 44604 43da66 44603->44604 44606 43d9d8 68 API calls 44604->44606 44604->44612 44605 43dae3 44615 428b78 68 API calls _memcpy_s 44605->44615 44606->44608 44608->44612 44614 428b78 68 API calls _memcpy_s 44608->44614 44609 43daa8 44609->44605 44610 43dacc 44609->44610 44611 409698 68 API calls 44610->44611 44611->44612 44612->44450 44613->44452 44614->44609 44615->44612 44656 407e6f 44616->44656 44618 42f7c4 44619 42f868 44618->44619 44621 42f7e1 44618->44621 44620 43cb4b 112 API calls 44619->44620 44631 42f842 44620->44631 44623 42f823 44621->44623 44624 42f7e6 44621->44624 44659 407fdb 44623->44659 44627 409698 68 API calls 44624->44627 44626 42f9e3 44626->44363 44626->44367 44628 42f7f3 44627->44628 44687 408040 68 API calls 44628->44687 44629 42f82d 44629->44631 44663 43cb4b 44629->44663 44633 42f89d 44631->44633 44688 42f640 82 API calls _memset 44631->44688 44632 42f763 44632->44618 44636 42f807 44632->44636 44653 42f769 44632->44653 44639 42f8b2 44633->44639 44689 425824 68 API calls _memset 44633->44689 44638 409698 68 API calls 44636->44638 44638->44653 44640 42f948 44639->44640 44644 42f900 44639->44644 44645 42f8ed 44639->44645 44641 42f973 44640->44641 44643 407fdb 68 API calls 44640->44643 44642 42f99c 44641->44642 44693 417ea4 82 API calls 44641->44693 44649 42f9c5 44642->44649 44650 42f9aa 44642->44650 44643->44641 44691 41756a 68 API calls 44644->44691 44690 41756a 68 API calls 44645->44690 44652 409698 68 API calls 44649->44652 44651 409698 68 API calls 44650->44651 44651->44653 44652->44653 44694 408040 68 API calls 44653->44694 44654 42f8f5 44654->44640 44692 4175d7 68 API calls 44654->44692 44695 407e8f 44656->44695 44658 407e78 _memset 44658->44632 44660 407fe9 44659->44660 44662 407fe5 _memcpy_s 44659->44662 44661 407e8f 68 API calls 44660->44661 44661->44662 44662->44629 44664 43cb7b 44663->44664 44665 407a77 68 API calls 44664->44665 44672 43cb9e 44665->44672 44666 43ce49 44666->44631 44667 43cd12 44668 43cd23 44667->44668 44710 43ab52 68 API calls 44667->44710 44680 43cd67 44668->44680 44711 408012 68 API calls 44668->44711 44669 43cc2e 44669->44667 44671 43ccef 44669->44671 44673 43c49b 112 API calls 44669->44673 44674 43c49b 112 API calls 44671->44674 44672->44666 44672->44669 44676 43cc7e 44672->44676 44677 43cc23 44672->44677 44700 43c49b 44672->44700 44673->44671 44674->44667 44709 408e3d 68 API calls 44676->44709 44708 40970d 68 API calls 44677->44708 44682 43cddf 44680->44682 44712 4259cc 68 API calls 44680->44712 44713 434c6d 68 API calls 44682->44713 44685 43cdec 44685->44666 44714 4259cc 68 API calls 44685->44714 44687->44653 44688->44633 44689->44639 44690->44654 44691->44654 44692->44654 44693->44642 44694->44626 44696 407e96 44695->44696 44697 407a77 68 API calls 44696->44697 44699 407e9c 44696->44699 44698 407eea 44697->44698 44698->44658 44699->44658 44706 43c4a7 44700->44706 44701 43c542 44743 43ac03 68 API calls 44701->44743 44704 43c540 44704->44672 44706->44701 44706->44704 44715 43ac5f 44706->44715 44741 40970d 68 API calls 44706->44741 44742 43aa5f 68 API calls 44706->44742 44708->44669 44709->44669 44710->44667 44711->44680 44712->44682 44713->44685 44714->44685 44716 43acaa 44715->44716 44732 43acb8 44715->44732 44717 43ad86 44716->44717 44718 43ace5 44716->44718 44719 43ad2c 44716->44719 44720 43acdb 44716->44720 44721 43acfb 44716->44721 44724 43ad64 44716->44724 44716->44732 44756 425cb6 112 API calls _memcmp 44717->44756 44745 42838b 68 API calls 44718->44745 44730 425245 68 API calls 44719->44730 44744 4253c5 68 API calls 44720->44744 44746 425245 44721->44746 44722 43c056 44726 43c05a 44722->44726 44758 43ac03 68 API calls 44722->44758 44723 43c08b 44723->44726 44759 43ab52 68 API calls 44723->44759 44755 428415 68 API calls 44724->44755 44726->44706 44736 43ad3b 44730->44736 44732->44722 44732->44723 44734 43ad0a 44734->44732 44753 431074 68 API calls 44734->44753 44736->44732 44754 431074 68 API calls 44736->44754 44739 43ad1e 44739->44732 44757 41684b 68 API calls 44739->44757 44741->44706 44742->44706 44743->44704 44744->44732 44745->44732 44747 425255 44746->44747 44750 425297 44746->44750 44748 42528c 44747->44748 44747->44750 44751 4252a0 44747->44751 44749 40970d 68 API calls 44748->44749 44749->44750 44750->44734 44751->44750 44752 40970d 68 API calls 44751->44752 44752->44750 44753->44739 44754->44739 44755->44732 44756->44732 44757->44732 44758->44726 44759->44723 44761 418c0b 44760->44761 44766 418c13 44760->44766 44761->44383 44762 418d26 44789 419b2e 44762->44789 44763 418d1f 44774 416ffa 44763->44774 44766->44761 44766->44762 44766->44763 44768 418d24 44800 408040 68 API calls 44768->44800 44769->44383 44770->44383 44771->44380 44772->44373 44773->44375 44775 417022 44774->44775 44785 41701a 44774->44785 44776 417079 44775->44776 44777 41709f 44775->44777 44775->44785 44801 408012 68 API calls 44776->44801 44802 4159b6 44777->44802 44780 417140 44780->44785 44809 416d6d 68 API calls _memcpy_s 44780->44809 44782 41715e 44784 417174 44782->44784 44810 416109 68 API calls _memcpy_s 44782->44810 44784->44785 44786 4159b6 68 API calls 44784->44786 44785->44768 44787 41719c 44786->44787 44787->44785 44811 408f31 68 API calls 44787->44811 44790 419b9c 44789->44790 44792 41e973 44790->44792 44796 419bd2 44790->44796 44815 408012 68 API calls 44792->44815 44795 419d8f 44814 417bda 82 API calls 44795->44814 44796->44795 44813 408012 68 API calls 44796->44813 44797 41e88a 44798 43e722 __atodbl_l 6 API calls 44797->44798 44799 41e8bd 44798->44799 44799->44768 44800->44761 44801->44785 44803 4159d7 44802->44803 44804 4159fb 44803->44804 44805 4159ea 44803->44805 44806 4159f3 _memcpy_s 44803->44806 44808 407e8f 68 API calls 44804->44808 44812 407f79 68 API calls 44805->44812 44806->44780 44808->44806 44809->44782 44810->44784 44811->44785 44812->44806 44813->44795 44814->44797 44815->44795 44816->44388 44817->44390 44818->44397 44819->44401 44820->44402 44822 404718 _memset 44821->44822 44823 43eab4 _$I10_OUTPUT 68 API calls 44822->44823 44824 40473f SHGetFolderPathA 44823->44824 44825 404758 GetLastError 44824->44825 44826 40476f 44824->44826 44827 40475e 44825->44827 44828 43eab4 _$I10_OUTPUT 68 API calls 44826->44828 44830 43e722 __atodbl_l 6 API calls 44827->44830 44829 404788 44828->44829 44831 43eb09 68 API calls 44829->44831 44832 4035c0 44830->44832 44833 40479a 44831->44833 44832->44127 44832->44142 44834 43eb09 68 API calls 44833->44834 44835 4047ae 44834->44835 44836 43eb09 68 API calls 44835->44836 44837 4047c0 44836->44837 44838 43f970 __wfopen_s 148 API calls 44837->44838 44840 4047de _strstr 44838->44840 44840->44827 44843 404867 _strstr 44840->44843 44859 404854 44840->44859 44945 43fb0d 44840->44945 44964 43f00f 82 API calls __strlwr_s_l 44840->44964 44842 4408bf __fcloseall 103 API calls 44842->44827 44844 404949 44843->44844 44847 40489c _strstr 44843->44847 44965 4401e2 6 API calls ___report_securityfailure 44844->44965 44846 40494e 44848 43ea05 _malloc 68 API calls 44847->44848 44849 4048f7 44848->44849 44850 43eab4 _$I10_OUTPUT 68 API calls 44849->44850 44849->44859 44851 404910 44850->44851 44852 43eb09 68 API calls 44851->44852 44853 40491c 44852->44853 44854 43eb09 68 API calls 44853->44854 44855 40492a 44854->44855 44856 43eb09 68 API calls 44855->44856 44857 404936 44856->44857 44858 43eb09 68 API calls 44857->44858 44858->44859 44859->44842 44861 40457f _memset 44860->44861 44862 43eab4 _$I10_OUTPUT 68 API calls 44861->44862 44863 4045ae RegOpenKeyExA 44862->44863 44864 4045d8 RegQueryValueExA 44863->44864 44878 4046ac 44863->44878 44865 404603 44864->44865 44866 4046c4 RegCloseKey 44864->44866 44865->44866 44869 40461b RegCloseKey 44865->44869 44866->44878 44867 43e722 __atodbl_l 6 API calls 44868 4035e0 44867->44868 44868->44131 44868->44142 44871 404631 44869->44871 44870 40467c 44874 43ea05 _malloc 68 API calls 44870->44874 44871->44870 44872 4046e0 44871->44872 45159 4401e2 6 API calls ___report_securityfailure 44872->45159 44876 404697 44874->44876 44875 4046e5 44877 43eab4 _$I10_OUTPUT 68 API calls 44876->44877 44876->44878 44877->44878 44878->44867 44880 405bd7 SetDllDirectoryA 44879->44880 44881 405ccc 44879->44881 45160 40516f 44880->45160 44881->44134 44884 405bf4 SetDllDirectoryA 44884->44881 44886 405c09 7 API calls 44884->44886 44885 405bee GetLastError 44885->44884 44887 405c91 44886->44887 44888 4053f5 FreeLibrary 44887->44888 44889 405cc2 44887->44889 44888->44881 44889->44134 44891 405785 __ftell_nolock 44890->44891 44892 43eab4 _$I10_OUTPUT 68 API calls 44891->44892 44893 4057e8 44892->44893 44894 43eb09 68 API calls 44893->44894 44895 4057f9 GetFileAttributesA 44894->44895 44896 405821 GetLastError 44895->44896 44897 40580e 44895->44897 44899 43eab4 _$I10_OUTPUT 68 API calls 44896->44899 45170 40541a 124 API calls 9 library calls 44897->45170 44901 40583b 44899->44901 44900 40581c 44902 4058a4 44900->44902 44903 43eb09 68 API calls 44901->44903 44904 43e722 __atodbl_l 6 API calls 44902->44904 44905 405850 GetFileAttributesA 44903->44905 44906 405bc3 44904->44906 44907 405865 44905->44907 44908 4058aa GetLastError 44905->44908 44906->44140 44910 43e066 99 API calls 44907->44910 44909 43eab4 _$I10_OUTPUT 68 API calls 44908->44909 44911 4058bf 44909->44911 44912 405881 44910->44912 44913 43eb09 68 API calls 44911->44913 44912->44902 45171 40526d 141 API calls 3 library calls 44912->45171 44915 4058d0 44913->44915 44917 43f970 __wfopen_s 148 API calls 44915->44917 44916 405899 44918 43d5b9 82 API calls 44916->44918 44919 4058f4 44917->44919 44918->44902 44920 43eab4 _$I10_OUTPUT 68 API calls 44919->44920 44928 40595c 44919->44928 44922 40591a 44920->44922 44923 43eb09 68 API calls 44922->44923 44924 40592b 44923->44924 44925 43f970 __wfopen_s 148 API calls 44924->44925 44926 40594d 44925->44926 44926->44928 44929 43eab4 _$I10_OUTPUT 68 API calls 44926->44929 44928->44902 45172 405dba 85 API calls __fread_nolock 44928->45172 44930 40596f 44929->44930 44931 43eb09 68 API calls 44930->44931 44932 405980 44931->44932 44934 43f970 __wfopen_s 148 API calls 44932->44934 44933 4059c7 _memcmp 44933->44902 44939 405a52 _strncmp 44933->44939 45173 40119b 81 API calls 2 library calls 44933->45173 45174 405dba 85 API calls __fread_nolock 44933->45174 44934->44928 44936 43eab4 68 API calls _$I10_OUTPUT 44936->44939 44937 405dba 85 API calls 44937->44939 44939->44902 44939->44936 44939->44937 45175 405cd0 68 API calls 4 library calls 44939->45175 45176 403f04 107 API calls 4 library calls 44939->45176 44942 4053fe 44941->44942 44943 405412 FreeLibrary 44942->44943 44944 405419 44942->44944 44943->44944 44944->44142 44947 43fb19 ___FrameUnwindToState 44945->44947 44946 43fb2c 44992 442b74 68 API calls __getptd_noexit 44946->44992 44947->44946 44949 43fb5d 44947->44949 44954 43fb3c ___FrameUnwindToState 44949->44954 44966 444492 44949->44966 44950 43fb31 44993 441e30 9 API calls _memcpy_s 44950->44993 44954->44840 44955 43fc10 45003 43fc44 RtlLeaveCriticalSection RtlLeaveCriticalSection __fsopen 44955->45003 44959 43fbe2 44959->44955 44972 446144 44959->44972 44960 43fb7d 44960->44959 45001 442b74 68 API calls __getptd_noexit 44960->45001 44962 43fbd7 45002 441e30 9 API calls _memcpy_s 44962->45002 44964->44840 44965->44846 44967 4444c4 RtlEnterCriticalSection 44966->44967 44968 4444a2 44966->44968 44969 43fb6c 44967->44969 44968->44967 44970 4444aa 44968->44970 44969->44959 44994 4443ce 44969->44994 44971 4473af __lock 68 API calls 44970->44971 44971->44969 44973 44614f 44972->44973 44977 446164 44972->44977 45034 442b74 68 API calls __getptd_noexit 44973->45034 44975 446154 45035 441e30 9 API calls _memcpy_s 44975->45035 44978 446199 44977->44978 44984 44615f 44977->44984 45036 4499ac 68 API calls __malloc_crt 44977->45036 44980 4443ce __flush 68 API calls 44978->44980 44981 4461ad 44980->44981 45004 446380 44981->45004 44983 4461b4 44983->44984 44985 4443ce __flush 68 API calls 44983->44985 44984->44959 44986 4461d7 44985->44986 44986->44984 44987 4443ce __flush 68 API calls 44986->44987 44988 4461e3 44987->44988 44988->44984 44989 4443ce __flush 68 API calls 44988->44989 44990 4461f0 44989->44990 44991 4443ce __flush 68 API calls 44990->44991 44991->44984 44992->44950 44993->44954 44995 4443ed 44994->44995 44996 4443d8 44994->44996 44995->44960 45157 442b74 68 API calls __getptd_noexit 44996->45157 44998 4443dd 45158 441e30 9 API calls _memcpy_s 44998->45158 45000 4443e8 45000->44960 45001->44962 45002->44959 45003->44954 45005 44638c ___FrameUnwindToState 45004->45005 45006 446394 45005->45006 45007 4463ac 45005->45007 45117 442b40 68 API calls __getptd_noexit 45006->45117 45009 446467 45007->45009 45013 4463e2 45007->45013 45124 442b40 68 API calls __getptd_noexit 45009->45124 45010 446399 45118 442b74 68 API calls __getptd_noexit 45010->45118 45016 446404 45013->45016 45017 4463ef 45013->45017 45014 44646c 45125 442b74 68 API calls __getptd_noexit 45014->45125 45037 44c563 45016->45037 45119 442b40 68 API calls __getptd_noexit 45017->45119 45019 4463fc 45126 441e30 9 API calls _memcpy_s 45019->45126 45021 44640a 45023 446430 45021->45023 45024 44641d 45021->45024 45022 4463f4 45120 442b74 68 API calls __getptd_noexit 45022->45120 45121 442b74 68 API calls __getptd_noexit 45023->45121 45046 446488 45024->45046 45026 4463a1 ___FrameUnwindToState 45026->44983 45030 446429 45123 44645f RtlLeaveCriticalSection __unlock_fhandle 45030->45123 45031 446435 45122 442b40 68 API calls __getptd_noexit 45031->45122 45034->44975 45035->44984 45036->44978 45038 44c56f ___FrameUnwindToState 45037->45038 45039 44c5bc RtlEnterCriticalSection 45038->45039 45040 4473af __lock 68 API calls 45038->45040 45042 44c5e2 ___FrameUnwindToState 45039->45042 45041 44c593 45040->45041 45043 44c5b0 45041->45043 45044 44c59e InitializeCriticalSectionAndSpinCount 45041->45044 45042->45021 45127 44c5e6 RtlLeaveCriticalSection _doexit 45043->45127 45044->45043 45047 4464c0 45046->45047 45048 4464a9 45046->45048 45050 446bf8 45047->45050 45053 4464fa 45047->45053 45137 442b40 68 API calls __getptd_noexit 45048->45137 45154 442b40 68 API calls __getptd_noexit 45050->45154 45052 4464ae 45138 442b74 68 API calls __getptd_noexit 45052->45138 45056 446502 45053->45056 45061 446519 45053->45061 45054 446bfd 45155 442b74 68 API calls __getptd_noexit 45054->45155 45139 442b40 68 API calls __getptd_noexit 45056->45139 45059 4464b5 45059->45030 45061->45059 45062 44652e 45061->45062 45065 446548 45061->45065 45066 446566 45061->45066 45141 442b40 68 API calls __getptd_noexit 45062->45141 45065->45062 45070 446553 45065->45070 45142 447865 68 API calls _malloc 45066->45142 45067 44650e 45156 441e30 9 API calls _memcpy_s 45067->45156 45068 446507 45140 442b74 68 API calls __getptd_noexit 45068->45140 45128 44904c 45070->45128 45072 446576 45074 44657e 45072->45074 45075 446599 45072->45075 45143 442b74 68 API calls __getptd_noexit 45074->45143 45145 44717e 70 API calls 3 library calls 45075->45145 45076 446667 45078 4466e0 ReadFile 45076->45078 45084 44667d GetConsoleMode 45076->45084 45082 446bc0 GetLastError 45078->45082 45083 446702 45078->45083 45080 4465a7 45080->45070 45081 446583 45144 442b40 68 API calls __getptd_noexit 45081->45144 45088 4466c0 45082->45088 45089 446bcd 45082->45089 45083->45082 45093 4466d2 45083->45093 45085 446691 45084->45085 45086 4466dd 45084->45086 45085->45086 45090 446697 ReadConsoleW 45085->45090 45086->45078 45100 4466c6 45088->45100 45146 442b53 68 API calls 3 library calls 45088->45146 45152 442b74 68 API calls __getptd_noexit 45089->45152 45090->45093 45094 4466ba GetLastError 45090->45094 45091 44658e 45091->45059 45099 4469a4 45093->45099 45093->45100 45102 446737 45093->45102 45094->45088 45096 446bd2 45153 442b40 68 API calls __getptd_noexit 45096->45153 45099->45100 45107 446aaa ReadFile 45099->45107 45100->45059 45150 43ee47 68 API calls 2 library calls 45100->45150 45103 4467a3 ReadFile 45102->45103 45109 446824 45102->45109 45104 4467c4 GetLastError 45103->45104 45115 4467ce 45103->45115 45104->45115 45105 4468e1 45111 446891 MultiByteToWideChar 45105->45111 45149 44717e 70 API calls 3 library calls 45105->45149 45106 4468d1 45148 442b74 68 API calls __getptd_noexit 45106->45148 45108 446acd GetLastError 45107->45108 45116 446adb 45107->45116 45108->45116 45109->45100 45109->45105 45109->45106 45109->45111 45111->45094 45111->45100 45115->45102 45147 44717e 70 API calls 3 library calls 45115->45147 45116->45099 45151 44717e 70 API calls 3 library calls 45116->45151 45117->45010 45118->45026 45119->45022 45120->45019 45121->45031 45122->45030 45123->45026 45124->45014 45125->45019 45126->45026 45127->45039 45129 449064 45128->45129 45130 449057 45128->45130 45132 449070 45129->45132 45133 442b74 _memcpy_s 68 API calls 45129->45133 45131 442b74 _memcpy_s 68 API calls 45130->45131 45134 44905c 45131->45134 45132->45076 45135 449091 45133->45135 45134->45076 45136 441e30 _memcpy_s 9 API calls 45135->45136 45136->45134 45137->45052 45138->45059 45139->45068 45140->45067 45141->45068 45142->45072 45143->45081 45144->45091 45145->45080 45146->45100 45147->45115 45148->45100 45149->45111 45150->45059 45151->45116 45152->45096 45153->45100 45154->45054 45155->45067 45156->45059 45157->44998 45158->45000 45159->44875 45161 40517c _memset __ftell_nolock 45160->45161 45162 43eab4 _$I10_OUTPUT 68 API calls 45161->45162 45163 4051b6 45162->45163 45164 43eb09 68 API calls 45163->45164 45165 4051c8 45164->45165 45166 43eb09 68 API calls 45165->45166 45167 4051da LoadLibraryA 45166->45167 45168 43e722 __atodbl_l 6 API calls 45167->45168 45169 4051fa 45168->45169 45169->44884 45169->44885 45170->44900 45171->44916 45172->44933 45173->44933 45174->44933 45175->44939 45176->44939 45177->44149 45178->44149 45180 401f4a RegOpenKeyExA 45179->45180 45180->44163 45180->44164 45181->44176 45182->44176 45183->44176 45184->44187 45185->44187 45186->44187 45187->44184 45188->44200 45189->44200 45190->44191 45191->44256 45192->44256 45193->44256 45194->44256 45196 403488 SHGetFolderPathA 45195->45196 45196->44262 45196->44282 45202 43fa7d 45197->45202 45199 403dc3 GetFileAttributesA 45199->44287 45199->44292 45200->44296 45201->44307 45203 43fa86 45202->45203 45204 43fa9b 45202->45204 45218 442b74 68 API calls __getptd_noexit 45203->45218 45205 43fadc 45204->45205 45208 43faa9 45204->45208 45222 442b74 68 API calls __getptd_noexit 45205->45222 45207 43fa8b 45219 441e30 9 API calls _memcpy_s 45207->45219 45220 43f9b5 98 API calls 2 library calls 45208->45220 45212 43fad4 45223 441e30 9 API calls _memcpy_s 45212->45223 45213 43fa96 45213->45199 45214 43fac0 45216 43faec 45214->45216 45221 442b74 68 API calls __getptd_noexit 45214->45221 45216->45199 45218->45207 45219->45213 45220->45214 45221->45212 45222->45212 45223->45216 45224->43724 45225->43733 45226->43740 45227->43728 45228->43734 45229->43736 45230->43730 45231->43733 45233 440862 45232->45233 45235 440876 45232->45235 45284 442b74 68 API calls __getptd_noexit 45233->45284 45234 440872 45250 44092e RtlLeaveCriticalSection RtlLeaveCriticalSection __fsopen 45234->45250 45235->45234 45251 444702 45235->45251 45238 440867 45285 441e30 9 API calls _memcpy_s 45238->45285 45243 4443ce __flush 68 API calls 45244 440890 45243->45244 45261 44721b 45244->45261 45248->43747 45249->43751 45250->43751 45252 444715 45251->45252 45253 440882 45251->45253 45252->45253 45254 4443ce __flush 68 API calls 45252->45254 45257 44737f 45253->45257 45255 444732 45254->45255 45256 4490a0 __flush 98 API calls 45255->45256 45256->45253 45258 44088a 45257->45258 45259 44738c 45257->45259 45258->45243 45259->45258 45287 43ee47 68 API calls 2 library calls 45259->45287 45262 447227 ___FrameUnwindToState 45261->45262 45267 447247 45262->45267 45284->45238 45285->45234 45287->45258 45295->43662 45297 440d6b ___FrameUnwindToState 45296->45297 45298 4473af __lock 61 API calls 45297->45298 45299 440d72 45298->45299 45300 440e2b _doexit 45299->45300 45301 440da0 RtlDecodePointer 45299->45301 45316 440e79 45300->45316 45301->45300 45304 440db7 RtlDecodePointer 45301->45304 45309 440dc7 45304->45309 45305 440e88 ___FrameUnwindToState 45305->43462 45307 440dd4 RtlEncodePointer 45307->45309 45308 440e70 45310 440be2 __mtinitlocknum 3 API calls 45308->45310 45309->45300 45309->45307 45311 440de4 RtlDecodePointer RtlEncodePointer 45309->45311 45312 440e79 45310->45312 45314 440df6 RtlDecodePointer RtlDecodePointer 45311->45314 45313 440e86 45312->45313 45321 447513 RtlLeaveCriticalSection 45312->45321 45313->43462 45314->45309 45317 440e59 45316->45317 45318 440e7f 45316->45318 45317->45305 45320 447513 RtlLeaveCriticalSection 45317->45320 45322 447513 RtlLeaveCriticalSection 45318->45322 45320->45308 45321->45313 45322->45317 45323 41bdd2 45324 41be1e 45323->45324 45326 41be5d 45324->45326 45353 415e7a 68 API calls 45324->45353 45336 41bf7d 45326->45336 45343 4199a6 45326->45343 45328 41e8c1 45337 41e872 45328->45337 45357 408012 68 API calls 45328->45357 45329 41e859 45355 408012 68 API calls 45329->45355 45330 41bed2 45330->45329 45349 411374 45330->45349 45334 41bf0c 45334->45328 45334->45336 45354 40f4a3 82 API calls 45334->45354 45336->45328 45336->45329 45340 41a15a 45336->45340 45356 417bda 82 API calls 45337->45356 45338 41e88a 45341 43e722 __atodbl_l 6 API calls 45338->45341 45342 41e8bd 45341->45342 45344 4199f0 45343->45344 45345 4199e9 45343->45345 45347 4159b6 68 API calls 45344->45347 45358 417440 82 API calls 45345->45358 45348 419a05 _memset 45347->45348 45348->45330 45350 411383 45349->45350 45359 4112a4 45350->45359 45352 411395 45352->45334 45353->45326 45354->45336 45355->45337 45356->45338 45357->45337 45358->45344 45360 4112bc 45359->45360 45361 4112ed 45360->45361 45366 4112c2 45360->45366 45367 410886 45360->45367 45361->45366 45371 40d895 45361->45371 45364 411304 45364->45366 45375 40ff10 45364->45375 45366->45352 45368 410892 45367->45368 45370 41089f 45367->45370 45381 410985 45368->45381 45370->45361 45372 40d8b2 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 45371->45372 45373 40d8ad 45371->45373 45372->45364 45373->45372 45484 40cd35 Sleep CloseHandle 45373->45484 45376 40ff28 45375->45376 45380 40ff23 45375->45380 45376->45380 45485 40fef9 45376->45485 45379 40fe77 82 API calls 45379->45380 45380->45366 45387 41099d 45381->45387 45382 4109c1 45382->45370 45385 410a7e 45385->45382 45398 40ed1a 68 API calls _memset 45385->45398 45387->45382 45387->45385 45389 410706 45387->45389 45396 40e6a6 70 API calls 45387->45396 45397 4108d8 82 API calls _memset 45387->45397 45399 40fe77 45389->45399 45391 41071f 45392 40d895 2 API calls 45391->45392 45393 4107f9 45391->45393 45394 410733 45392->45394 45393->45387 45394->45393 45402 40d7e2 68 API calls 45394->45402 45396->45387 45397->45387 45398->45382 45403 40e44a 45399->45403 45401 40fe8f 45401->45391 45402->45393 45404 40e46b 45403->45404 45421 40e4bb _memset 45403->45421 45404->45421 45424 40e1d7 45404->45424 45406 40e490 45407 40e4c2 45406->45407 45408 40e4b4 45406->45408 45406->45421 45410 40d895 2 API calls 45407->45410 45407->45421 45454 40e424 82 API calls 45408->45454 45414 40e4de 45410->45414 45411 40e4e2 45456 40e57b 82 API calls 45411->45456 45412 40e51b 45412->45411 45417 40e531 45412->45417 45414->45411 45414->45412 45415 40e4f9 45414->45415 45450 40e166 45415->45450 45418 40e549 45417->45418 45417->45421 45457 40b342 68 API calls _memset 45417->45457 45458 40cc90 68 API calls 45418->45458 45421->45401 45422 40e500 45422->45421 45455 40e424 82 API calls 45422->45455 45429 40e1fd 45424->45429 45425 40e277 45427 43e722 __atodbl_l 6 API calls 45425->45427 45426 40e27c 45436 40e295 45426->45436 45459 40e036 45426->45459 45428 40e422 45427->45428 45428->45406 45429->45425 45429->45426 45430 40e26e 45429->45430 45466 40cd35 Sleep CloseHandle 45430->45466 45433 40e351 45434 40e38e 45433->45434 45448 40e2d0 45433->45448 45469 40d3c1 82 API calls __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 45433->45469 45440 40d895 2 API calls 45434->45440 45434->45448 45436->45433 45436->45434 45438 40e2c7 45436->45438 45442 40e306 45436->45442 45443 40e348 45436->45443 45436->45448 45467 40cd35 Sleep CloseHandle 45438->45467 45439 40e381 45439->45434 45439->45438 45444 40e3b8 45440->45444 45442->45433 45446 40e338 45442->45446 45442->45448 45468 40cd90 Sleep CloseHandle 45443->45468 45444->45448 45449 40a55b 4 API calls 45444->45449 45447 40739c 2 API calls 45446->45447 45447->45448 45448->45425 45470 40ccd5 Sleep CloseHandle 45448->45470 45449->45448 45451 40e193 __gmtime64_s 45450->45451 45453 40e180 _memset 45450->45453 45481 4073b1 45451->45481 45453->45422 45454->45421 45455->45421 45456->45421 45457->45418 45458->45421 45471 40aebf 45459->45471 45461 40d895 2 API calls 45462 40e09d 45461->45462 45463 40e0ac 45462->45463 45464 40739c 2 API calls 45462->45464 45463->45436 45464->45463 45466->45425 45467->45448 45468->45433 45469->45439 45470->45425 45472 40aacb 74 API calls 45471->45472 45473 40aece 45472->45473 45474 40aed4 45473->45474 45475 40a347 7 API calls 45473->45475 45474->45461 45474->45463 45476 40aedf 45475->45476 45477 40aee4 GetFileAttributesW 45476->45477 45478 40aeec GetFileAttributesA 45476->45478 45479 40aef2 45477->45479 45478->45479 45480 43ee47 _free 68 API calls 45479->45480 45480->45474 45483 40a55b 4 API calls 45481->45483 45482 4073c4 45482->45453 45483->45482 45484->45372 45486 40d895 2 API calls 45485->45486 45487 40ff0b 45486->45487 45487->45379 45487->45380 45488 4476e1 45489 44781b __calloc_crt 68 API calls 45488->45489 45490 4476eb RtlEncodePointer 45489->45490 45491 447704 45490->45491 45492 448a22 45493 448a57 45492->45493 45494 448a32 45492->45494 45494->45493 45499 4479a1 45494->45499 45500 4479ad ___FrameUnwindToState 45499->45500 45505 4437fd 68 API calls 2 library calls 45500->45505 45502 4479b2 45506 44d2b8 72 API calls 3 library calls 45502->45506 45505->45502 45507 4443f2 45508 4443ff 45507->45508 45509 44781b __calloc_crt 68 API calls 45508->45509 45510 444419 45509->45510 45511 444432 45510->45511 45512 44781b __calloc_crt 68 API calls 45510->45512 45512->45511 45513 441b92 45517 448f27 45513->45517 45515 441b97 45516 448f27 4 API calls 45515->45516 45516->45515 45518 448f57 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId RtlQueryPerformanceCounter 45517->45518 45519 448f4a 45517->45519 45520 448f4e 45518->45520 45519->45518 45519->45520 45520->45515 45521 41bbdd 45522 41bbfd 45521->45522 45523 419bf3 45521->45523 45524 410985 82 API calls 45522->45524 45528 419d8f 45523->45528 45534 408012 68 API calls 45523->45534 45525 41bc05 45524->45525 45526 41a15a 45525->45526 45525->45528 45530 41e88a 45525->45530 45536 408012 68 API calls 45525->45536 45528->45526 45535 417bda 82 API calls 45528->45535 45531 43e722 __atodbl_l 6 API calls 45530->45531 45533 41e8bd 45531->45533 45534->45528 45535->45530 45536->45528 45537 43b0be 45547 43349d 45537->45547 45541 43b0ed 45542 43c056 45541->45542 45546 43c08b 45541->45546 45545 43c05a 45542->45545 45727 43ac03 68 API calls 45542->45727 45546->45545 45728 43ab52 68 API calls 45546->45728 45548 43350b 45547->45548 45549 4334e2 45547->45549 45550 43e722 __atodbl_l 6 API calls 45548->45550 45549->45548 45552 425245 68 API calls 45549->45552 45551 4342c4 45550->45551 45726 42fd14 68 API calls 45551->45726 45553 433504 _memset 45552->45553 45553->45548 45554 43353b 45553->45554 45737 421533 68 API calls 45553->45737 45729 433155 45554->45729 45559 4336e0 45560 43375e 45559->45560 45567 433711 45559->45567 45565 433771 45560->45565 45742 430336 68 API calls 45560->45742 45561 433744 45741 431223 112 API calls __atodbl_l 45561->45741 45564 433795 45568 4337e9 45564->45568 45744 4306ba 68 API calls 45564->45744 45565->45548 45565->45564 45743 42106c 68 API calls 45565->45743 45567->45561 45740 40970d 68 API calls 45567->45740 45572 43381b 45568->45572 45746 41684b 68 API calls 45568->45746 45747 4168d2 68 API calls 45572->45747 45573 43358f 45573->45548 45573->45559 45579 43349d 112 API calls 45573->45579 45739 432513 68 API calls _memset 45573->45739 45574 4337c1 45745 41689f 68 API calls 45574->45745 45578 433827 45748 4310a8 112 API calls 45578->45748 45579->45573 45581 433838 45582 433878 45581->45582 45749 4306ba 68 API calls 45581->45749 45585 43389b 45582->45585 45590 43391f 45582->45590 45584 433853 45750 41684b 68 API calls 45584->45750 45752 439f8c 112 API calls _memset 45585->45752 45589 433867 45751 416c34 68 API calls _memcpy_s 45589->45751 45590->45590 45755 4168d2 68 API calls 45590->45755 45591 433960 45756 423745 112 API calls 45591->45756 45593 4338b0 45593->45548 45753 43035a 112 API calls 45593->45753 45596 43390a 45754 43a700 68 API calls 45596->45754 45597 4339c8 45757 423745 112 API calls 45597->45757 45600 433916 45608 43425c 45600->45608 45818 430759 68 API calls 45600->45818 45601 4339d8 45609 433a12 45601->45609 45758 41f3ab 112 API calls 45601->45758 45603 433a53 45603->45548 45606 433ff2 45603->45606 45607 433a74 45603->45607 45614 434010 45606->45614 45619 43410f 45606->45619 45760 4306ba 68 API calls 45607->45760 45608->45548 45819 430bb6 68 API calls 45608->45819 45609->45603 45759 423745 112 API calls 45609->45759 45612 433a8b 45761 41689f 68 API calls 45612->45761 45800 42848c 99 API calls 45614->45800 45615 433ab0 45762 4168d2 68 API calls 45615->45762 45617 433ad6 45763 4168d2 68 API calls 45617->45763 45620 434136 45619->45620 45807 42106c 68 API calls 45619->45807 45808 4331cc 68 API calls 45620->45808 45622 434043 45801 4252c6 68 API calls 45622->45801 45625 433aed 45764 41684b 68 API calls 45625->45764 45627 434172 45809 439f8c 112 API calls _memset 45627->45809 45630 433b24 45765 41684b 68 API calls 45630->45765 45631 43409f 45803 41684b 68 API calls 45631->45803 45632 43418c 45635 434197 45632->45635 45636 4341a9 45632->45636 45810 421533 68 API calls 45635->45810 45811 4332f3 112 API calls 45636->45811 45637 4340bb 45642 4340d5 45637->45642 45804 416c34 68 API calls _memcpy_s 45637->45804 45638 433b39 45766 41684b 68 API calls 45638->45766 45639 434059 45639->45631 45802 4287d2 68 API calls 45639->45802 45805 41684b 68 API calls 45642->45805 45644 4341b7 45648 4341d8 45644->45648 45812 41684b 68 API calls 45644->45812 45647 433b51 45767 439f8c 112 API calls _memset 45647->45767 45813 43a700 68 API calls 45648->45813 45650 4340f2 45806 41684b 68 API calls 45650->45806 45652 4341e4 45814 4332a4 68 API calls 45652->45814 45656 434107 45815 423161 112 API calls 45656->45815 45658 433b84 45675 433db9 45658->45675 45776 41684b 68 API calls 45658->45776 45777 422d5c 112 API calls 45658->45777 45660 434207 45816 43035a 112 API calls 45660->45816 45661 433b69 45661->45548 45661->45658 45768 422ea9 112 API calls 45661->45768 45663 434221 45817 421533 68 API calls 45663->45817 45666 433dd8 45779 41684b 68 API calls 45666->45779 45669 433bfb 45769 41684b 68 API calls 45669->45769 45672 433df2 45780 4220ee 68 API calls 45672->45780 45778 41689f 68 API calls 45675->45778 45676 433e0a 45781 41684b 68 API calls 45676->45781 45677 433cb6 45772 41684b 68 API calls 45677->45772 45679 433e24 45782 41684b 68 API calls 45679->45782 45683 433cd7 45773 41684b 68 API calls 45683->45773 45684 433e3e 45783 41684b 68 API calls 45684->45783 45685 433c16 45685->45677 45770 421fb4 68 API calls 45685->45770 45771 41684b 68 API calls 45685->45771 45689 433e56 45784 4332f3 112 API calls 45689->45784 45691 433cef 45774 43a700 68 API calls 45691->45774 45693 433e7a 45785 41684b 68 API calls 45693->45785 45694 433d17 45775 41684b 68 API calls 45694->45775 45697 433e8b 45698 433eb0 45697->45698 45699 433e95 45697->45699 45787 43a700 68 API calls 45698->45787 45786 41684b 68 API calls 45699->45786 45702 433eab 45788 41684b 68 API calls 45702->45788 45704 433edf 45789 41684b 68 API calls 45704->45789 45706 433ef2 45790 41684b 68 API calls 45706->45790 45708 433f09 45791 41684b 68 API calls 45708->45791 45710 433f1e 45792 41684b 68 API calls 45710->45792 45712 433f45 45793 41684b 68 API calls 45712->45793 45714 433f5c 45794 4332a4 68 API calls 45714->45794 45716 433f6f 45795 423161 112 API calls 45716->45795 45718 433f80 45796 43035a 112 API calls 45718->45796 45720 433fa6 45797 41684b 68 API calls 45720->45797 45722 433fba 45798 4331cc 68 API calls 45722->45798 45724 433fd8 45799 41684b 68 API calls 45724->45799 45726->45541 45727->45545 45728->45546 45730 433165 45729->45730 45731 4331c7 45729->45731 45730->45731 45820 41f44b 45730->45820 45731->45548 45738 431074 68 API calls 45731->45738 45735 43319f 45735->45731 45736 41f44b 112 API calls 45735->45736 45736->45731 45737->45554 45738->45573 45739->45573 45740->45561 45741->45548 45742->45565 45743->45564 45744->45574 45745->45568 45746->45572 45747->45578 45748->45581 45749->45584 45750->45589 45751->45582 45752->45593 45753->45596 45754->45600 45755->45591 45756->45597 45757->45601 45758->45609 45759->45609 45760->45612 45761->45615 45762->45617 45763->45625 45764->45630 45765->45638 45766->45647 45767->45661 45768->45669 45769->45685 45770->45685 45771->45685 45772->45683 45773->45691 45774->45694 45775->45658 45776->45658 45777->45658 45778->45666 45779->45672 45780->45676 45781->45679 45782->45684 45783->45689 45784->45693 45785->45697 45786->45702 45787->45702 45788->45704 45789->45706 45790->45708 45791->45710 45792->45712 45793->45714 45794->45716 45795->45718 45796->45720 45797->45722 45798->45724 45799->45600 45800->45622 45801->45639 45802->45631 45803->45637 45804->45642 45805->45650 45806->45656 45807->45620 45808->45627 45809->45632 45810->45548 45811->45644 45812->45648 45813->45652 45814->45656 45815->45660 45816->45663 45817->45600 45818->45608 45819->45548 45821 41f52a 45820->45821 45824 41f45f 45820->45824 45821->45731 45827 420560 112 API calls 45821->45827 45822 41f41b 112 API calls 45822->45824 45823 41f3ab 112 API calls 45823->45824 45824->45821 45824->45822 45824->45823 45825 41f44b 112 API calls 45824->45825 45828 432bbc 45824->45828 45825->45824 45827->45735 45842 432bde 45828->45842 45848 432be6 45828->45848 45829 432d02 45829->45842 45867 42ff4e 68 API calls 45829->45867 45832 41f44b 112 API calls 45832->45848 45833 407e6f 68 API calls 45833->45848 45834 4330c4 45834->45842 45874 40970d 68 API calls 45834->45874 45835 432db4 45868 426bca 112 API calls 45835->45868 45836 432d18 45836->45834 45836->45842 45849 40970d 68 API calls 45836->45849 45850 4330ba 45836->45850 45851 420a50 68 API calls 45836->45851 45852 421445 68 API calls 45836->45852 45870 420ae3 68 API calls 45836->45870 45871 408e3d 68 API calls 45836->45871 45872 4214d3 68 API calls 45836->45872 45839 432dbd 45839->45842 45869 42133f 68 API calls 45839->45869 45842->45824 45844 432dd4 45847 41f44b 112 API calls 45844->45847 45847->45836 45848->45829 45848->45832 45848->45833 45848->45835 45848->45842 45856 4256a6 45848->45856 45864 408e3d 68 API calls 45848->45864 45865 430d6f 68 API calls 45848->45865 45866 432b5d 68 API calls 45848->45866 45849->45836 45873 421533 68 API calls 45850->45873 45851->45836 45852->45836 45875 42f620 45856->45875 45858 4256b7 45859 4256eb 45858->45859 45860 4256ff 45858->45860 45863 4256bb 45858->45863 45879 40970d 68 API calls 45859->45879 45880 40970d 68 API calls 45860->45880 45863->45848 45864->45848 45865->45848 45866->45848 45867->45836 45868->45839 45869->45844 45870->45836 45871->45836 45872->45836 45873->45834 45874->45842 45876 42f62c 45875->45876 45878 42f634 45875->45878 45881 42f561 45876->45881 45878->45858 45879->45863 45880->45863 45886 42f590 45881->45886 45882 42f5d3 45883 42f605 45882->45883 45885 42f234 112 API calls 45882->45885 45883->45878 45887 42f5f4 45885->45887 45886->45882 45890 42f234 45886->45890 45918 425824 68 API calls _memset 45886->45918 45887->45883 45919 425824 68 API calls _memset 45887->45919 45891 42f25e 45890->45891 45920 42f133 45891->45920 45893 42f2a5 45894 42f2df 45893->45894 45896 407e4b 68 API calls 45893->45896 45895 43e722 __atodbl_l 6 API calls 45894->45895 45897 42f55f 45895->45897 45898 42f2ff 45896->45898 45897->45886 45898->45894 45899 411374 82 API calls 45898->45899 45901 42f32c 45899->45901 45900 42f502 45939 408012 68 API calls 45900->45939 45901->45900 45902 42f377 45901->45902 45933 414445 82 API calls 45901->45933 45902->45900 45906 42f382 45902->45906 45905 42f3be 45908 42f3cd 45905->45908 45909 42f45c 45905->45909 45906->45905 45907 428a4b 68 API calls 45906->45907 45907->45905 45934 408012 68 API calls 45908->45934 45935 408e3d 68 API calls 45909->45935 45912 42f482 45936 42ce9e 112 API calls _memcpy_s 45912->45936 45914 42f4a3 45915 42f4ce 45914->45915 45937 424908 112 API calls 45914->45937 45915->45894 45938 425824 68 API calls _memset 45915->45938 45918->45886 45919->45883 45921 42f15c 45920->45921 45923 42f173 45920->45923 45940 42f0c5 68 API calls 45921->45940 45924 42f197 45923->45924 45928 42f184 45923->45928 45932 42f16a 45923->45932 45941 43ea97 81 API calls __wcstoi64 45924->45941 45927 42f1a2 45942 42ce9e 112 API calls _memcpy_s 45927->45942 45928->45932 45944 42f0c5 68 API calls 45928->45944 45930 42f1b7 45930->45932 45943 42f0c5 68 API calls 45930->45943 45932->45893 45933->45901 45934->45894 45935->45912 45936->45914 45937->45915 45938->45894 45939->45894 45940->45932 45941->45927 45942->45930 45943->45932 45944->45932

                                                  Executed Functions

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 379 401f3d-401f96 call 4471f0 RegOpenKeyExA 382 402393-4023a1 call 43e722 379->382 383 401f9c-401fcc RegEnumValueA 379->383 385 402049-402058 RegCloseKey 383->385 386 401fce 383->386 385->382 389 40205e 385->389 388 401fd4-401fd6 386->388 390 402043 388->390 391 401fd8-401fde 388->391 392 402063-402078 call 401329 389->392 390->385 394 401fe1-401fe6 391->394 397 40207b-402080 392->397 394->394 396 401fe8-401fed 394->396 398 402010-402041 RegEnumValueA 396->398 399 401fef-401ff5 396->399 397->397 400 402082-402087 397->400 398->388 398->390 399->390 401 401ff7-40200d call 43eab4 399->401 402 4020c5-4020d1 400->402 403 402089-40208b 400->403 401->398 402->392 407 4020d3-40214d CoInitialize CLSIDFromString * 2 CoCreateInstance 402->407 403->402 405 40208d-402093 403->405 408 402099-4020aa call 43ec53 405->408 409 402153-402168 407->409 410 40238d CoUninitialize 407->410 416 4020b9-4020bd 408->416 417 4020ac-4020b4 call 401cea 408->417 414 402381-402388 409->414 415 40216e-40218c 409->415 410->382 414->410 421 402192-402199 415->421 422 402375-40237c 415->422 416->408 419 4020bf 416->419 417->416 419->402 423 40234e-40236c 421->423 424 40219f-4021bf call 4407f7 421->424 422->414 423->422 429 40236e-402370 423->429 428 4021c2-4021cb 424->428 428->428 430 4021cd-4021f4 call 43f865 call 43eb6c 428->430 429->421 435 4021f6-4021f8 430->435 436 4021fb-402201 430->436 435->436 437 402204-40220d 436->437 437->437 438 40220f-40221c 437->438 439 40223b-402253 call 43f056 438->439 440 40221e-40222b 438->440 447 402273-40228c call 401329 439->447 448 402255-40226d call 43f056 439->448 441 402231-402233 440->441 442 4023a2-4023a7 call 4401e2 440->442 441->439 453 40228f-402294 447->453 448->423 448->447 453->453 454 402296-40229b 453->454 454->423 455 4022a1-4022a3 454->455 456 4022a5-4022ab 455->456 457 4022d7-402307 call 44067d call 401329 455->457 458 4022ad-4022be call 43ec53 456->458 468 40230a-40230f 457->468 464 4022c0-4022cc call 401cea 458->464 465 4022d1-4022d5 458->465 464->465 465->457 465->458 468->468 469 402311-402316 468->469 469->423 470 402318-40231a 469->470 470->423 471 40231c-402322 470->471 472 402324-402335 call 43ec53 471->472 475 402337-402343 call 401cea 472->475 476 402348-40234c 472->476 475->476 476->423 476->472
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32 ref: 00401F8E
                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00401FC1
                                                  • RegEnumValueA.ADVAPI32(?,00000001,?,00000400,00000000,00000000,00000000,00000000), ref: 00402036
                                                  • RegCloseKey.ADVAPI32(?), ref: 0040204F
                                                  • CoInitialize.OLE32(00000000), ref: 00402101
                                                  • CLSIDFromString.OLE32(?,?), ref: 0040211B
                                                  • CLSIDFromString.OLE32(?,?), ref: 0040212B
                                                  • CoCreateInstance.OLE32(?,00000000,00000001,?,?), ref: 00402145
                                                  • _wcschr.LIBCMT ref: 004021EA
                                                  • __wcsnicmp.LIBCMT ref: 00402249
                                                  • __wcsnicmp.LIBCMT ref: 00402263
                                                  • CoUninitialize.OLE32 ref: 0040238D
                                                  Strings
                                                  • Software\Microsoft\Internet Explorer\IntelliForms\Storage2, xrefs: 00401F5A
                                                  • http://, xrefs: 00402243
                                                  • {3C374A40-BAE4-11CF-BF7D-00AA006946EE}, xrefs: 004020D6
                                                  • https://, xrefs: 0040225D
                                                  • {AFA0DC11-C313-11D0-831A-00C04FD5AE38}, xrefs: 004020EF
                                                  • http://www.facebook.com/, xrefs: 0040205E
                                                  • /, xrefs: 00402213
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EnumFromStringValue__wcsnicmp$CloseCreateInitializeInstanceOpenUninitialize_wcschr
                                                  • String ID: /$Software\Microsoft\Internet Explorer\IntelliForms\Storage2$http://$http://www.facebook.com/$https://${3C374A40-BAE4-11CF-BF7D-00AA006946EE}${AFA0DC11-C313-11D0-831A-00C04FD5AE38}
                                                  • API String ID: 3508844707-2581409083
                                                  • Opcode ID: 7f87489f8755db533ae58970329c4496bff015cda9f0027fac09c0aadfecc4d1
                                                  • Instruction ID: 236733ae42f18aad4e7ad052d39f46084bc98a3f7ab2ed7f63f0882270a2222f
                                                  • Opcode Fuzzy Hash: 7f87489f8755db533ae58970329c4496bff015cda9f0027fac09c0aadfecc4d1
                                                  • Instruction Fuzzy Hash: 69C185719002199ADF24DAA0CD48BEA7779FB44304F1045EBEA09A71C1D7B59F86CF68
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  APIs
                                                    • Part of subcall function 004015C5: GetStdHandle.KERNEL32(000000F5), ref: 004015D7
                                                    • Part of subcall function 004015C5: GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 004015E2
                                                  • GetCurrentProcess.KERNEL32(000F01FF,?), ref: 004043D9
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 004043E0
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 004043F9
                                                  • AdjustTokenPrivileges.KERNELBASE(?,00000000,00000001,00000000,00000000,00000000), ref: 00404414
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 00401630
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 00401646
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 00401655
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 00401663
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 0040167B
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 00401685
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 0040168F
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 0040169A
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 004016A4
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 004016AF
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 004016B9
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 004016C7
                                                    • Part of subcall function 00401619: _wprintf.LIBCMT ref: 004016D1
                                                  • CloseHandle.KERNELBASE(?), ref: 00404428
                                                  • GetEnvironmentVariableA.KERNEL32(PROMPT,?,00000080), ref: 00404454
                                                  • _wprintf.LIBCMT ref: 0040451C
                                                  • _wprintf.LIBCMT ref: 00404528
                                                  Strings
                                                  • Error: Output file name is not specified., xrefs: 004044D8
                                                  • SeDebugPrivilege, xrefs: 004043F3
                                                  • Press any key to exit...., xrefs: 00404521
                                                  • Error: Invalid parameters specified., xrefs: 00404482
                                                  • This is command-line application. Kindly Run it from the CMD Prompt, xrefs: 00404517
                                                  • PROMPT, xrefs: 0040444F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wprintf$HandleProcessToken$AdjustBufferCloseConsoleCurrentEnvironmentInfoLookupOpenPrivilegePrivilegesScreenValueVariable
                                                  • String ID: Error: Invalid parameters specified.$ Error: Output file name is not specified.$ Press any key to exit....$ This is command-line application. Kindly Run it from the CMD Prompt$PROMPT$SeDebugPrivilege
                                                  • API String ID: 3116118200-3402409182
                                                  • Opcode ID: f3ba9d24fb922e6f1a57194ce43e474a6d1bc4482a3683ae625b8ba06c0e8581
                                                  • Instruction ID: 59766ebe2bd482bcbddda0e8b6d41e0098518e87eb0848bba48e726c3f20b9ed
                                                  • Opcode Fuzzy Hash: f3ba9d24fb922e6f1a57194ce43e474a6d1bc4482a3683ae625b8ba06c0e8581
                                                  • Instruction Fuzzy Hash: B341A2B1504204ABDB14AF719C45AAE7768AF8070EF1444BFFA05B51D2DF3D9E488A1D
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1056 449182-4491bf call 4471f0 1059 4491c1-4491c3 1056->1059 1060 4491c8-4491ca 1056->1060 1061 44999f-4499ab call 43e722 1059->1061 1062 4491cc-4491e6 call 442b40 call 442b74 call 441e30 1060->1062 1063 4491eb-449218 1060->1063 1062->1061 1066 44921f-449226 1063->1066 1067 44921a-44921d 1063->1067 1068 449244 1066->1068 1069 449228-44923f call 442b40 call 442b74 call 441e30 1066->1069 1067->1066 1072 44924a-44924f 1067->1072 1068->1072 1102 449990-449993 1069->1102 1075 449251-44925b call 44717e 1072->1075 1076 44925e-44926c call 44904c 1072->1076 1075->1076 1087 449272-449284 1076->1087 1088 44958a-44959c 1076->1088 1087->1088 1089 44928a-4492c2 call 4437fd GetConsoleMode 1087->1089 1090 4498f7-449914 WriteFile 1088->1090 1091 4495a2-4495b2 1088->1091 1089->1088 1107 4492c8-4492ce 1089->1107 1097 449916-44991e 1090->1097 1098 449920-449926 GetLastError 1090->1098 1094 4495b8-4495c3 1091->1094 1095 449699-44969e 1091->1095 1100 4495c9-4495d9 1094->1100 1101 44995a-449972 1094->1101 1104 4496a4-4496ad 1095->1104 1105 4497a2-4497ad 1095->1105 1103 449928 1097->1103 1098->1103 1108 4495df-4495e2 1100->1108 1109 449974-449977 1101->1109 1110 44997d-44998d call 442b74 call 442b40 1101->1110 1106 44999d-44999e 1102->1106 1112 44992e-449930 1103->1112 1104->1101 1113 4496b3 1104->1113 1105->1101 1111 4497b3 1105->1111 1106->1061 1115 4492d0-4492d2 1107->1115 1116 4492d8-4492fb GetConsoleCP 1107->1116 1117 4495e4-4495fd 1108->1117 1118 449628-44965f WriteFile 1108->1118 1109->1110 1119 449979-44997b 1109->1119 1110->1102 1120 4497bd-4497d2 1111->1120 1122 449995-44999b 1112->1122 1123 449932-449934 1112->1123 1114 4496bd-4496d4 1113->1114 1124 4496da-4496dd 1114->1124 1115->1088 1115->1116 1125 449301-449309 1116->1125 1126 44957f-449585 1116->1126 1127 4495ff-449609 1117->1127 1128 44960a-449626 1117->1128 1118->1098 1129 449665-449677 1118->1129 1119->1106 1130 4497d8-4497da 1120->1130 1122->1106 1123->1101 1132 449936-44993b 1123->1132 1135 44971d-449766 WriteFile 1124->1135 1136 4496df-4496f5 1124->1136 1137 449313-449315 1125->1137 1126->1123 1127->1128 1128->1108 1128->1118 1129->1112 1138 44967d-44968e 1129->1138 1139 449817-449858 WideCharToMultiByte 1130->1139 1140 4497dc-4497f2 1130->1140 1133 449951-449958 call 442b53 1132->1133 1134 44993d-44994f call 442b74 call 442b40 1132->1134 1133->1102 1134->1102 1135->1098 1147 44976c-449784 1135->1147 1144 4496f7-449709 1136->1144 1145 44970c-44971b 1136->1145 1148 4494aa-4494ad 1137->1148 1149 44931b-44933d 1137->1149 1138->1100 1150 449694 1138->1150 1139->1098 1143 44985e-449860 1139->1143 1151 4497f4-449803 1140->1151 1152 449806-449815 1140->1152 1155 449866-449899 WriteFile 1143->1155 1144->1145 1145->1124 1145->1135 1147->1112 1157 44978a-449797 1147->1157 1160 4494b4-4494e1 1148->1160 1161 4494af-4494b2 1148->1161 1158 449356-449362 call 449a28 1149->1158 1159 44933f-449354 1149->1159 1150->1112 1151->1152 1152->1130 1152->1139 1164 4498b9-4498cd GetLastError 1155->1164 1165 44989b-4498b5 1155->1165 1157->1114 1166 44979d 1157->1166 1180 449364-449378 1158->1180 1181 4493a8-4493aa 1158->1181 1167 4493b0-4493c2 call 44d183 1159->1167 1162 4494e7-4494ea 1160->1162 1161->1160 1161->1162 1169 4494f1-449504 call 44d04f 1162->1169 1170 4494ec-4494ef 1162->1170 1174 4498d3-4498d5 1164->1174 1165->1155 1172 4498b7 1165->1172 1166->1112 1183 449574-44957a 1167->1183 1184 4493c8 1167->1184 1169->1098 1189 44950a-449514 1169->1189 1170->1169 1176 449546-449549 1170->1176 1172->1174 1174->1103 1179 4498d7-4498ef 1174->1179 1176->1137 1186 44954f 1176->1186 1179->1120 1185 4498f5 1179->1185 1187 449551-44956c 1180->1187 1188 44937e-449393 call 44d183 1180->1188 1181->1167 1183->1103 1190 4493ce-449403 WideCharToMultiByte 1184->1190 1185->1112 1186->1183 1187->1183 1188->1183 1196 449399-4493a6 1188->1196 1193 449516-44952d call 44d04f 1189->1193 1194 44953a-449540 1189->1194 1190->1183 1195 449409-44942f WriteFile 1190->1195 1193->1098 1201 449533-449534 1193->1201 1194->1176 1195->1098 1198 449435-44944d 1195->1198 1196->1190 1198->1183 1200 449453-44945a 1198->1200 1200->1194 1202 449460-44948b WriteFile 1200->1202 1201->1194 1202->1098 1203 449491-449498 1202->1203 1203->1183 1204 44949e-4494a5 1203->1204 1204->1194
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5c8076e0f52b7b85f682d71cd05aa8b96f7182b20a72c2dcf6ae6f99bfd7d098
                                                  • Instruction ID: cd91675c22560a5d21e0ad0fa57d62ad70b5a515cc01d08771c07ebf934e8d1b
                                                  • Opcode Fuzzy Hash: 5c8076e0f52b7b85f682d71cd05aa8b96f7182b20a72c2dcf6ae6f99bfd7d098
                                                  • Instruction Fuzzy Hash: 16328F75A022289BDB24CF55DC80AEAB7F5FB46314F1840DAE40AE7B81D7349E81DF46
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  APIs
                                                    • Part of subcall function 0040AF25: GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000200,-00000003,?,?,?,0040B024,?,?,00000104,?,?,-00000003), ref: 0040AF45
                                                    • Part of subcall function 0040AF25: _malloc.LIBCMT ref: 0040AF55
                                                    • Part of subcall function 0040AF25: _free.LIBCMT ref: 0040AF62
                                                    • Part of subcall function 0040A347: GetVersionExA.KERNEL32(?), ref: 0040A375
                                                  • GetDiskFreeSpaceW.KERNELBASE(00000000,?,?,?,?,?,?,-00000003,?), ref: 0040B082
                                                  • GetDiskFreeSpaceA.KERNEL32(00000000,?,?,?,?,?,?,-00000003,?), ref: 0040B0B6
                                                  • _free.LIBCMT ref: 0040B0BF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DiskFreeSpace_free$FullNamePathVersion_malloc
                                                  • String ID:
                                                  • API String ID: 138112127-0
                                                  • Opcode ID: 03a91d142b656b8a7c1163a91063fe475db5ceecb728297f49f0982ea8f6f4a1
                                                  • Instruction ID: 51d722c3fd77eccce6d57187154632daab7a80a4c3c7704d5c4690b09382290e
                                                  • Opcode Fuzzy Hash: 03a91d142b656b8a7c1163a91063fe475db5ceecb728297f49f0982ea8f6f4a1
                                                  • Instruction Fuzzy Hash: 2A21977190021C9ED726AB658C42BEB73ACDF05704F1404BBE615E71D1EB789E848BEE
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 00401230: RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Internet Explorer,00000000,00020019,?), ref: 00401278
                                                    • Part of subcall function 00401230: RegQueryValueExA.KERNEL32(?,svcVersion,00000000,?,?,?), ref: 004012AE
                                                    • Part of subcall function 00401230: RegQueryValueExA.ADVAPI32(?,Version,00000000,?,?,?), ref: 004012E0
                                                    • Part of subcall function 00401230: RegCloseKey.KERNEL32(?), ref: 00401313
                                                  • _memset.LIBCMT ref: 004041DA
                                                  • GetVersionExA.KERNEL32(?), ref: 004041EB
                                                  • FreeLibrary.KERNEL32(00000000), ref: 0040428A
                                                    • Part of subcall function 004040B8: LoadLibraryA.KERNEL32(vaultcli.dll), ref: 004040C4
                                                    • Part of subcall function 004040B8: GetLastError.KERNEL32 ref: 004040D3
                                                    • Part of subcall function 004023A8: CredEnumerateA.ADVAPI32(00000000,00000000,?,?), ref: 00402400
                                                    • Part of subcall function 004023A8: CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,00000000,?), ref: 00402485
                                                    • Part of subcall function 004023A8: ___from_strstr_to_strchr.LIBCMT ref: 004024A1
                                                    • Part of subcall function 004023A8: _strstr.LIBCMT ref: 004024BF
                                                    • Part of subcall function 004023A8: swprintf.LIBCMT ref: 004024F2
                                                    • Part of subcall function 00401F3D: RegOpenKeyExA.KERNEL32 ref: 00401F8E
                                                    • Part of subcall function 00401F3D: RegEnumValueA.ADVAPI32(?,00000000,?,00000400,00000000,00000000,00000000,00000000), ref: 00401FC1
                                                    • Part of subcall function 00401F3D: RegEnumValueA.ADVAPI32(?,00000001,?,00000400,00000000,00000000,00000000,00000000), ref: 00402036
                                                    • Part of subcall function 00401F3D: RegCloseKey.ADVAPI32(?), ref: 0040204F
                                                    • Part of subcall function 004025C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000), ref: 004026C2
                                                    • Part of subcall function 004025C9: _strstr.LIBCMT ref: 004026F6
                                                    • Part of subcall function 004025C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000), ref: 00402721
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Value$ByteCharCloseEnumLibraryMultiOpenQueryWide_strstr$CredCryptDataEnumerateErrorFreeLastLoadUnprotectVersion___from_strstr_to_strchr_memsetswprintf
                                                  • String ID:
                                                  • API String ID: 3661251238-0
                                                  • Opcode ID: e674d39f9758df4f8e82d0dd90810e70705767e8847f169ce77e2ebd7a0b8721
                                                  • Instruction ID: fd32af64a4bd8ed847c377ae70c93f11884c7e67fa000ae0ba9ef4fe83d88d80
                                                  • Opcode Fuzzy Hash: e674d39f9758df4f8e82d0dd90810e70705767e8847f169ce77e2ebd7a0b8721
                                                  • Instruction Fuzzy Hash: BA21D1716043009AD624BB72AD0BB5E33945F44719F00093FF284BA0D2DEBCC1848A9F
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(?), ref: 0044704F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 7c28c69a44da227d4f6a6a7b2ceac40ed25bb325f8b16ddcd9fe6da40a2bd230
                                                  • Instruction ID: e8f4d733dc47490eb7cf8ae9516b4b5e02db13001603bf70689deaeb25ce38b9
                                                  • Opcode Fuzzy Hash: 7c28c69a44da227d4f6a6a7b2ceac40ed25bb325f8b16ddcd9fe6da40a2bd230
                                                  • Instruction Fuzzy Hash: 47A0123000020CA78A001B81EC084447F6CD6411557004024F40C04022973294904584
                                                  Uniqueness

                                                  Uniqueness Score: 0.01%

                                                  APIs
                                                  • ___createFile.LIBCMT ref: 0044D7C9
                                                  • ___createFile.LIBCMT ref: 0044D80A
                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 0044D833
                                                  • __dosmaperr.LIBCMT ref: 0044D83A
                                                  • GetFileType.KERNELBASE(00000000), ref: 0044D84D
                                                  • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 0044D870
                                                  • __dosmaperr.LIBCMT ref: 0044D879
                                                  • CloseHandle.KERNEL32(00000000), ref: 0044D882
                                                  • __set_osfhnd.LIBCMT ref: 0044D8B2
                                                  • __lseeki64_nolock.LIBCMT ref: 0044D91C
                                                  • __close_nolock.LIBCMT ref: 0044D942
                                                  • __chsize_nolock.LIBCMT ref: 0044D972
                                                  • __lseeki64_nolock.LIBCMT ref: 0044D984
                                                  • __lseeki64_nolock.LIBCMT ref: 0044DA7C
                                                  • __lseeki64_nolock.LIBCMT ref: 0044DA91
                                                  • __close_nolock.LIBCMT ref: 0044DAF1
                                                    • Part of subcall function 004472E5: CloseHandle.KERNELBASE(00000000), ref: 00447335
                                                    • Part of subcall function 004472E5: GetLastError.KERNEL32(?,0044D947,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0044733F
                                                    • Part of subcall function 004472E5: __free_osfhnd.LIBCMT ref: 0044734C
                                                    • Part of subcall function 004472E5: __dosmaperr.LIBCMT ref: 0044736E
                                                    • Part of subcall function 00442B74: __getptd_noexit.LIBCMT ref: 00442B74
                                                  • __lseeki64_nolock.LIBCMT ref: 0044DB13
                                                  • CloseHandle.KERNEL32(00000000), ref: 0044DC48
                                                  • ___createFile.LIBCMT ref: 0044DC67
                                                  • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 0044DC74
                                                  • __dosmaperr.LIBCMT ref: 0044DC7B
                                                  • __free_osfhnd.LIBCMT ref: 0044DC9B
                                                  • __invoke_watson.LIBCMT ref: 0044DCC9
                                                  • CloseHandle.KERNEL32(FFFFFFFE), ref: 0044DCDF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __lseeki64_nolock$CloseErrorFileHandleLast__dosmaperr$___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd
                                                  • String ID: @
                                                  • API String ID: 1064426618-2766056989
                                                  • Opcode ID: 3cdf5bc2911dc7f0f11f22361461cf2e50e6765ff7f52354feb2638c1a609017
                                                  • Instruction ID: 8ea6f17564dfb676ff10ddab6c0d4b3c0eb05905e4ba26a90d8d423bbbda1119
                                                  • Opcode Fuzzy Hash: 3cdf5bc2911dc7f0f11f22361461cf2e50e6765ff7f52354feb2638c1a609017
                                                  • Instruction Fuzzy Hash: 6A221071D042059BFB289F68DC85BAE7B60EF04328F25422BE525AB3E2C73D8D41C759
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 225 405778-40580c call 4471f0 call 43eab4 call 43eb09 GetFileAttributesA 232 405821-405863 GetLastError call 43eab4 call 43eb09 GetFileAttributesA 225->232 233 40580e-40581c call 40541a 225->233 243 405865-405885 call 43e066 232->243 244 4058aa-4058f9 GetLastError call 43eab4 call 43eb09 call 43f970 232->244 238 405bb6-405bc4 call 43e722 233->238 243->238 249 40588b-4058a5 call 40526d call 43d5b9 243->249 258 405907-405952 call 43eab4 call 43eb09 call 43f970 244->258 259 4058fb-405901 244->259 249->238 276 405961-40599d call 43eab4 call 43eb09 call 43f970 258->276 277 405954-40595a 258->277 259->258 260 4059bc-4059c9 call 405dba 259->260 260->238 267 4059cf-4059d2 260->267 269 4059f2-4059f5 267->269 270 4059d4-4059ec call 44a248 267->270 273 405a43-405a50 call 405dba 269->273 274 4059f7-405a0f call 44a248 269->274 270->238 270->269 284 405a52 273->284 285 405a17-405a1d 273->285 274->238 287 405a15 274->287 299 4059a2-4059a7 276->299 277->276 281 40595c-40595f 277->281 281->260 288 405ba3-405bb0 call 405dba 284->288 290 405a20-405a25 285->290 287->273 288->238 300 405a57-405a78 call 43eab4 288->300 290->290 293 405a27-405a29 290->293 296 405a38-405a3e call 40119b 293->296 297 405a2b-405a32 293->297 296->273 297->288 297->296 299->238 302 4059ad-4059b3 299->302 305 405ac7-405ac9 300->305 302->238 304 4059b9-4059bb 302->304 304->260 306 405b90-405b9d call 405dba 305->306 306->288 309 405a7a-405a80 306->309 310 405a83-405a88 309->310 310->310 311 405a8a-405a8f 310->311 312 405a91-405aa9 call 440f40 311->312 313 405aaf-405ab7 311->313 312->306 312->313 313->288 315 405abd-405ac0 313->315 316 405ac2-405ac5 315->316 317 405ace-405ad0 315->317 316->305 316->317 319 405ad2-405b02 call 43eab4 call 405dba 317->319 320 405b04-405b2a call 43eab4 call 405dba 317->320 329 405b30-405b32 319->329 320->329 329->288 330 405b34-405b4e call 405cd0 329->330 330->238 333 405b50-405b56 330->333 334 405b66-405b6e 333->334 335 405b58-405b64 333->335 336 405b8f 334->336 337 405b70-405b76 334->337 335->336 336->306 337->336 338 405b78-405b8e call 403f04 337->338 338->336
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(?,00000001,00000001,00000000,?,0040366A,?), ref: 00405803
                                                  • GetLastError.KERNEL32(?,0040366A,?), ref: 00405827
                                                  • GetFileAttributesA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,0040366A,?), ref: 0040585A
                                                    • Part of subcall function 0040541A: GetTempPathA.KERNEL32(00000410,?), ref: 0040544B
                                                    • Part of subcall function 0040541A: __time64.LIBCMT ref: 00405458
                                                    • Part of subcall function 0040541A: __allrem.LIBCMT ref: 00405470
                                                    • Part of subcall function 0040541A: swprintf.LIBCMT ref: 00405485
                                                    • Part of subcall function 0040541A: GetLastError.KERNEL32(?,?,00000000,?,?,0000022B,00000000,?,00000208,00000003,?,0040581C,?,0040366A,?), ref: 004054C0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesErrorFileLast$PathTemp__allrem__time64swprintf
                                                  • String ID: #2c$#2d$---$.$/signons.txt$/signons2.txt$/signons3.txt$\logins.json$\signons.sqlite$j6@
                                                  • API String ID: 1317575291-2039412583
                                                  • Opcode ID: bf6b42526533325b13c9d4b9a3fa12a431bec66e2881922a2b2a6146ca432814
                                                  • Instruction ID: eb684abbe1a659daf7df9d89132785e23275345fda7c5fa6c0dac7c703dc911f
                                                  • Opcode Fuzzy Hash: bf6b42526533325b13c9d4b9a3fa12a431bec66e2881922a2b2a6146ca432814
                                                  • Instruction Fuzzy Hash: AAB1C171901B289ACF20DB91CC49ADB7379EF15315F1041B7E804B6181EBB9AF89CF89
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • __wfopen_s.LIBCMT ref: 004042B5
                                                  • _wprintf.LIBCMT ref: 0040432E
                                                  • _wprintf.LIBCMT ref: 00404338
                                                  • _fprintf.LIBCMT ref: 00404354
                                                  • _fprintf.LIBCMT ref: 00404369
                                                  • _wprintf.LIBCMT ref: 00404390
                                                    • Part of subcall function 0043F2C0: _strlen.LIBCMT ref: 0043F366
                                                    • Part of subcall function 0043F2C0: __lock_file.LIBCMT ref: 0043F371
                                                    • Part of subcall function 0043F2C0: __stbuf.LIBCMT ref: 0043F37D
                                                    • Part of subcall function 0043F2C0: __ftbuf.LIBCMT ref: 0043F395
                                                  Strings
                                                  • _______________________________________________________________________, xrefs: 00404349
                                                  • Username, xrefs: 0040431F
                                                  • **********************************************, xrefs: 004042CC
                                                  • Password, xrefs: 0040431A
                                                  • **********************************************, xrefs: 004042EC
                                                  • Error: Failed to create file '%s' for writing Password list. Make sure you have specified correct & full file path, xrefs: 004042F9
                                                  • Produced by %s from http://www.SecurityXploded.com, xrefs: 0040435E
                                                  • Website URL, xrefs: 00404315
                                                  • ==============================================================================================================, xrefs: 00404333
                                                  • %-20s %-30s %-20s %-s, xrefs: 00404329
                                                  • BrowserPasswordDump, xrefs: 00404359, 00404386
                                                  • Browser Password Recovery Report, xrefs: 004042DC
                                                  • Tip: For more options type %s.exe -h , xrefs: 0040438B
                                                  • Browser, xrefs: 00404324
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wprintf$_fprintf$__ftbuf__lock_file__stbuf__wfopen_s_strlen
                                                  • String ID: %-20s %-30s %-20s %-s$ Tip: For more options type %s.exe -h $_______________________________________________________________________$ **********************************************$ Error: Failed to create file '%s' for writing Password list. Make sure you have specified correct & full file path$ Browser Password Recovery Report$ **********************************************$ ==============================================================================================================$ Produced by %s from http://www.SecurityXploded.com$Browser$BrowserPasswordDump$Password$Username$Website URL
                                                  • API String ID: 718506414-2565730701
                                                  • Opcode ID: 47cfa29c0ea67c11a33e437b5fc8003e63d5b32d05c2c8d7534f195a6c6307af
                                                  • Instruction ID: 630b8d98e6f98468579705620ca41fb454552b89908472decd622954546fdb52
                                                  • Opcode Fuzzy Hash: 47cfa29c0ea67c11a33e437b5fc8003e63d5b32d05c2c8d7534f195a6c6307af
                                                  • Instruction Fuzzy Hash: C211A072AC8710F2D91533626C63F5A26056A49B0BB2526BFFD00341E3AEAE5C1D905F
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 478 402c57-402cd3 call 4471f0 call 4462f0 * 2 485 402cd5-402cda 478->485 486 402cdc-402cdf 478->486 487 402d05-402d2f call 43eab4 SHGetFolderPathA 485->487 488 402ce1-402ce6 486->488 489 402ce8-402ceb 486->489 496 402d35-402d63 call 43eb09 GetFileAttributesA 487->496 497 40300e-40301c call 43e722 487->497 488->487 490 402cf4-402cf7 489->490 491 402ced-402cf2 489->491 493 402d00 490->493 494 402cf9-402cfe 490->494 491->487 493->487 494->487 502 403008 GetLastError 496->502 503 402d69-402d6b 496->503 502->497 503->502 504 402d71-402d8e call 43eab4 503->504 507 402d91-402d96 504->507 507->507 508 402d98-402da2 507->508 509 402da4-402dbb call 43eb09 508->509 510 402dbd-402de3 call 43eb09 * 2 508->510 515 402de6-402df2 GetFileAttributesA 509->515 510->515 517 402df4-402df6 515->517 518 402dfc-402e31 call 43eab4 * 2 515->518 517->518 520 402e89-402ecc GetTempPathA call 43eb09 CopyFileA 517->520 530 402e34-402e39 518->530 526 402edc 520->526 527 402ece-402eda GetLastError 520->527 529 402ee2-402ef4 call 43e066 526->529 527->529 529->497 536 402efa-402f00 529->536 530->530 532 402e3b-402e45 530->532 534 402e60-402e86 call 43eb09 * 2 532->534 535 402e47-402e5e call 43eb09 532->535 534->520 535->520 539 402f03-402f08 536->539 539->539 542 402f0a-402f2c call 42f9e8 539->542 542->497 547 402f32-402f38 542->547 547->497 548 402f3e-402f4a call 418e40 547->548 551 402fd8-402fdb 548->551 552 402fe1-403006 call 418878 call 43d5b9 DeleteFileA 551->552 553 402f4f-402f52 551->553 552->497 553->552 554 402f58-402fd5 call 4192f5 call 43eab4 call 4192f5 call 4191ff call 419224 call 402884 call 403f04 call 418e40 553->554 554->551
                                                  APIs
                                                  • _memset.LIBCMT ref: 00402C8C
                                                  • _memset.LIBCMT ref: 00402CAA
                                                  • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00402D27
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00402D5E
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00402DED
                                                  • GetTempPathA.KERNEL32(000003E8,?), ref: 00402E96
                                                  • CopyFileA.KERNEL32(?,?,00000000), ref: 00402EC4
                                                  • GetLastError.KERNEL32 ref: 00402ECE
                                                  • DeleteFileA.KERNELBASE(?), ref: 00403000
                                                  • GetLastError.KERNEL32 ref: 00403008
                                                    • Part of subcall function 00402884: CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004028A6
                                                    • Part of subcall function 00402884: GetLastError.KERNEL32 ref: 004028B0
                                                  Strings
                                                  • Web Data, xrefs: 00402C71
                                                  • \Google\Chrome\User Data\Default\, xrefs: 00402D00
                                                  • \Comodo\Dragon\User Data\Default\, xrefs: 00402CED
                                                  • \, xrefs: 00402E3D
                                                  • Login Data, xrefs: 00402C91
                                                  • \Chromium\User Data\Default\, xrefs: 00402CF9
                                                  • select * from logins where blacklisted_by_user=0;, xrefs: 00402CC1
                                                  • \Google\Chrome SxS\User Data\Default\, xrefs: 00402CE1
                                                  • \MapleStudio\ChromePlus\User Data\Default\, xrefs: 00402CD5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$ErrorLast$AttributesPath_memset$CopyCryptDataDeleteFolderTempUnprotect
                                                  • String ID: Login Data$Web Data$\$\Chromium\User Data\Default\$\Comodo\Dragon\User Data\Default\$\Google\Chrome SxS\User Data\Default\$\Google\Chrome\User Data\Default\$\MapleStudio\ChromePlus\User Data\Default\$select * from logins where blacklisted_by_user=0;
                                                  • API String ID: 1402508811-4185613998
                                                  • Opcode ID: 9be94a1e263b17595b1ff09a036508637bb48d1e7a244499210e42673a8470a9
                                                  • Instruction ID: 475c2dbbdadf3be3901553f0f28ca0f70ac7c6f88b815937ee2b87c8547c8229
                                                  • Opcode Fuzzy Hash: 9be94a1e263b17595b1ff09a036508637bb48d1e7a244499210e42673a8470a9
                                                  • Instruction Fuzzy Hash: 1EA18471801219AADF20EA61DC49EDE777CAF45304F0405EBF509F21C2EB799B89CB99
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • _memset.LIBCMT ref: 00403D6F
                                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 00403D93
                                                  • swprintf.LIBCMT ref: 00403DBE
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00403DD3
                                                    • Part of subcall function 00403C38: _memset.LIBCMT ref: 00403C65
                                                    • Part of subcall function 00403C38: SHGetFolderPathA.SHELL32(00000000,0000002A,00000000,00000000,00000000), ref: 00403C81
                                                    • Part of subcall function 00403C38: GetLastError.KERNEL32 ref: 00403C8D
                                                    • Part of subcall function 00403C38: SHGetFolderPathA.SHELL32(00000000,00000026,00000000,00000000,00000000), ref: 00403C9D
                                                    • Part of subcall function 00403C38: GetLastError.KERNEL32 ref: 00403CA3
                                                    • Part of subcall function 00403C38: swprintf.LIBCMT ref: 00403CC0
                                                    • Part of subcall function 00403C38: GetFileAttributesA.KERNEL32 ref: 00403CC9
                                                  • GetTempPathA.KERNEL32(00000208,?), ref: 00403E01
                                                  • swprintf.LIBCMT ref: 00403E1B
                                                  • swprintf.LIBCMT ref: 00403E42
                                                  • _memset.LIBCMT ref: 00403E53
                                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00403E90
                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00403EA2
                                                  • CloseHandle.KERNEL32(?), ref: 00403EB4
                                                  • CloseHandle.KERNEL32(?), ref: 00403EBC
                                                  • GetFileAttributesA.KERNEL32(?), ref: 00403EC5
                                                    • Part of subcall function 00403835: __wfopen_s.LIBCMT ref: 00403862
                                                    • Part of subcall function 00403835: _fgets.LIBCMT ref: 00403893
                                                    • Part of subcall function 00403835: _strstr.LIBCMT ref: 004038FA
                                                    • Part of subcall function 00403835: _fgets.LIBCMT ref: 00403C00
                                                  • GetLastError.KERNEL32 ref: 00403EED
                                                  Strings
                                                  • "%s" -convert xml1 -s -o "%s" "%s", xrefs: 00403E35
                                                  • Apple Computer\Preferences, xrefs: 00403D77
                                                  • %s\%s\keychain.plist, xrefs: 00403DAC
                                                  • %skeytest.tmp, xrefs: 00403E0E
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Pathswprintf$AttributesErrorFileFolderLast_memset$CloseHandle_fgets$CreateObjectProcessSingleTempWait__wfopen_s_strstr
                                                  • String ID: "%s" -convert xml1 -s -o "%s" "%s"$%s\%s\keychain.plist$%skeytest.tmp$Apple Computer\Preferences
                                                  • API String ID: 1339761189-2073509708
                                                  • Opcode ID: 5e06d0cce004dfa5a0986d7c18c5cc25ad5765322c4bb6ba961a49ae3027e71e
                                                  • Instruction ID: 41227ee00fa3c387e793d291abb7524b8f06c8f582b7bb6b8e5a3bf9e8fe634e
                                                  • Opcode Fuzzy Hash: 5e06d0cce004dfa5a0986d7c18c5cc25ad5765322c4bb6ba961a49ae3027e71e
                                                  • Instruction Fuzzy Hash: 30414F72901228AEDB20EB65DC44EDB7BBCEB49319F4005A6E509E6191D7349B88CF54
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 602 405bc5-405bd1 603 405bd7-405be0 SetDllDirectoryA call 40516f 602->603 604 405ccc-405ccf 602->604 606 405be5-405bec 603->606 607 405bf4-405c03 SetDllDirectoryA 606->607 608 405bee GetLastError 606->608 607->604 609 405c09-405c8f 74ECFFF6 * 7 607->609 608->607 610 405c91-405c98 609->610 611 405cc7 call 4053f5 609->611 610->611 612 405c9a-405ca1 610->612 611->604 612->611 614 405ca3-405caa 612->614 614->611 615 405cac-405cb3 614->615 615->611 616 405cb5-405cbc 615->616 616->611 617 405cbe-405cc0 616->617 617->611 618 405cc2-405cc6 617->618
                                                  APIs
                                                  • SetDllDirectoryA.KERNEL32(00000000), ref: 00405BD8
                                                    • Part of subcall function 0040516F: _memset.LIBCMT ref: 0040519E
                                                    • Part of subcall function 0040516F: LoadLibraryA.KERNEL32(?), ref: 004051E4
                                                  • GetLastError.KERNEL32 ref: 00405BEE
                                                    • Part of subcall function 004053F5: FreeLibrary.KERNELBASE(658D0000,00405CCC), ref: 00405413
                                                  • SetDllDirectoryA.KERNEL32(00000000), ref: 00405BF6
                                                  • 74ECFFF6.KERNEL32(658D0000,NSS_Init), ref: 00405C15
                                                  • 74ECFFF6.KERNEL32(NSS_Shutdown), ref: 00405C27
                                                  • 74ECFFF6.KERNEL32(PK11_GetInternalKeySlot), ref: 00405C39
                                                  • 74ECFFF6.KERNEL32(PK11_FreeSlot), ref: 00405C4B
                                                  • 74ECFFF6.KERNEL32(PK11_Authenticate), ref: 00405C5D
                                                  • 74ECFFF6.KERNEL32(PK11SDR_Decrypt), ref: 00405C6F
                                                  • 74ECFFF6.KERNEL32(PK11_CheckUserPassword), ref: 00405C81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: DirectoryLibrary$ErrorFreeLastLoad_memset
                                                  • String ID: NSS_Init$NSS_Shutdown$PK11SDR_Decrypt$PK11_Authenticate$PK11_CheckUserPassword$PK11_FreeSlot$PK11_GetInternalKeySlot
                                                  • API String ID: 278284886-407999416
                                                  • Opcode ID: b5cb34ab79fa6cfaef68245d33a602da3d8fc0003e64d6a5b7f3d719eaff5285
                                                  • Instruction ID: 33f9fd3df8d800ae195e91ad112411a557fb3dc968ffaa99ed7acbf39a18f2f8
                                                  • Opcode Fuzzy Hash: b5cb34ab79fa6cfaef68245d33a602da3d8fc0003e64d6a5b7f3d719eaff5285
                                                  • Instruction Fuzzy Hash: EA21B530955B119ADB616F75EC097573FA8FB14B0AF14453AE804A22E1E7F88C88CF4E
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 619 4046e6-404726 call 4462f0 622 404728-40472d 619->622 623 40472f 619->623 624 404734-404756 call 43eab4 SHGetFolderPathA 622->624 623->624 627 404758 GetLastError 624->627 628 40476f-4047e3 call 43eab4 call 43eb09 * 3 call 43f970 624->628 629 40475e 627->629 628->629 643 4047e9-4047ef 628->643 631 404760-40476e call 43e722 629->631 643->629 644 4047f5-4047fa 643->644 645 40483a-404852 call 43fb0d 644->645 648 404854-40485a call 4408bf 645->648 649 4047fc-404813 call 43f00f 645->649 652 40485f-404862 648->652 654 404815-404824 call 43f3d0 649->654 655 404829-404838 call 43f3d0 649->655 652->631 654->645 660 404826-404827 654->660 655->645 661 404867-40487c call 43f3d0 655->661 660->645 664 404881-404887 661->664 665 40487e 661->665 666 40488a-40488f 664->666 665->664 666->666 667 404891-404896 666->667 668 404949-40494e call 4401e2 667->668 669 40489c-4048be call 43f3d0 667->669 674 4048c1-4048c6 669->674 674->674 675 4048c8-4048d0 674->675 676 4048d3-4048d8 675->676 676->676 677 4048da-4048de 676->677 678 4048e1-4048e6 677->678 678->678 679 4048e8-4048fc call 43ea05 678->679 679->648 682 404902-404944 call 43eab4 call 43eb09 * 4 679->682 682->648
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _strstr$ErrorFolderLastPath__wfopen_s_fgets_malloc_memset
                                                  • String ID: Mozilla\Firefox$Mozilla\SeaMonkey$\profiles.ini$name=default$path=
                                                  • API String ID: 445489200-2403234793
                                                  • Opcode ID: bb06624a5f386399a0e46f90a4713bd5a58578662c1adb941874b5914deee0a7
                                                  • Instruction ID: 5d159dd8fd3ed4980fe34b3e7b0823016142e5176c53a03b6f7e1e881f64c5d4
                                                  • Opcode Fuzzy Hash: bb06624a5f386399a0e46f90a4713bd5a58578662c1adb941874b5914deee0a7
                                                  • Instruction Fuzzy Hash: 485130B6800218A9CB10EA218C45ED777ACAF55314F1454BFF945E31C2EF7C9E8D8BA8
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __getptd_noexit
                                                  • String ID:
                                                  • API String ID: 3074181302-0
                                                  • Opcode ID: 198de1bab5617eeda00c947a63fbcf17f6d6a85220c91ed19c33406133fa0118
                                                  • Instruction ID: c87d0283bc661d25fb0c7cd8753e25f38135e614682ba155fc5e60357fb449ea
                                                  • Opcode Fuzzy Hash: 198de1bab5617eeda00c947a63fbcf17f6d6a85220c91ed19c33406133fa0118
                                                  • Instruction Fuzzy Hash: A5324A70A042919FFB218F58D840BAE7BB1EF17304F26405FE8959B392D7789842CB5B
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 968 4028d1-40296d call 4471f0 call 4462f0 * 2 SHGetFolderPathA 975 402973-40299e call 43eb09 GetFileAttributesA 968->975 976 402c48-402c56 call 43e722 968->976 981 402c42 GetLastError 975->981 982 4029a4-4029a6 975->982 981->976 982->981 983 4029ac-4029c9 call 43eab4 982->983 986 4029cc-4029d1 983->986 986->986 987 4029d3-4029dd 986->987 988 4029f8-402a1e call 43eb09 * 2 987->988 989 4029df-4029f6 call 43eb09 987->989 994 402a21-402a2d GetFileAttributesA 988->994 989->994 996 402a37-402a6c call 43eab4 * 2 994->996 997 402a2f-402a31 994->997 1007 402a6f-402a74 996->1007 997->996 999 402ac4-402b05 GetTempPathA call 43eb09 997->999 1008 402b15 999->1008 1009 402b07-402b13 GetLastError 999->1009 1007->1007 1010 402a76-402a80 1007->1010 1011 402b1b-402b2d call 43e066 1008->1011 1009->1011 1012 402a82-402a99 call 43eb09 1010->1012 1013 402a9b-402ac1 call 43eb09 * 2 1010->1013 1011->976 1020 402b33-402b39 1011->1020 1012->999 1013->999 1022 402b3c-402b41 1020->1022 1022->1022 1024 402b43-402b65 call 42f9e8 1022->1024 1024->976 1027 402b6b-402b71 1024->1027 1027->976 1028 402b77-402b83 call 418e40 1027->1028 1031 402c12-402c15 1028->1031 1032 402b88-402b8b 1031->1032 1033 402c1b-402c40 call 418878 call 43d5b9 1031->1033 1032->1033 1034 402b91-402c0f call 4192f5 call 43eab4 call 4192f5 call 4191ff call 419224 call 402884 call 403f04 call 418e40 1032->1034 1033->976 1034->1031
                                                  APIs
                                                  • _memset.LIBCMT ref: 00402905
                                                  • _memset.LIBCMT ref: 00402924
                                                  • SHGetFolderPathA.SHELL32(00000000,0000001C,00000000,00000000,?), ref: 00402965
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00402999
                                                  • GetFileAttributesA.KERNEL32(?), ref: 00402A28
                                                  • GetTempPathA.KERNEL32(000003E8,?), ref: 00402AD1
                                                  • GetLastError.KERNEL32 ref: 00402B07
                                                  • GetLastError.KERNEL32 ref: 00402C42
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesErrorFileLastPath_memset$FolderTemp
                                                  • String ID: Login Data$Web Data$\$\Flock\User Data\Default\$select * from logins where blacklisted_by_user=0;
                                                  • API String ID: 4148099018-2542716756
                                                  • Opcode ID: d69c29696ab55aa258689c83827ff8b50f1a507cc4d0bf406687d7f06f607ffb
                                                  • Instruction ID: d80c0ffb2774b6a9b077eef6b7c2af799138db415b37355424118949e037b087
                                                  • Opcode Fuzzy Hash: d69c29696ab55aa258689c83827ff8b50f1a507cc4d0bf406687d7f06f607ffb
                                                  • Instruction Fuzzy Hash: 59919071900219AADF24DAA18C49FDF777DAB89304F5044EBF508B21C1EB78AE89CF54
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1205 444a55-444a82 call 444860 call 4473af call 44781b 1212 444a84-444a9a call 4453a0 1205->1212 1213 444a9f-444aa4 1205->1213 1221 444cf4-444cf9 call 4448a5 1212->1221 1214 444aaa-444ab1 1213->1214 1216 444ae4-444af3 GetStartupInfoW 1214->1216 1217 444ab3-444ae2 1214->1217 1219 444c22-444c28 1216->1219 1220 444af9-444afe 1216->1220 1217->1214 1224 444ce6-444cf2 call 444cfa 1219->1224 1225 444c2e-444c3f 1219->1225 1220->1219 1223 444b04-444b1b 1220->1223 1227 444b22-444b25 1223->1227 1228 444b1d-444b1f 1223->1228 1224->1221 1229 444c54-444c5a 1225->1229 1230 444c41-444c44 1225->1230 1232 444b28-444b2e 1227->1232 1228->1227 1234 444c61-444c68 1229->1234 1235 444c5c-444c5f 1229->1235 1230->1229 1233 444c46-444c4f 1230->1233 1238 444b50-444b58 1232->1238 1239 444b30-444b41 call 44781b 1232->1239 1240 444ce0-444ce1 1233->1240 1237 444c6b-444c77 GetStdHandle 1234->1237 1235->1237 1241 444cbe-444cd4 1237->1241 1242 444c79-444c7b 1237->1242 1244 444b5b-444b5d 1238->1244 1250 444bd5-444bdc 1239->1250 1251 444b47-444b4d 1239->1251 1240->1219 1241->1240 1247 444cd6-444cd9 1241->1247 1242->1241 1245 444c7d-444c86 GetFileType 1242->1245 1244->1219 1248 444b63-444b68 1244->1248 1245->1241 1249 444c88-444c92 1245->1249 1247->1240 1252 444bc2-444bd3 1248->1252 1253 444b6a-444b6d 1248->1253 1255 444c94-444c9a 1249->1255 1256 444c9c-444c9f 1249->1256 1257 444be2-444bf0 1250->1257 1251->1238 1252->1244 1253->1252 1254 444b6f-444b73 1253->1254 1254->1252 1258 444b75-444b77 1254->1258 1259 444ca7 1255->1259 1260 444ca1-444ca5 1256->1260 1261 444caa-444cbc InitializeCriticalSectionAndSpinCount 1256->1261 1262 444c16-444c1d 1257->1262 1263 444bf2-444c14 1257->1263 1264 444b87-444bbc InitializeCriticalSectionAndSpinCount 1258->1264 1265 444b79-444b85 GetFileType 1258->1265 1259->1261 1260->1259 1261->1240 1262->1232 1263->1257 1266 444bbf 1264->1266 1265->1264 1265->1266 1266->1252
                                                  APIs
                                                  • __lock.LIBCMT ref: 00444A63
                                                    • Part of subcall function 004473AF: __mtinitlocknum.LIBCMT ref: 004473C1
                                                    • Part of subcall function 004473AF: RtlEnterCriticalSection.NTDLL(?), ref: 004473DA
                                                  • __calloc_crt.LIBCMT ref: 00444A74
                                                    • Part of subcall function 0044781B: __calloc_impl.LIBCMT ref: 0044782A
                                                    • Part of subcall function 0044781B: Sleep.KERNEL32(00000000), ref: 00447841
                                                  • @_EH4_CallFilterFunc@8.LIBCMT ref: 00444A8F
                                                  • GetStartupInfoW.KERNEL32(?,00461D18,00000064), ref: 00444AE8
                                                  • __calloc_crt.LIBCMT ref: 00444B33
                                                  • GetFileType.KERNEL32(00000001), ref: 00444B7A
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00444BB3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                  • String ID: D3
                                                  • API String ID: 1426640281-3488907147
                                                  • Opcode ID: c2f5de48c772c217b84d482e1625e08e89dc079a84c036689e0a798c1df8a14a
                                                  • Instruction ID: 09655ebbde56739fe122de267ee1f4dc4e653722d8d84f81803da60410ba108c
                                                  • Opcode Fuzzy Hash: c2f5de48c772c217b84d482e1625e08e89dc079a84c036689e0a798c1df8a14a
                                                  • Instruction Fuzzy Hash: CF81E4709057458FEB14CF68D884669BBF0AF85324B28426FD4A6AB3D1D738D843CB59
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1267 40454e-404595 call 4462f0 1270 404597-40459c 1267->1270 1271 40459e 1267->1271 1272 4045a3-4045d2 call 43eab4 RegOpenKeyExA 1270->1272 1271->1272 1275 4046d0 1272->1275 1276 4045d8-4045fd RegQueryValueExA 1272->1276 1279 4046d2-4046df call 43e722 1275->1279 1277 404603-404609 1276->1277 1278 4046c4-4046ca RegCloseKey 1276->1278 1277->1278 1281 40460f-404615 1277->1281 1278->1275 1281->1278 1283 40461b-40462f RegCloseKey 1281->1283 1284 404631-404637 1283->1284 1285 404656-40465c 1283->1285 1286 40463a-40463f 1284->1286 1287 40465f-404664 1285->1287 1286->1286 1288 404641-404646 1286->1288 1287->1287 1289 404666-40466b 1287->1289 1288->1285 1290 404648-404654 1288->1290 1291 404678-40467a 1289->1291 1290->1285 1292 40467c-404682 1291->1292 1293 40466d-404675 1291->1293 1296 404685-40468a 1292->1296 1294 4046b4-4046b9 1293->1294 1295 404677 1293->1295 1298 4046e0-4046e5 call 4401e2 1294->1298 1299 4046bb-4046c2 1294->1299 1295->1291 1296->1296 1297 40468c-40469c call 43ea05 1296->1297 1304 40469e-4046ac call 43eab4 1297->1304 1305 4046af-4046b2 1297->1305 1299->1292 1304->1305 1305->1279
                                                  APIs
                                                  • _memset.LIBCMT ref: 0040457A
                                                  • RegOpenKeyExA.KERNEL32(80000002,?,00000000,00020019,?,?,?,?,?,?,00000000), ref: 004045CA
                                                  • RegQueryValueExA.KERNEL32(?,00000000,00000000,?,?,00000104,?,?,?,?,?,00000000), ref: 004045F5
                                                  • RegCloseKey.KERNEL32(?,75706DBE,?,?,?,?,?,00000000), ref: 00404622
                                                  • _malloc.LIBCMT ref: 00404692
                                                  • RegCloseKey.ADVAPI32(?,?,?,?,?,?,00000000), ref: 004046CA
                                                  Strings
                                                  • SOFTWARE\Clients\StartMenuInternet\SEAMONKEY.EXE\shell\open\command, xrefs: 00404597
                                                  • SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command, xrefs: 0040459E
                                                  • \, xrefs: 0040466D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Close$OpenQueryValue_malloc_memset
                                                  • String ID: SOFTWARE\Clients\StartMenuInternet\SEAMONKEY.EXE\shell\open\command$SOFTWARE\Clients\StartMenuInternet\firefox.exe\shell\open\command$\
                                                  • API String ID: 1742752003-2382300969
                                                  • Opcode ID: 74c53a6de8fe0eb34b81f5ba6b263c74f013f6812d37a52de4e2a82ee1278ab6
                                                  • Instruction ID: 9a6d5e3a7e6e8ffbdbde3c0277ad48e7b8f53f89dd90a06e13a0e1a7fa3e5c65
                                                  • Opcode Fuzzy Hash: 74c53a6de8fe0eb34b81f5ba6b263c74f013f6812d37a52de4e2a82ee1278ab6
                                                  • Instruction Fuzzy Hash: 7E4127708041189BDF21DB24DC54BFA777CAB56308F1005FAE689B21C2EB7A5FC98B54
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1308 401230-401280 call 43eab4 RegOpenKeyExA 1311 401286-4012b6 RegQueryValueExA 1308->1311 1312 401319-401328 call 43e722 1308->1312 1313 4012b8-4012e8 RegQueryValueExA 1311->1313 1314 4012ea-40130a call 43ea97 call 43eab4 1311->1314 1313->1314 1317 40130d-401313 RegCloseKey 1313->1317 1314->1317 1317->1312
                                                  APIs
                                                  • RegOpenKeyExA.KERNEL32(80000002,SOFTWARE\Microsoft\Internet Explorer,00000000,00020019,?), ref: 00401278
                                                  • RegQueryValueExA.KERNEL32(?,svcVersion,00000000,?,?,?), ref: 004012AE
                                                  • RegQueryValueExA.ADVAPI32(?,Version,00000000,?,?,?), ref: 004012E0
                                                  • RegCloseKey.KERNEL32(?), ref: 00401313
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: QueryValue$CloseOpen
                                                  • String ID: 11.0.9600.18537$6.0$SOFTWARE\Microsoft\Internet Explorer$Version$svcVersion
                                                  • API String ID: 1586453840-3926588707
                                                  • Opcode ID: f4ff95292fa89edc27a7504e480f22c7ddedcbaa7efc3c1c6e566444bfea3cb5
                                                  • Instruction ID: 2adeccfd58698fa0b904e5aa5ab29155b2ab8fff161f893c69811288bcb2abb9
                                                  • Opcode Fuzzy Hash: f4ff95292fa89edc27a7504e480f22c7ddedcbaa7efc3c1c6e566444bfea3cb5
                                                  • Instruction Fuzzy Hash: 1B2183B1A0131CAAD720DB51DC89FEA777CAB04705F1001ABBA15E51D3EA749E848F58
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1322 40344f-4034bc call 4462f0 SHGetFolderPathA 1325 4034c2-403527 call 43eab4 call 43eb09 * 3 GetFileAttributesA 1322->1325 1326 40359a-4035ae call 43e722 1322->1326 1337 403536-40358b call 43eab4 call 43eb09 * 3 GetFileAttributesA 1325->1337 1338 403529-40352b 1325->1338 1337->1326 1349 40358d-40358f 1337->1349 1338->1337 1339 40352d-403531 call 40301d 1338->1339 1339->1337 1349->1326 1350 403591-403595 call 40301d 1349->1350 1350->1326
                                                  APIs
                                                  • _memset.LIBCMT ref: 00403483
                                                  • SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 004034B4
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00403522
                                                  • GetFileAttributesA.KERNELBASE(?), ref: 00403586
                                                    • Part of subcall function 0040344F: __wfopen_s.LIBCMT ref: 00403072
                                                    • Part of subcall function 0040344F: _fseek.LIBCMT ref: 00403099
                                                    • Part of subcall function 0040344F: _malloc.LIBCMT ref: 004030B2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesFile$FolderPath__wfopen_s_fseek_malloc_memset
                                                  • String ID: Opera\Opera\$Opera\Opera\profile\$http$wand.dat
                                                  • API String ID: 4017050026-4065301253
                                                  • Opcode ID: 4520a98e9bc4af7661d9a726659f747c8c5ef9e4a879b026e528bae71a8275bf
                                                  • Instruction ID: 4b32d0477e43ea2184eb26eeb38afaacbd59df8ed37b18dd14da60408fb066a6
                                                  • Opcode Fuzzy Hash: 4520a98e9bc4af7661d9a726659f747c8c5ef9e4a879b026e528bae71a8275bf
                                                  • Instruction Fuzzy Hash: C631B6B28042447BC210EA619C49D9BB7ECABC8315F40193FF998D31D1E778EA08C6A6
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000000), ref: 0040A580
                                                  • GetLastError.KERNEL32 ref: 0040A58B
                                                  • ReadFile.KERNELBASE(?,?,?,?,00000000), ref: 0040A5AE
                                                  • GetLastError.KERNEL32 ref: 0040A5B8
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLast$PointerRead
                                                  • String ID:
                                                  • API String ID: 2170121939-0
                                                  • Opcode ID: 1d14ddda8ce5bd291bcca5792ae1bde327c2d8b4c464bd2be0447b4e7562c58b
                                                  • Instruction ID: fc9d68caf02719ed72d46be2830cfabb2b6070443f826908d3de9129d98e1edf
                                                  • Opcode Fuzzy Hash: 1d14ddda8ce5bd291bcca5792ae1bde327c2d8b4c464bd2be0447b4e7562c58b
                                                  • Instruction Fuzzy Hash: C1118E76200305FBDF11CF64DC05B9A7BA8FB043A1F104236FA15EA2D0D774E9609B9A
                                                  Uniqueness

                                                  Uniqueness Score: 2.20%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memcmp_memset
                                                  • String ID: :memory:$qC
                                                  • API String ID: 433756748-766443301
                                                  • Opcode ID: 4effd2667b923fc56ce3f8071d1e731f70f7e75a62d76a2aa8c0bd25a59ec61e
                                                  • Instruction ID: 8516dcb5444e04b1fc19a79eb32c7755c1e661864c98b508c5f09ae44880fce5
                                                  • Opcode Fuzzy Hash: 4effd2667b923fc56ce3f8071d1e731f70f7e75a62d76a2aa8c0bd25a59ec61e
                                                  • Instruction Fuzzy Hash: 15E1A0709042559FDB24DF65C880BAA7BB1BF15304F2480AFE849EB342DBB9D8C5CB59
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset$_memcmp
                                                  • String ID: -journal$:memory:
                                                  • API String ID: 538417588-354093883
                                                  • Opcode ID: 013ff54ad404ca9362b7d50185d4473d3d031cffced41ac9d6e3479894822b2f
                                                  • Instruction ID: 2534efebb8288e2ccd2f00699feac06f845880543929484f2ac757e5992f2742
                                                  • Opcode Fuzzy Hash: 013ff54ad404ca9362b7d50185d4473d3d031cffced41ac9d6e3479894822b2f
                                                  • Instruction Fuzzy Hash: 07A1B1B1E00606AFCB15CFA9C8416AABBF0BF44310F14827EE459EB381D738D955CB99
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 004046E6: _memset.LIBCMT ref: 00404713
                                                    • Part of subcall function 004046E6: SHGetFolderPathA.SHELL32(00000000,0000001A,00000000,00000000,?), ref: 0040474E
                                                    • Part of subcall function 004046E6: GetLastError.KERNEL32 ref: 00404758
                                                  • GetFileAttributesA.KERNELBASE(00000000), ref: 004035CE
                                                  • SetDllDirectoryA.KERNEL32(00000000), ref: 00403627
                                                    • Part of subcall function 0040454E: _memset.LIBCMT ref: 0040457A
                                                    • Part of subcall function 0040454E: RegOpenKeyExA.KERNEL32(80000002,?,00000000,00020019,?,?,?,?,?,?,00000000), ref: 004045CA
                                                    • Part of subcall function 0040454E: RegQueryValueExA.KERNEL32(?,00000000,00000000,?,?,00000104,?,?,?,?,?,00000000), ref: 004045F5
                                                    • Part of subcall function 0040454E: RegCloseKey.KERNEL32(?,75706DBE,?,?,?,?,?,00000000), ref: 00404622
                                                    • Part of subcall function 0040454E: _malloc.LIBCMT ref: 00404692
                                                  • GetFileAttributesA.KERNELBASE(00000000), ref: 004035E7
                                                    • Part of subcall function 00405BC5: SetDllDirectoryA.KERNEL32(00000000), ref: 00405BD8
                                                    • Part of subcall function 00405BC5: GetLastError.KERNEL32 ref: 00405BEE
                                                    • Part of subcall function 00405BC5: SetDllDirectoryA.KERNEL32(00000000), ref: 00405BF6
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(658D0000,NSS_Init), ref: 00405C15
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(NSS_Shutdown), ref: 00405C27
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(PK11_GetInternalKeySlot), ref: 00405C39
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(PK11_FreeSlot), ref: 00405C4B
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(PK11_Authenticate), ref: 00405C5D
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(PK11SDR_Decrypt), ref: 00405C6F
                                                    • Part of subcall function 00405BC5: 74ECFFF6.KERNEL32(PK11_CheckUserPassword), ref: 00405C81
                                                  • SetDllDirectoryA.KERNEL32(00000000), ref: 0040360B
                                                    • Part of subcall function 004053F5: FreeLibrary.KERNELBASE(658D0000,00405CCC), ref: 00405413
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Directory$AttributesErrorFileLast_memset$CloseFolderFreeLibraryOpenPathQueryValue_malloc
                                                  • String ID:
                                                  • API String ID: 304941828-0
                                                  • Opcode ID: 8b5be48192ab019babe16f9111fd45f534da9ef9bc90811e4b7a5d08f0aee468
                                                  • Instruction ID: 3215ab3e9c5db905f9bbb6642bd0b2af6c651a2c64f52b4713891b772780c8f8
                                                  • Opcode Fuzzy Hash: 8b5be48192ab019babe16f9111fd45f534da9ef9bc90811e4b7a5d08f0aee468
                                                  • Instruction Fuzzy Hash: 4D11E73150161467DB312F7A9C4566F7A5C9F80766B18093BE801F33D1EEBECE02469D
                                                  Uniqueness

                                                  Uniqueness Score: 12.89%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: LibraryLoad_memset
                                                  • String ID: nss3.dll
                                                  • API String ID: 2997193564-2492180550
                                                  • Opcode ID: 3002a9d495ae00c154f96ea5d6c766f703db8883a8c245f8663acb55f1715572
                                                  • Instruction ID: 55ad9e39a55c903ff9547eb2cbc7afcffa5b63cadcfddafb3298d092d508fe3e
                                                  • Opcode Fuzzy Hash: 3002a9d495ae00c154f96ea5d6c766f703db8883a8c245f8663acb55f1715572
                                                  • Instruction Fuzzy Hash: 22016C7191125866D711E7568C05FCA77AC9F0C745F4004B6F745D3181E7F8AA44CA6D
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • CreateFileW.KERNELBASE(00000000,?,00000003,00000000,-00000003,00000000,00000000), ref: 0040AD5C
                                                  • _free.LIBCMT ref: 0040AD72
                                                  • _free.LIBCMT ref: 0040ADE9
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$CreateFile
                                                  • String ID:
                                                  • API String ID: 2252325716-0
                                                  • Opcode ID: 50e2908d4ffc8971987c86f6e6fee25a3d809ac81c76cfa3da1c2adeec68ce9a
                                                  • Instruction ID: 5bf5b013798ea011ef1da4973d0597665fb668a681034c64c742d07112804797
                                                  • Opcode Fuzzy Hash: 50e2908d4ffc8971987c86f6e6fee25a3d809ac81c76cfa3da1c2adeec68ce9a
                                                  • Instruction Fuzzy Hash: E141DE716083019FD710CF29C841B5BBBE2AF88354F10892EF999E62D1E738D9509B5B
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  • too many terms in compound SELECT, xrefs: 00433739
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: too many terms in compound SELECT
                                                  • API String ID: 2102423945-2451016212
                                                  • Opcode ID: a26a3e3b268f74435526cf317d264a15cfc9dc80ff60580e113eb839d911ec31
                                                  • Instruction ID: 7fae650f72c5ed6f37d394b1b1df5652df8aa4f8a7438559e46606477fda056b
                                                  • Opcode Fuzzy Hash: a26a3e3b268f74435526cf317d264a15cfc9dc80ff60580e113eb839d911ec31
                                                  • Instruction Fuzzy Hash: EF9265706083409FD724DF29C881A6BBBE6BFC8314F10892EF99987351DB39ED458B46
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000000), ref: 0040AEE4
                                                  • _free.LIBCMT ref: 0040AEF5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesFile_free
                                                  • String ID:
                                                  • API String ID: 2296893129-0
                                                  • Opcode ID: cf7a8db0cb6c161e5e6d82884ae2e0edb1d2a4795ecdd8d6c391bdc4a09bd7c8
                                                  • Instruction ID: aa8c4c1ce35555e095efe9f575b63939b83022f70f1487c90c945f6e07f4be7c
                                                  • Opcode Fuzzy Hash: cf7a8db0cb6c161e5e6d82884ae2e0edb1d2a4795ecdd8d6c391bdc4a09bd7c8
                                                  • Instruction Fuzzy Hash: 3AF0C2722557169BCB109EB598859AB3388AB843A87140537EA01E62C1CB38DC6192AB
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • ___lock_fhandle.LIBCMT ref: 00447272
                                                  • __close_nolock.LIBCMT ref: 0044728B
                                                    • Part of subcall function 00442B40: __getptd_noexit.LIBCMT ref: 00442B40
                                                    • Part of subcall function 00442B74: __getptd_noexit.LIBCMT ref: 00442B74
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                  • String ID:
                                                  • API String ID: 1046115767-0
                                                  • Opcode ID: 9107af3e4ebcd2b7385f72f32ecaf719687e29c708b71c6481694f11ace22614
                                                  • Instruction ID: 8c35b5a515f79a87157c6fc648992071e7a8fe07e6d51c812da3ff7dc575d3b9
                                                  • Opcode Fuzzy Hash: 9107af3e4ebcd2b7385f72f32ecaf719687e29c708b71c6481694f11ace22614
                                                  • Instruction Fuzzy Hash: B611C632909A904EF701BF6989423597B60AF42339F1503CBF4705B2E3C7FC994286AE
                                                  Uniqueness

                                                  Uniqueness Score: 37.75%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __calloc_crt
                                                  • String ID:
                                                  • API String ID: 3494438863-0
                                                  • Opcode ID: c11f47d995f5feecc15aaec94d90b88e1f62b4cd1a14d16deecc71c12a29fc57
                                                  • Instruction ID: 3d1ae830937f7de49037720bfa9ef5da238216d04d5beb573a29ef5a59ef7683
                                                  • Opcode Fuzzy Hash: c11f47d995f5feecc15aaec94d90b88e1f62b4cd1a14d16deecc71c12a29fc57
                                                  • Instruction Fuzzy Hash: 05F068717492128AF7249F5A7C51B716794E784B64F14C07BFA01DB291F7B8C8828A4E
                                                  Uniqueness

                                                  Uniqueness Score: 1.40%

                                                  APIs
                                                    • Part of subcall function 00442B74: __getptd_noexit.LIBCMT ref: 00442B74
                                                  • __lock_file.LIBCMT ref: 00440904
                                                    • Part of subcall function 00444492: __lock.LIBCMT ref: 004444B5
                                                  • __fclose_nolock.LIBCMT ref: 0044090F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                  • String ID:
                                                  • API String ID: 2800547568-0
                                                  • Opcode ID: 097313f2133792eb7c08879dee758569807f38e35b29e64b48bb240b727fa647
                                                  • Instruction ID: 780df067b3030213fb711f7f09a759a5780afcafe71407a5b5535614842ea881
                                                  • Opcode Fuzzy Hash: 097313f2133792eb7c08879dee758569807f38e35b29e64b48bb240b727fa647
                                                  • Instruction Fuzzy Hash: 29F090718013059AFB10BB76880275E77A06F81338F25820FA564AA1D2CB7C8952AB9E
                                                  Uniqueness

                                                  Uniqueness Score: 2.04%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ___copy_path_to_wide_string_free
                                                  • String ID:
                                                  • API String ID: 339592613-0
                                                  • Opcode ID: 54d4fb7b8a88810a4ea91da8d687376565ec037ab9b255463baabbd5745462db
                                                  • Instruction ID: c3291ede5c58a6fb7f24c0e8098764167dcd0a236cd0bca4cfa5ce6b2e505eb4
                                                  • Opcode Fuzzy Hash: 54d4fb7b8a88810a4ea91da8d687376565ec037ab9b255463baabbd5745462db
                                                  • Instruction Fuzzy Hash: FCF01C3291010DBBDF019FD5DD02DDE7F6AEF083A8F204155FA10A11A0E77ACA20EB98
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5), ref: 004015D7
                                                  • GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 004015E2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: BufferConsoleHandleInfoScreen
                                                  • String ID:
                                                  • API String ID: 3205511803-0
                                                  • Opcode ID: 52d4730f18a0b963158cf73c55395cfc960444ad3a76b8a5d9663065ac742197
                                                  • Instruction ID: 45f79bbdf51d2713b6d997d0a65874159505a258f9ce29f5dc197a3e19081f42
                                                  • Opcode Fuzzy Hash: 52d4730f18a0b963158cf73c55395cfc960444ad3a76b8a5d9663065ac742197
                                                  • Instruction Fuzzy Hash: CAE0D83050420AEBCB00DFA58C0967E73B8AB44B15F60013DE503EA1D2FA34EA009629
                                                  Uniqueness

                                                  Uniqueness Score: 1.64%

                                                  APIs
                                                  • __calloc_crt.LIBCMT ref: 004476E6
                                                    • Part of subcall function 0044781B: __calloc_impl.LIBCMT ref: 0044782A
                                                    • Part of subcall function 0044781B: Sleep.KERNEL32(00000000), ref: 00447841
                                                  • RtlEncodePointer.NTDLL(00000000), ref: 004476F0
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EncodePointerSleep__calloc_crt__calloc_impl
                                                  • String ID:
                                                  • API String ID: 2972565945-0
                                                  • Opcode ID: 4ca0bbf34cffe094de8410f54bb66d336841bb1e888edb2d9a64a8b8c1e557ce
                                                  • Instruction ID: ca0597da6d64427ffd4a0732ec9bbc0bed6aafa8190036c7798ecac31130154a
                                                  • Opcode Fuzzy Hash: 4ca0bbf34cffe094de8410f54bb66d336841bb1e888edb2d9a64a8b8c1e557ce
                                                  • Instruction Fuzzy Hash: 20D01232E487215AF7615B6578097952AD0D744B71F51452BE900DA291EB6448C24A8D
                                                  Uniqueness

                                                  Uniqueness Score: 0.05%

                                                  APIs
                                                  • GetStdHandle.KERNEL32(000000F5,00000000,004015AD,00468230,00001000,?,?), ref: 00401606
                                                  • SetConsoleTextAttribute.KERNEL32(00000000,00000004), ref: 00401611
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributeConsoleHandleText
                                                  • String ID:
                                                  • API String ID: 1363055914-0
                                                  • Opcode ID: 48f6a26479a78500e7e28ffbf8dd0a9338357492c86df5e69f30df453ac946ef
                                                  • Instruction ID: f42ce1dbf158a59516987d045b12306a2c50d08444eee0f0c25a47228432d6e5
                                                  • Opcode Fuzzy Hash: 48f6a26479a78500e7e28ffbf8dd0a9338357492c86df5e69f30df453ac946ef
                                                  • Instruction Fuzzy Hash: D3B09B31C05231E7863017797C0D8C72D18FD525773154771F425560E18A24C88085F4
                                                  Uniqueness

                                                  Uniqueness Score: 1.51%

                                                  APIs
                                                  • ___crtCorExitProcess.LIBCMT ref: 00440BE8
                                                    • Part of subcall function 00440BB0: GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,?,?,?,00440BED,00000000,?,00447462,000000FF,0000001E,00461DD8,00000008,004473C6,00000000,?), ref: 00440BBF
                                                    • Part of subcall function 00440BB0: 74ECFFF6.KERNEL32(?,CorExitProcess,?,?,00440BED,00000000,?,00447462,000000FF,0000001E,00461DD8,00000008,004473C6,00000000,?), ref: 00440BD1
                                                  • ExitProcess.KERNEL32 ref: 00440BF1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExitProcess$HandleModule___crt
                                                  • String ID:
                                                  • API String ID: 2165862795-0
                                                  • Opcode ID: ead20bbb30560bf91836b9e84c0b57aafde4b4317b08fefec9bedbda9b557657
                                                  • Instruction ID: 2a5a592825967c9192218008d3dce58eb47c168692aa0bd3b44781f21394016c
                                                  • Opcode Fuzzy Hash: ead20bbb30560bf91836b9e84c0b57aafde4b4317b08fefec9bedbda9b557657
                                                  • Instruction Fuzzy Hash: 22B09230000608BBDF012FA2DC0A8583F39EB01299B408025FA0408132EB72EAE19A8C
                                                  Uniqueness

                                                  Uniqueness Score: 0.24%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseHandleSleep
                                                  • String ID:
                                                  • API String ID: 252777609-0
                                                  • Opcode ID: 30c3d04b136ce7fdbce7f8a54883a7f6d26e67f33bc6129848176246adda8728
                                                  • Instruction ID: da9e8525cf1010f3dda44029fa7408f4791a384921faf391b973be77be69072e
                                                  • Opcode Fuzzy Hash: 30c3d04b136ce7fdbce7f8a54883a7f6d26e67f33bc6129848176246adda8728
                                                  • Instruction Fuzzy Hash: A6E02637304722BBDA08565BAC1566AF6D6FFC8762B01403AE90AE60C0C671DC9252C9
                                                  Uniqueness

                                                  Uniqueness Score: 37.75%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32ebeaeeb2c65aa2250cae267d32c5fdfe9c5c8f7ed4df502d73640f9b764ee2
                                                  • Instruction ID: 7070d662cca89854d6d574aab151d8e4435d0bfe20581f05eb9486bc86bd2ecf
                                                  • Opcode Fuzzy Hash: 32ebeaeeb2c65aa2250cae267d32c5fdfe9c5c8f7ed4df502d73640f9b764ee2
                                                  • Instruction Fuzzy Hash: BE31C831704700ABDB25AAA79C4172A72D1AB8075CF140D3FE851AB3D1EB78ED25879E
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __getptd_noexit
                                                  • String ID:
                                                  • API String ID: 3074181302-0
                                                  • Opcode ID: b8e0c879bd5c724a38cbaf6a0298da4e60a9c59ea5fb07d05eba5f0f479f7907
                                                  • Instruction ID: 43a5a67330f3cf893601cd5d96a24b861ef009b221b9976fb680c318a0d3ae25
                                                  • Opcode Fuzzy Hash: b8e0c879bd5c724a38cbaf6a0298da4e60a9c59ea5fb07d05eba5f0f479f7907
                                                  • Instruction Fuzzy Hash: 5F21B0728006848EFF017FA589423597760AF4332AF160647F4644B1F3CBBC99008A6F
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  APIs
                                                  • ___lock_fhandle.LIBCMT ref: 004490FF
                                                    • Part of subcall function 00442B40: __getptd_noexit.LIBCMT ref: 00442B40
                                                    • Part of subcall function 00442B74: __getptd_noexit.LIBCMT ref: 00442B74
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __getptd_noexit$___lock_fhandle
                                                  • String ID:
                                                  • API String ID: 1144279405-0
                                                  • Opcode ID: 6f430ed9d869dd818a84008589be428a8df7642c1e615d92e38ebd6eab54d909
                                                  • Instruction ID: 5c99317c251ab30e1e21b300a1054f25d69e06adebce8282fdbbdae5412e7eee
                                                  • Opcode Fuzzy Hash: 6f430ed9d869dd818a84008589be428a8df7642c1e615d92e38ebd6eab54d909
                                                  • Instruction Fuzzy Hash: C511D032800A819FFB01BF65884675A7760AF4233AF15064BF4201B2E2C7BC9D00A76E
                                                  Uniqueness

                                                  Uniqueness Score: 6.84%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID:
                                                  • API String ID: 2102423945-0
                                                  • Opcode ID: 9908b66d25165cf7dee5869cf505fee7955ef3bf29ebde0d3ace7f0327b27b77
                                                  • Instruction ID: f3d2a09e0c1d708c59f8b1b8d632568edf2ebbe734d55bbe74330fc40781f47e
                                                  • Opcode Fuzzy Hash: 9908b66d25165cf7dee5869cf505fee7955ef3bf29ebde0d3ace7f0327b27b77
                                                  • Instruction Fuzzy Hash: 8C01DF72600204AFDB05DF15CC81E56B36AFF89314F20047AFD11AB262D776ED20CBA4
                                                  Uniqueness

                                                  Uniqueness Score: 0.18%

                                                  APIs
                                                  • _malloc.LIBCMT ref: 0040754C
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap_malloc
                                                  • String ID:
                                                  • API String ID: 501242067-0
                                                  • Opcode ID: 59ace83676deaf8ae9f8d3b11852e367053aa8d4cdc38c82212bd447351387e3
                                                  • Instruction ID: 166153e1229066254b2c72415f02c68fda7f952a3ce69bf316473fb0af3f9a97
                                                  • Opcode Fuzzy Hash: 59ace83676deaf8ae9f8d3b11852e367053aa8d4cdc38c82212bd447351387e3
                                                  • Instruction Fuzzy Hash: 19D0C2B2A1661127CB089A29DC1019536949E45224305413EE91DD77C0D626DC0287C4
                                                  Uniqueness

                                                  Uniqueness Score: 0.36%

                                                  APIs
                                                    • Part of subcall function 00440D4D: __lock.LIBCMT ref: 00440D4F
                                                  • __onexit_nolock.LIBCMT ref: 00447728
                                                    • Part of subcall function 00447750: RtlDecodePointer.NTDLL ref: 00447763
                                                    • Part of subcall function 00447750: RtlDecodePointer.NTDLL ref: 0044776E
                                                    • Part of subcall function 00447750: __realloc_crt.LIBCMT ref: 004477AF
                                                    • Part of subcall function 00447750: __realloc_crt.LIBCMT ref: 004477C3
                                                    • Part of subcall function 00447750: RtlEncodePointer.NTDLL(00000000), ref: 004477D5
                                                    • Part of subcall function 00447750: RtlEncodePointer.NTDLL(?), ref: 004477E3
                                                    • Part of subcall function 00447750: RtlEncodePointer.NTDLL(00000000), ref: 004477EF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Pointer$Encode$Decode__realloc_crt$__lock__onexit_nolock
                                                  • String ID:
                                                  • API String ID: 3536590627-0
                                                  • Opcode ID: c77d1fcbe3abf195842cb2b30927d10eba5c5d599d3a0cc062d89d0b5e9101ff
                                                  • Instruction ID: 2f26d7e420ce8e2b1d9f1725148c551d4cab0dc07d7b84f94fae0eae8af157b0
                                                  • Opcode Fuzzy Hash: c77d1fcbe3abf195842cb2b30927d10eba5c5d599d3a0cc062d89d0b5e9101ff
                                                  • Instruction Fuzzy Hash: 7CD05E76D00204E6FB51BBBA880374C76A06F80728F60424FF014A61D2CBBC5A429B8E
                                                  Uniqueness

                                                  Uniqueness Score: 0.02%

                                                  APIs
                                                  • FreeLibrary.KERNELBASE(658D0000,00405CCC), ref: 00405413
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: FreeLibrary
                                                  • String ID:
                                                  • API String ID: 3664257935-0
                                                  • Opcode ID: 79396209d0e606064249b1dfd22f584d708d711e99d1142a20b84122f6da9ba7
                                                  • Instruction ID: 3fa4118f876ba73b30e6859f9d35ee23579d7930474dbf3ffc05fee691e7d10c
                                                  • Opcode Fuzzy Hash: 79396209d0e606064249b1dfd22f584d708d711e99d1142a20b84122f6da9ba7
                                                  • Instruction Fuzzy Hash: 43D0E9706017018ADA509BA5ED887973398A754746B185435D404D72A2E6B8DCC1DA6E
                                                  Uniqueness

                                                  Uniqueness Score: 0.03%

                                                  APIs
                                                  • _doexit.LIBCMT ref: 00440E98
                                                    • Part of subcall function 00440D5F: __lock.LIBCMT ref: 00440D6D
                                                    • Part of subcall function 00440D5F: RtlDecodePointer.NTDLL(00461B70), ref: 00440DAC
                                                    • Part of subcall function 00440D5F: RtlDecodePointer.NTDLL ref: 00440DBD
                                                    • Part of subcall function 00440D5F: RtlEncodePointer.NTDLL(00000000), ref: 00440DD6
                                                    • Part of subcall function 00440D5F: RtlDecodePointer.NTDLL(-00000004), ref: 00440DE6
                                                    • Part of subcall function 00440D5F: RtlEncodePointer.NTDLL(00000000), ref: 00440DEC
                                                    • Part of subcall function 00440D5F: RtlDecodePointer.NTDLL ref: 00440E02
                                                    • Part of subcall function 00440D5F: RtlDecodePointer.NTDLL ref: 00440E0D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Pointer$Decode$Encode$__lock_doexit
                                                  • String ID:
                                                  • API String ID: 2158581194-0
                                                  • Opcode ID: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                  • Instruction ID: 61b85877a92619bbd4e33a8b3c08217683325d07f34c7a63d4c82275bcda1e2a
                                                  • Opcode Fuzzy Hash: e664eab0a2f8ce3703c552baf369986a84cdf03d3e0bf670d1975cdb5f15a4fc
                                                  • Instruction Fuzzy Hash: 90B0127198030C33EA112582EC03F053B0C4740B54F100021FF0C1C1F2A5A3B57450CD
                                                  Uniqueness

                                                  Uniqueness Score: 0.23%

                                                  APIs
                                                  • RtlEncodePointer.NTDLL(Function_000479A1), ref: 004479ED
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: EncodePointer
                                                  • String ID:
                                                  • API String ID: 2118026453-0
                                                  • Opcode ID: 42812844f6c171ad48f3977a81d391d22dc983dc4dc7f1e626e690bd97260c11
                                                  • Instruction ID: d996bea3c0167c2c0b64df2b3f46977e52767c3ed9542ea0d1a1c50dca518100
                                                  • Opcode Fuzzy Hash: 42812844f6c171ad48f3977a81d391d22dc983dc4dc7f1e626e690bd97260c11
                                                  • Instruction Fuzzy Hash: 91A002F459F740CBAB045F70BE4DA243AB0A79872B76012B6E44185266EBB54081AADF
                                                  Uniqueness

                                                  Uniqueness Score: 0.01%

                                                  APIs
                                                  • ___security_init_cookie.LIBCMT ref: 00441B92
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ___security_init_cookie
                                                  • String ID:
                                                  • API String ID: 3657697845-0
                                                  • Opcode ID: 7807fdc9ee4f8d9b98bb1b4b2a83c0c975fbfbc5d4660e87755ed80148822623
                                                  • Instruction ID: 90015fca355c4142a72ca6cf9ef9ba233b35445bbb7c3de05d2dc16a793b3cd3
                                                  • Opcode Fuzzy Hash: 7807fdc9ee4f8d9b98bb1b4b2a83c0c975fbfbc5d4660e87755ed80148822623
                                                  • Instruction Fuzzy Hash:
                                                  Uniqueness

                                                  Uniqueness Score: 0.77%

                                                  Non-executed Functions

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: missing from index $*** in database %s ***$-%T$NONE$Safety level may not be changed inside a transaction$auto_vacuum$cache_size$case_sensitive_like$cid$collation_list$database_list$default_cache_size$dflt_value$encoding$exclusive$file$foreign_key_list$freelist_count$from$incremental_vacuum$index_info$index_list$integrity_check$journal_mode$journal_size_limit$locking_mode$match$max_page_count$name$normal$not a writable directory$notnull$on_delete$on_update$page_count$page_size$quick_check$rowid $schema_version$seq$seqno$synchronous$table$table_info$temp_store$temp_store_directory$type$unique$unsupported encoding: %s$user_version$wrong # of entries in index
                                                  • API String ID: 0-323641776
                                                  • Opcode ID: 58271de9a1989dac655a8276db525814fa10e13f5afba50255a51191059babe7
                                                  • Instruction ID: c09b388076a19a1e0da802c6d7521f71440fa41b7f5b83358a84040147d543a7
                                                  • Opcode Fuzzy Hash: 58271de9a1989dac655a8276db525814fa10e13f5afba50255a51191059babe7
                                                  • Instruction Fuzzy Hash: CE03C831F00214ABDB14EB66DD42BAE77A2AF84714F15803FF905AB3C2EA78DD418759
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • CredEnumerateA.ADVAPI32(00000000,00000000,?,?), ref: 00402400
                                                  • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,00000000,?), ref: 00402485
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 004024A1
                                                  • _strstr.LIBCMT ref: 004024BF
                                                  • swprintf.LIBCMT ref: 004024F2
                                                  • swprintf.LIBCMT ref: 0040250D
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 0040251B
                                                  • GetLastError.KERNEL32 ref: 00402593
                                                  • AuditFree.ADVAPI32(?), ref: 004025AC
                                                  • GetLastError.KERNEL32 ref: 004025B4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLast___from_strstr_to_strchrswprintf$AuditCredCryptDataEnumerateFreeUnprotect_strstr
                                                  • String ID: :443$J$Microsoft_WinInet_$http://%s$https://%s
                                                  • API String ID: 4108919291-3660155129
                                                  • Opcode ID: f52ec16731683933d6720cd65942bd6af1e71c8197f558edc1d6c318c894bb48
                                                  • Instruction ID: 216f5718e81ab50cfbcef51ac4c62f28be2b762c44ac00821a8d5ac9a0e0124e
                                                  • Opcode Fuzzy Hash: f52ec16731683933d6720cd65942bd6af1e71c8197f558edc1d6c318c894bb48
                                                  • Instruction Fuzzy Hash: 58519071900258EBDB20DB95CD45EDA73BCAB08304F5400AAF548E7292DB74EEC5CF28
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: +$+Inf$-Inf$-x0$0123456789ABCDEF0123456789abcdef$Inf$NaN$d
                                                  • API String ID: 0-415213533
                                                  • Opcode ID: 096323e5eae6d96faf6abef743b50f5eec50cff56d3b89a2615a42c137803a4d
                                                  • Instruction ID: e7187d520ebc50dac35f798e2e7e764f0a81b0265649f9154479cab55ccbc3b3
                                                  • Opcode Fuzzy Hash: 096323e5eae6d96faf6abef743b50f5eec50cff56d3b89a2615a42c137803a4d
                                                  • Instruction Fuzzy Hash: E252D23190C7918ED725CF29865022BBBE1AFD6344F18496FE8C5B7392DB38C946C74A
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00401D58
                                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00401D64
                                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,00000000,00000001,?,00000000,?,00000000,?), ref: 00401DA4
                                                  • RegCloseKey.ADVAPI32(?,?,00000000,?,00000000,00000001,?,00000000,?,00000000,?), ref: 00401DAE
                                                  • CryptUnprotectData.CRYPT32(?,00000000,?,00000000,00000000,00000000,?), ref: 00401E2D
                                                  • swprintf.LIBCMT ref: 00401E9F
                                                  • swprintf.LIBCMT ref: 00401EB6
                                                  Strings
                                                  • Software\Microsoft\Internet Explorer\IntelliForms\Storage2, xrefs: 00401D05
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CloseQueryValueswprintf$CryptDataUnprotect
                                                  • String ID: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
                                                  • API String ID: 784427415-680441574
                                                  • Opcode ID: a8b70ad00bcd2c34fc0f3c59ee7ba357d2e70291f2cff45d33a335eedaa3632e
                                                  • Instruction ID: bd1dd0ddbf1b60b248f488494012cfc9b4ba8420bb3a3c7113e21bd07c7a0e16
                                                  • Opcode Fuzzy Hash: a8b70ad00bcd2c34fc0f3c59ee7ba357d2e70291f2cff45d33a335eedaa3632e
                                                  • Instruction Fuzzy Hash: FD6173719002189FEB24DB64DC84FEE77B8EB48314F1442EAE609A7291DF35AE85CF54
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 0040136B
                                                  • GetLastError.KERNEL32 ref: 00401375
                                                  • CryptCreateHash.ADVAPI32(?,00008004,00000000,00000000,?), ref: 00401398
                                                  • GetLastError.KERNEL32 ref: 004013A2
                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,00000000,00000000), ref: 00401497
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                                  • String ID: %s%2.2X
                                                  • API String ID: 4104741015-1682948137
                                                  • Opcode ID: 6850ef86fb4076c0b7dc8c4acebd046bee77553286abbc5ec8fdca19b540f2c1
                                                  • Instruction ID: e640cd6cd8cac83edaeb27620b346a54ece7981c423c4c8694d6f0465735f5d9
                                                  • Opcode Fuzzy Hash: 6850ef86fb4076c0b7dc8c4acebd046bee77553286abbc5ec8fdca19b540f2c1
                                                  • Instruction Fuzzy Hash: 044168B1600218AFEB209B65DC45FFB77BCEB48705F5040BABB05E6191E6348E858B68
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: cannot open indexed column for writing$cannot open value of type %s$cannot open view: %s$cannot open virtual table: %s$integer$no such column: "%s"$no such rowid: %lld$null$real
                                                  • API String ID: 2102423945-3895736865
                                                  • Opcode ID: f19eb400f3c41d13b4b4adb641b36c7561a1bd7158cf6593a71066a539921850
                                                  • Instruction ID: 1c39d258b606269677df8366a9a9b37e657cd3d020fb47e65ab0c728d684064c
                                                  • Opcode Fuzzy Hash: f19eb400f3c41d13b4b4adb641b36c7561a1bd7158cf6593a71066a539921850
                                                  • Instruction Fuzzy Hash: 58D1D275A043009FDB14DF26C981A6B77E1BF88314F14456EFC469B382D738EC859B9A
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: )$1$6$7$?$@$F$m$z${${7Fm
                                                  • API String ID: 0-3350488062
                                                  • Opcode ID: ab22884605708cacbf87638a16f2b24ad69a0498c3ce37b007d2e7a4d264f689
                                                  • Instruction ID: abc2ea1c28d9af5ec1e8d3d20012650d70f5329abdd167f77e90dae66f534301
                                                  • Opcode Fuzzy Hash: ab22884605708cacbf87638a16f2b24ad69a0498c3ce37b007d2e7a4d264f689
                                                  • Instruction Fuzzy Hash: 2B921B71E002189FDB24DF95C881BAEBBB2BF88314F14815EE859AB391D774AD81CF44
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataErrorLastUnprotect
                                                  • String ID: H}>$I$appl$com.$e.Sa$fari
                                                  • API String ID: 2338517654-3462864509
                                                  • Opcode ID: 94a7040397679afb0da2cfae656555b9312754760937709b9bff47d08068d2f1
                                                  • Instruction ID: 112c83f1d6b321e5d779c1ba887b5631f319be0a502ba95ed125041437fd58d1
                                                  • Opcode Fuzzy Hash: 94a7040397679afb0da2cfae656555b9312754760937709b9bff47d08068d2f1
                                                  • Instruction Fuzzy Hash: 0A4124B1C043189FDB21DFA6D9946DEBBB8FF04308F20419EE059AB206D7344A858FA5
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000), ref: 004014E0
                                                  • GetLastError.KERNEL32 ref: 004014EA
                                                  • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00401502
                                                  • GetLastError.KERNEL32 ref: 0040150C
                                                  • CryptReleaseContext.ADVAPI32(?,00000000,?,?,00000000), ref: 0040156B
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                                                  • String ID:
                                                  • API String ID: 4104741015-0
                                                  • Opcode ID: cb05d4a9a8b8c3cfb9550d350d9a92a4cfd5376c2814b7609c45730aaef85564
                                                  • Instruction ID: 13da4c9eb335e9b0161705412a548af386c45a7e3d318d12b2a33f42dfa186b3
                                                  • Opcode Fuzzy Hash: cb05d4a9a8b8c3cfb9550d350d9a92a4cfd5376c2814b7609c45730aaef85564
                                                  • Instruction Fuzzy Hash: 8B21EB71A00209AFDF109FA5EC49FAF7BB8EB48705F104036F602FA1E1D77499459B69
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetTempPathW.KERNEL32(000000E6,?), ref: 0040AB5A
                                                  • GetTempPathA.KERNEL32(000000E6,?), ref: 0040AB8B
                                                  • _free.LIBCMT ref: 0040ABB2
                                                  • GetLastError.KERNEL32(00000000,000000E6), ref: 0040AC49
                                                  • FormatMessageA.KERNEL32(00001000,00000000,00000000,00000000,?,?,00000000), ref: 0040AC5F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: PathTemp$ErrorFormatLastMessage_free
                                                  • String ID: %s\etilqs_$OsError 0x%x (%u)
                                                  • API String ID: 257238391-953182593
                                                  • Opcode ID: 16943fa6115931c8d725ff94af29ed07b3479ecbca6071eab1db20e76ea755a9
                                                  • Instruction ID: 048ffe273a1deeaf6115c4458aa2f8582d6da36ed0614943e47704e738e1a82c
                                                  • Opcode Fuzzy Hash: 16943fa6115931c8d725ff94af29ed07b3479ecbca6071eab1db20e76ea755a9
                                                  • Instruction Fuzzy Hash: E9417A315003486BE7119766CC46FFF36ACDB54748F1004BFFA05E61C2EE789E85866A
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: %d values for %d columns$PQC$rows inserted$table %S has %d columns but %d values were supplied$table %S has no column named %s
                                                  • API String ID: 0-3933732821
                                                  • Opcode ID: bfa28d55098c353a8d688e384a322c76cf40cc56afa9e66ae6ce6e320f876ab4
                                                  • Instruction ID: 80051d1740749a808c0c5e75704f5f90acfb60860884c3a17a1ce1490c759cc0
                                                  • Opcode Fuzzy Hash: bfa28d55098c353a8d688e384a322c76cf40cc56afa9e66ae6ce6e320f876ab4
                                                  • Instruction Fuzzy Hash: D9928D707043019BDB24DE25D881B6BBBE2EFC4314F54892EF9899B391D779D841CB8A
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Strings
                                                  • X7C, xrefs: 00431817
                                                  • LIMIT clause should come after %s not before, xrefs: 00431294
                                                  • X7C, xrefs: 0043123E
                                                  • ORDER BY clause should come after %s not before, xrefs: 0043126E
                                                  • SELECTs to the left and right of %s do not have the same number of result columns, xrefs: 004312E2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: LIMIT clause should come after %s not before$ORDER BY clause should come after %s not before$SELECTs to the left and right of %s do not have the same number of result columns$X7C$X7C
                                                  • API String ID: 2102423945-551544611
                                                  • Opcode ID: 0b380d768b6e293677172490d8d6e983447e731701675c14bed95a8c4dcff366
                                                  • Instruction ID: 06507366ad9bb645f16cef60264797060e35baf9a56a7de25e8e74fb357399c2
                                                  • Opcode Fuzzy Hash: 0b380d768b6e293677172490d8d6e983447e731701675c14bed95a8c4dcff366
                                                  • Instruction Fuzzy Hash: 39225271E002149FCF14DFA5D891AAEBBB5AF8C314F24916EE805AB355DB38EC42CB54
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetSystemTime.KERNEL32(?), ref: 0040B16F
                                                  • GetCurrentProcessId.KERNEL32 ref: 0040B18B
                                                  • GetTickCount.KERNEL32 ref: 0040B1A0
                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 0040B1B7
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CountCounterCurrentPerformanceProcessQuerySystemTickTime
                                                  • String ID:
                                                  • API String ID: 4122616988-0
                                                  • Opcode ID: 4d717b62ccedae848c66fecf42440c0f91cf3a6b7ae322fe5b531e543040420f
                                                  • Instruction ID: 5573ff8d0779eb9e970b08bbd5f5d3e778c41fe2405c7178ce7c20baa5cee598
                                                  • Opcode Fuzzy Hash: 4d717b62ccedae848c66fecf42440c0f91cf3a6b7ae322fe5b531e543040420f
                                                  • Instruction Fuzzy Hash: 7B11A776A0061ADBCB00CFA8DD8849EFBB5FF49755B50003AE906E7281C775F94187E8
                                                  Uniqueness

                                                  Uniqueness Score: 1.34%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: no such column: %s$rows updated
                                                  • API String ID: 0-885832449
                                                  • Opcode ID: e203a31a506f2057730e560754275b65403bd6c4c760271b5fa5c7d26cfb4e65
                                                  • Instruction ID: b4ce00cad43e15cd2f025ff4e09c4d130f6588f425d016b15a420459969a495b
                                                  • Opcode Fuzzy Hash: e203a31a506f2057730e560754275b65403bd6c4c760271b5fa5c7d26cfb4e65
                                                  • Instruction Fuzzy Hash: CC825D75F00608AFDF24DF55D881BAEBBB2EF88314F24802EE805AB391D7799951DB44
                                                  Uniqueness

                                                  Uniqueness Score: 8.94%

                                                  APIs
                                                  • CryptUnprotectData.CRYPT32(?,00000000,00000000,00000000,00000000,00000000,?), ref: 004028A6
                                                  • GetLastError.KERNEL32 ref: 004028B0
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CryptDataErrorLastUnprotect
                                                  • String ID:
                                                  • API String ID: 2338517654-0
                                                  • Opcode ID: 04b8d0630e7645b7ef90869d6005f6aa84b7ccc7cac2b962110de36102875b66
                                                  • Instruction ID: b635409500d68d1f47125f04b53cfe1906871641c4550d985b56995902c84602
                                                  • Opcode Fuzzy Hash: 04b8d0630e7645b7ef90869d6005f6aa84b7ccc7cac2b962110de36102875b66
                                                  • Instruction Fuzzy Hash: E5F08276900219FBCB01ABEDAC448EFBFBCEE88215B14447AE501E3142E274954487A5
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00447071
                                                  • UnhandledExceptionFilter.KERNEL32(004401E0), ref: 0044707A
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: 23ac448b40df33725da15c11452ecc075401f9ec2ed433e575d6cbcb18c878f7
                                                  • Instruction ID: 431b5b6d55591f59a67da81c5ddb3cf07809f4b4185e530316c8010aac57b188
                                                  • Opcode Fuzzy Hash: 23ac448b40df33725da15c11452ecc075401f9ec2ed433e575d6cbcb18c878f7
                                                  • Instruction Fuzzy Hash: 6CB09231044708ABCA802BD1EC0DB883FA8EB95A6BF044024F60D480629B6294D08A99
                                                  Uniqueness

                                                  Uniqueness Score: 0.02%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: UUUU$u2@
                                                  • API String ID: 0-1132444183
                                                  • Opcode ID: 9a34f9b9761bd84daece0e3a20f84ddd8ded304b861b43637c9569a22b7614fc
                                                  • Instruction ID: 14790c8c6396b702bbad005063c0d6e3ac1ee14afceafae076eb958ebc85837e
                                                  • Opcode Fuzzy Hash: 9a34f9b9761bd84daece0e3a20f84ddd8ded304b861b43637c9569a22b7614fc
                                                  • Instruction Fuzzy Hash: 0F51D523F109610BE75CCABD8C5636D6AD2D7C8301B49823DE962D33C2D8BCDA16D794
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 013a97ef4ca6fd37885ddaecd38749e153caa4932e06c0ca3050e05fd65b0ee3
                                                  • Instruction ID: 220339bd0c54e9a8b81c7b04430dd88d7c9ab7668bf576977675982e13af3a04
                                                  • Opcode Fuzzy Hash: 013a97ef4ca6fd37885ddaecd38749e153caa4932e06c0ca3050e05fd65b0ee3
                                                  • Instruction Fuzzy Hash: 45126D71A083019FDB14CF28C580A2BB7E1BF9C314F14A96EE8899B356D778DD41CB96
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: string or blob too big
                                                  • API String ID: 0-2803948771
                                                  • Opcode ID: c18cf89abaa838a81220c64af99c856be56ad49fb16a17007ff9ba817d069cba
                                                  • Instruction ID: 864758d9b87c1f80d4271ac03387e4c77c4c371fb259379b19c5813abbf02dd7
                                                  • Opcode Fuzzy Hash: c18cf89abaa838a81220c64af99c856be56ad49fb16a17007ff9ba817d069cba
                                                  • Instruction Fuzzy Hash: EB02E775E04219DFDB24DF65C890BADB7B2BB88304F2481AED449A7342DB34AD86CF45
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000001,00000000), ref: 00443C67
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: cad097290e12b1b4f6b4af668c122442a5fbade9ec49fa03d932c48df6e6b355
                                                  • Instruction ID: 9c87fba3d9f4e25d9d5505986f67a57b972fe4df9d792ea3022934618778e6ea
                                                  • Opcode Fuzzy Hash: cad097290e12b1b4f6b4af668c122442a5fbade9ec49fa03d932c48df6e6b355
                                                  • Instruction Fuzzy Hash: 7AB012F03016034B870C4B39AC1810939D46748316301403DF003C6660EF20C4D09F04
                                                  Uniqueness

                                                  Uniqueness Score: 0.04%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ba8c0a27a624732005806bacda7eca9c24c1c90c62841d3e8b34e9a80acb7ffd
                                                  • Instruction ID: 1bde675d7cb36a4dfc236672df8b399ac4285bb6791fc2477a4d09314199fdd8
                                                  • Opcode Fuzzy Hash: ba8c0a27a624732005806bacda7eca9c24c1c90c62841d3e8b34e9a80acb7ffd
                                                  • Instruction Fuzzy Hash: 0922CE71D00B09DFDB12CF64C8916AAF7B6EF59380F14A31AF8167B251EB34A842CB54
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 45bc4f280c4f43f9b34f3b7e14573a1adb0df6110127e6b4d982452ea7f777ad
                                                  • Instruction ID: 0303ccd593202b298946c15832e9dad50c71af7ea2cd5666f6de60dd6283fd17
                                                  • Opcode Fuzzy Hash: 45bc4f280c4f43f9b34f3b7e14573a1adb0df6110127e6b4d982452ea7f777ad
                                                  • Instruction Fuzzy Hash: B4C15B739192828ADB154D3884412AA7B63DBB6300F1889BFC4E69B7C7D13CDE47C755
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                  • Instruction ID: 947c8c80846cd5ef9b79afa1489b92ae01a8c007dd4fd7a42249d79b9a971375
                                                  • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                  • Instruction Fuzzy Hash: F7C1643224519309FF2E463A847503FFAA19AA27B131A075FD9B3CB2D4EF18D534D668
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                  • Instruction ID: 82206f98a64442fab1d9e6d250ead7e3fc54b3ffe1589196ab6bcb09d267fd00
                                                  • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                  • Instruction Fuzzy Hash: 8AC1753220519309FF2E4639C47503FFAA19AA27B131A075FD5B2CB2D5EF28D534D668
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction ID: 0a87ff71265b5533d886972f838e712b874229f1e94b48d7fc1039efa0819dc6
                                                  • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                  • Instruction Fuzzy Hash: 9AC1C8722851930AFF2E4639C47503FFAA29A927B131A076FD5B3CB2C4EE18D534D619
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction ID: 964a182c8b463d7b8dc4f94027c52cbbbd804eb579ffd4cb39d8dad8079028e9
                                                  • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                  • Instruction Fuzzy Hash: 85C1823224519309FF2E4639843503FFBA19AA2BB131A175FD5B3CB2C4EE28D534D629
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 21f0dcef36a83bfe4b1d2abcd5f71e0b761cc08f6b5e0902d1dc2980e3d3d9ad
                                                  • Instruction ID: c45748679917e11f656f14e3c0ff5ed0403404945de07b0f7a2762cd0b474aaa
                                                  • Opcode Fuzzy Hash: 21f0dcef36a83bfe4b1d2abcd5f71e0b761cc08f6b5e0902d1dc2980e3d3d9ad
                                                  • Instruction Fuzzy Hash: 25A18F75F002149FCF18DFA9D491AAEBBB1EF88314F6440AAE905AB352D634DD81CB94
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9a1f4fc1f7770ecf54f30701b9110e107b6e7f01cace5a40b767f9815dabab6
                                                  • Instruction ID: fde7858b9745702015d4641007b9973432358b79b4ace49d13ee0d11f70987c6
                                                  • Opcode Fuzzy Hash: f9a1f4fc1f7770ecf54f30701b9110e107b6e7f01cace5a40b767f9815dabab6
                                                  • Instruction Fuzzy Hash: DEA13C75E44328CFDB28CB15CC80BAAB3B2AF95314F1581DAD949A7391D734AEC18F46
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8da0a6755cc4fb0cde715dc2969c72d1d33f0a0ed93c740cf1cb9ca20dda6d82
                                                  • Instruction ID: e9166c92d23ea881a7f391818d3d0e8853d1512bb3726e96ce969474da023ca4
                                                  • Opcode Fuzzy Hash: 8da0a6755cc4fb0cde715dc2969c72d1d33f0a0ed93c740cf1cb9ca20dda6d82
                                                  • Instruction Fuzzy Hash: CD81AC319091959FDB19CF6D88904ADFFF1EE99240758819EE895EB383C638D606CBF0
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8372c4356d596b28eeceba545d7fe4d27a2ae28253c89b92fb3154f3acc86d5
                                                  • Instruction ID: 6085f1343506ba1194b1e2bbbe16cbd3898391059da68f07d5652f4e731f9ace
                                                  • Opcode Fuzzy Hash: c8372c4356d596b28eeceba545d7fe4d27a2ae28253c89b92fb3154f3acc86d5
                                                  • Instruction Fuzzy Hash: 82615477A20614CBC708DF19FC52596B761FB5D301B4A822EE502DB392DA39EE13DB84
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 32c10a98b26791f37a2dcd5c5a604c30aa1fabb3f6e17e78f1eb4068557c228d
                                                  • Instruction ID: e0499c6cb47041c6478430642dc5da84ff6b4007533e07d4534a5b8869239d75
                                                  • Opcode Fuzzy Hash: 32c10a98b26791f37a2dcd5c5a604c30aa1fabb3f6e17e78f1eb4068557c228d
                                                  • Instruction Fuzzy Hash: 1F316D7372042507E398E53D8C0676BA2C3DBC86A0719C63AE696D73C2ED68ED1282C4
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction ID: 3943e006dad30c2b35a75684744f4ed9506d338c73f28b1d61306e06602dfd69
                                                  • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
                                                  • Instruction Fuzzy Hash: DA112E77A0004143D6148A3DC5BA5B79395EBDD321F2D637FE0424BB78D22B995F9508
                                                  Uniqueness

                                                  Uniqueness Score: 0.00%

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(pstorec.dll), ref: 0040177F
                                                  • GetLastError.KERNEL32(?,?,?,?,0045317F,000000FF), ref: 0040178B
                                                  • 74ECFFF6.KERNEL32(00000000,PStoreCreateInstance,?,?,?,?,0045317F,000000FF), ref: 004017C5
                                                  • GetLastError.KERNEL32(?,?,?,?,0045317F,000000FF), ref: 004017D1
                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,?,0045317F,000000FF), ref: 004017D8
                                                  • _com_issue_errorex.COMSUPP ref: 00401842
                                                  • FreeLibrary.KERNEL32(?,00000000,00000400,004596A8), ref: 00401848
                                                  • swprintf.LIBCMT ref: 0040189F
                                                  • _com_issue_errorex.COMSUPP ref: 004018E0
                                                  • _com_issue_errorex.COMSUPP ref: 0040196E
                                                  • _memset.LIBCMT ref: 004019B9
                                                  • _memset.LIBCMT ref: 004019C7
                                                  • _memset.LIBCMT ref: 004019D5
                                                  • _memset.LIBCMT ref: 004019E3
                                                  • swprintf.LIBCMT ref: 004019FB
                                                  • _com_issue_errorex.COMSUPP ref: 00401A77
                                                    • Part of subcall function 0044E8C0: GetErrorInfo.OLEAUT32(00000000,004596A8,?,00401847,00000000,00000400,004596A8), ref: 0044E905
                                                  • lstrlen.KERNEL32(?), ref: 00401A87
                                                  • swprintf.LIBCMT ref: 00401AF1
                                                  • lstrcmp.KERNEL32(?,5e7e8100), ref: 00401B05
                                                  • _strstr.LIBCMT ref: 00401B21
                                                  • lstrcmp.KERNEL32(?,e161255a), ref: 00401B82
                                                  • _strstr.LIBCMT ref: 00401B9C
                                                  • _strstr.LIBCMT ref: 00401BB8
                                                  • _strstr.LIBCMT ref: 00401BCB
                                                  • lstrcpyn.KERNEL32(?,?,00000008), ref: 00401BE1
                                                  • _strstr.LIBCMT ref: 00401BF0
                                                  • _strstr.LIBCMT ref: 00401C04
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 00401C20
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 00401C4D
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 00401C92
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _strstr$_com_issue_errorex_memset$ErrorLibrary___from_strstr_to_strchrswprintf$FreeLastlstrcmp$InfoLoadlstrcpynlstrlen
                                                  • String ID: %ws$5e7e8100$:String$PStoreCreateInstance$StringIndex$e161255a$http:/$https:/$pstorec.dll
                                                  • API String ID: 2006584277-1781466581
                                                  • Opcode ID: c9291dc0df9edbff115d6eba607c207e8f2f94f17579559f2a12fb11536a3f8b
                                                  • Instruction ID: ebdffb0fa715aad9c91bb8fedda387324a36028152473a51467efa50d7050c54
                                                  • Opcode Fuzzy Hash: c9291dc0df9edbff115d6eba607c207e8f2f94f17579559f2a12fb11536a3f8b
                                                  • Instruction Fuzzy Hash: B1F1B372900619ABDB20EBA5CC45EEB77BCBF44705F1444AEF505E7181EE38EE448B68
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memcmp$Unothrow_t@std@@@__ehfuncinfo$??2@$_strncmp$__allrem_memset
                                                  • String ID: -$day$hour$localtime$minute$month$second$start of $unixepoch$utc$weekday $year
                                                  • API String ID: 152601959-3507268942
                                                  • Opcode ID: f3b4cdd88590e9127c702cc987a97a04c5244d473823942857760fdba5ed30d2
                                                  • Instruction ID: 1ee899da5132e623605963c04245b994d3b192b5fad381cfb57372e20079d785
                                                  • Opcode Fuzzy Hash: f3b4cdd88590e9127c702cc987a97a04c5244d473823942857760fdba5ed30d2
                                                  • Instruction Fuzzy Hash: 15F133B1E046089AEB15EF70CC517AE77B4AF05348F16427BEC07BB2C6EB7888558749
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 004015C5: GetStdHandle.KERNEL32(000000F5), ref: 004015D7
                                                    • Part of subcall function 004015C5: GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 004015E2
                                                    • Part of subcall function 00401601: GetStdHandle.KERNEL32(000000F5,00000000,004015AD,00468230,00001000,?,?), ref: 00401606
                                                    • Part of subcall function 00401601: SetConsoleTextAttribute.KERNEL32(00000000,00000004), ref: 00401611
                                                  • _wprintf.LIBCMT ref: 00401630
                                                  • _wprintf.LIBCMT ref: 00401646
                                                    • Part of subcall function 0043FC61: __stbuf.LIBCMT ref: 0043FCAD
                                                    • Part of subcall function 0043FC61: __ftbuf.LIBCMT ref: 0043FCDB
                                                  • _wprintf.LIBCMT ref: 00401655
                                                  • _wprintf.LIBCMT ref: 00401663
                                                  • _wprintf.LIBCMT ref: 0040167B
                                                  • _wprintf.LIBCMT ref: 00401685
                                                  • _wprintf.LIBCMT ref: 0040168F
                                                  • _wprintf.LIBCMT ref: 0040169A
                                                  • _wprintf.LIBCMT ref: 004016A4
                                                  • _wprintf.LIBCMT ref: 004016AF
                                                  • _wprintf.LIBCMT ref: 004016B9
                                                  • _wprintf.LIBCMT ref: 004016C7
                                                  • _wprintf.LIBCMT ref: 004016D1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wprintf$ConsoleHandle$AttributeBufferInfoScreenText__ftbuf__stbuf
                                                  • String ID: %s.exe$ %s.exe -f "c:\passlist.txt"$ %s.exe -h$ //Dump login passwords from all the Browsers to console$ //Dump login passwords from all the Browsers to a file 'c:\passlist.txt'$ //Show this help screen$ Examples:$ Usage: %s.exe [-h | -f <output_file_name>]$ %s$ %s v%s by SecurityXploded$****************************************************************$3.6$Browser Password Dump$BrowserPasswordDump$http://securityxploded.com/browser-password-dump.php
                                                  • API String ID: 3262292661-2879426120
                                                  • Opcode ID: b8967ce6b5c21fd085886abd8ed04e0add64bf56fa950f7457a9ab34d94c2a93
                                                  • Instruction ID: fe1aa10abee3bf08f288e37f315ef5a5e4f4d2e05d157f2ccf7ad07784bd116c
                                                  • Opcode Fuzzy Hash: b8967ce6b5c21fd085886abd8ed04e0add64bf56fa950f7457a9ab34d94c2a93
                                                  • Instruction Fuzzy Hash: 0E01D291FC820866E81132A71DCBF1E14186ACAF5BF28343FBCC5351C39DAEA40D616E
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _strstr$_fgets$__wfopen_s
                                                  • String ID: </data>$</dict>$</string>$<data>$<dict>$<key>account</key>$<key>data</key>$<key>server</key>$<string>$passwords$saved
                                                  • API String ID: 1711266154-3867735639
                                                  • Opcode ID: 681c0a052362e01a15367481536b37113e9fdb792b2438bbce2637949f4acb08
                                                  • Instruction ID: a8b929ab4c36e7d8c28f90fd3812f70ed44f558aec73399850f8e4bd73332667
                                                  • Opcode Fuzzy Hash: 681c0a052362e01a15367481536b37113e9fdb792b2438bbce2637949f4acb08
                                                  • Instruction Fuzzy Hash: ACA1127690830959DF24DE659C45EDA7BBC9B08315F1000FBE508F71C2EE79EB488A2C
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • GetTempPathA.KERNEL32(00000410,?), ref: 0040544B
                                                  • __time64.LIBCMT ref: 00405458
                                                    • Part of subcall function 0044105C: GetSystemTimeAsFileTime.KERNEL32(?,?,?,?,0040545D,?,?,00000208,00000003,?,0040581C,?,0040366A,?), ref: 00441065
                                                    • Part of subcall function 0044105C: __aulldiv.LIBCMT ref: 00441085
                                                  • __allrem.LIBCMT ref: 00405470
                                                  • swprintf.LIBCMT ref: 00405485
                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,0000022B,00000000,?,00000208,00000003,?,0040581C,?,0040366A,?), ref: 004054C0
                                                  • CreateFileMappingA.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000), ref: 004054D4
                                                  • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,00000000,?,?,0000022B,00000000,?,00000208,00000003), ref: 004054EC
                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,0000022B,00000000,?,00000208,00000003,?,0040581C,?,0040366A,?), ref: 004054FE
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405505
                                                  • _strstr.LIBCMT ref: 0040556D
                                                  • _strstr.LIBCMT ref: 004055B8
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 004055DE
                                                  • _strstr.LIBCMT ref: 00405611
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 00405638
                                                  • _strstr.LIBCMT ref: 0040566B
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 00405692
                                                  • ___from_strstr_to_strchr.LIBCMT ref: 0040571F
                                                  • UnmapViewOfFile.KERNEL32(?,?,?,00000000,?,?,0000022B,00000000,?,00000208,00000003,?,0040581C,?,0040366A,?), ref: 00405739
                                                  • CloseHandle.KERNEL32(?), ref: 0040574B
                                                  • CloseHandle.KERNEL32(?), ref: 00405758
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File___from_strstr_to_strchr_strstr$CloseHandle$ErrorLastTimeView$CreateMappingPathSystemTempUnmap__allrem__aulldiv__time64swprintf
                                                  • String ID: "encryptedPassword":$"encryptedUsername":$"hostname":$"logins":$%sfirefox_tmp_%d.bin${"nextId":
                                                  • API String ID: 3109789586-1293949256
                                                  • Opcode ID: 009ac6dedd8aab54d5fca007712f9dc09d8284ea3e8c81bc8375826e8de7057e
                                                  • Instruction ID: 413e8bf016511b79fdcbff6a3f51ae92c6d297fc5b988d0893402a2093297d67
                                                  • Opcode Fuzzy Hash: 009ac6dedd8aab54d5fca007712f9dc09d8284ea3e8c81bc8375826e8de7057e
                                                  • Instruction Fuzzy Hash: 08A16772C04619AADB20DF648C44AEF777DEF45304F1041AAF944B7181DBB9AE86CF68
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _fprintf$_wprintf
                                                  • String ID: %-20s %-30s %-20s %-s$ Browser: %s$ Password: %s$ Username: %s$ Website: %s$---------------------------------------------------------------------------$ Apple Safari$ Chrome SXS$ Comodo Dragon$ CoolNovo$ Firefox$ Flock Browser$ Google Chrome$ Internet Explorer$ Opera Browser$ SRWare Iron Browser$ SeaMonkey
                                                  • API String ID: 3790670098-356740883
                                                  • Opcode ID: fee75209e23558730d431846efe706d9540b720cd66d1370b104eb6f3501f6b9
                                                  • Instruction ID: 265d2060f09d743dde03ff209318892b02eccaa8761687ec2db3a3ef2b46b27c
                                                  • Opcode Fuzzy Hash: fee75209e23558730d431846efe706d9540b720cd66d1370b104eb6f3501f6b9
                                                  • Instruction Fuzzy Hash: D6318A30A44217EADF00AE249C59EB43B3AAB46709F2001FBFE42B21D3D57D5E0D5A1E
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • LoadLibraryA.KERNEL32(vaultcli.dll), ref: 004040C4
                                                  • GetLastError.KERNEL32 ref: 004040D3
                                                  • 74ECFFF6.KERNEL32(00000000,VaultOpenVault,00000094), ref: 004040E9
                                                  • 74ECFFF6.KERNEL32(VaultCloseVault), ref: 004040FB
                                                  • 74ECFFF6.KERNEL32(VaultEnumerateItems), ref: 0040410D
                                                  • 74ECFFF6.KERNEL32(VaultFree), ref: 0040411F
                                                  • 74ECFFF6.KERNEL32(VaultGetItem), ref: 0040413A
                                                  • 74ECFFF6.KERNEL32(VaultGetItem), ref: 00404143
                                                  • GetLastError.KERNEL32 ref: 00404188
                                                  • FreeLibrary.KERNEL32 ref: 00404194
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorLastLibrary$FreeLoad
                                                  • String ID: VaultCloseVault$VaultEnumerateItems$VaultFree$VaultGetItem$VaultOpenVault$vaultcli.dll
                                                  • API String ID: 1452865118-3967309459
                                                  • Opcode ID: 11fedaefcdef3ba3a4abce74a4c7efbeaeec23cff243f706bdf952807379a7e8
                                                  • Instruction ID: ea94518270bb1219c060c3e2d70ca51e1a3de07b19f07da174c8a5d294ca2ebd
                                                  • Opcode Fuzzy Hash: 11fedaefcdef3ba3a4abce74a4c7efbeaeec23cff243f706bdf952807379a7e8
                                                  • Instruction Fuzzy Hash: 132147B1951302EBCB14AF70FD292453EE5A758342B144A7BE502D21B1FBF88884CE1E
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _memset.LIBCMT ref: 00403C65
                                                  • SHGetFolderPathA.SHELL32(00000000,0000002A,00000000,00000000,00000000), ref: 00403C81
                                                  • GetLastError.KERNEL32 ref: 00403C8D
                                                  • SHGetFolderPathA.SHELL32(00000000,00000026,00000000,00000000,00000000), ref: 00403C9D
                                                  • GetLastError.KERNEL32 ref: 00403CA3
                                                  • swprintf.LIBCMT ref: 00403CC0
                                                  • GetFileAttributesA.KERNEL32 ref: 00403CC9
                                                  • SHGetFolderPathA.SHELL32(00000000,0000002C,00000000,00000000,00000000), ref: 00403CEB
                                                  • GetLastError.KERNEL32 ref: 00403CF1
                                                  • SHGetFolderPathA.SHELL32(00000000,0000002B,00000000,00000000,00000000), ref: 00403D01
                                                  • swprintf.LIBCMT ref: 00403D19
                                                  • GetFileAttributesA.KERNEL32 ref: 00403D22
                                                  • GetLastError.KERNEL32 ref: 00403D31
                                                  Strings
                                                  • %s\Safari\Apple Application Support\plutil.exe, xrefs: 00403CB5
                                                  • %s\Apple\Apple Application Support\plutil.exe, xrefs: 00403D0E
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFolderLastPath$AttributesFileswprintf$_memset
                                                  • String ID: %s\Apple\Apple Application Support\plutil.exe$%s\Safari\Apple Application Support\plutil.exe
                                                  • API String ID: 949164352-935006301
                                                  • Opcode ID: 016c55747f874587dc8f608766473fcea1f6235d7759d7fc5f8072f81977262b
                                                  • Instruction ID: eae8423ff20c08bf8165e5609fdd02d8b20e7054d1c077a8afec4fd0d5f5fe2c
                                                  • Opcode Fuzzy Hash: 016c55747f874587dc8f608766473fcea1f6235d7759d7fc5f8072f81977262b
                                                  • Instruction Fuzzy Hash: D1219BB1A042587AF710EA759C49FFB7A9CDF54705F000876F995F20C2E678EE844664
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 00406C5B: _memset.LIBCMT ref: 00406C70
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004071B7
                                                  • __allrem.LIBCMT ref: 004071C2
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004071E3
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00407255
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0040727C
                                                  • __allrem.LIBCMT ref: 00407288
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$__allrem$_memset
                                                  • String ID: %.16g$%02d$%03d$%04d$%06.3f$%lld$W
                                                  • API String ID: 3997530026-1989508764
                                                  • Opcode ID: 3f1e657990530f03e9014b28b7d9bd78ec47f89b71bbb894e2587a3cd39b06fd
                                                  • Instruction ID: 9a2760adfa7bf91d56c92e027d888165973dd773369e549a9856a653455803fe
                                                  • Opcode Fuzzy Hash: 3f1e657990530f03e9014b28b7d9bd78ec47f89b71bbb894e2587a3cd39b06fd
                                                  • Instruction Fuzzy Hash: EDB12972D0C3415AE7249E248C45B3BBB95EB91344F14063FF886BA3D2DA3DED41929B
                                                  Uniqueness

                                                  Uniqueness Score: 23.02%

                                                  APIs
                                                  Strings
                                                  • Fragmented space is %d byte reported as %d on page %d, xrefs: 00414E74
                                                  • Page %d: , xrefs: 0041492A
                                                  • unable to get the page. error code=%d, xrefs: 0041499E
                                                  • On tree page %d cell %d: , xrefs: 00414A10
                                                  • Corruption detected in cell %d on page %d, xrefs: 00414D3D, 00414DE1
                                                  • Corruption detected in header on page %d, xrefs: 00414C5F
                                                  • Multiple uses for byte %d of page %d, xrefs: 00414EB1
                                                  • Child page depth differs, xrefs: 00414B6C
                                                  • On page %d at right child: , xrefs: 00414BB8
                                                  • sqlite3BtreeInitPage() returns error code %d, xrefs: 004149C4
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: Child page depth differs$Corruption detected in cell %d on page %d$Corruption detected in header on page %d$Fragmented space is %d byte reported as %d on page %d$Multiple uses for byte %d of page %d$On page %d at right child: $On tree page %d cell %d: $Page %d: $sqlite3BtreeInitPage() returns error code %d$unable to get the page. error code=%d
                                                  • API String ID: 2102423945-2138277338
                                                  • Opcode ID: 3196661aed55c5ffea0dc3aee103eef4122dc409f22395be158dfaf83aa85216
                                                  • Instruction ID: 4449f1c52aeb1e1102fb1056699099e87c13c55ebea4d73bb25e23df297cbc3e
                                                  • Opcode Fuzzy Hash: 3196661aed55c5ffea0dc3aee103eef4122dc409f22395be158dfaf83aa85216
                                                  • Instruction Fuzzy Hash: DE028570E041289FDB24DB65CC81BEDBBB5AF45308F1440AEE949E7282DB389D85CF59
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _memset.LIBCMT ref: 00426802
                                                    • Part of subcall function 00425590: _memset.LIBCMT ref: 004255DC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: 4E$CREATE %s %.*s$CREATE TABLE %Q.sqlite_sequence(name,seq)$TABLE$UPDATE %Q.%s SET type='%s', name=%Q, tbl_name=%Q, rootpage=#%d, sql=%Q WHERE rowid=#%d$VIEW$sqlite_master$sqlite_temp_master$table$tbl_name='%q'$view
                                                  • API String ID: 2102423945-1343417507
                                                  • Opcode ID: 1690e64908b1bb3e41d3d037fb1efe289a11af7b74d6702b34930be8566f5574
                                                  • Instruction ID: dadc51f84a76b84ae01c2745e32f2931c0738617d3af410ecc4e060824c9b33f
                                                  • Opcode Fuzzy Hash: 1690e64908b1bb3e41d3d037fb1efe289a11af7b74d6702b34930be8566f5574
                                                  • Instruction Fuzzy Hash: F5A1A370E002149FDB14DFA5D881BAEB7B1FF44304F10812EE815AB386DB79A985CF88
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 004015C5: GetStdHandle.KERNEL32(000000F5), ref: 004015D7
                                                    • Part of subcall function 004015C5: GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 004015E2
                                                    • Part of subcall function 00401601: GetStdHandle.KERNEL32(000000F5,00000000,004015AD,00468230,00001000,?,?), ref: 00401606
                                                    • Part of subcall function 00401601: SetConsoleTextAttribute.KERNEL32(00000000,00000004), ref: 00401611
                                                  • _wprintf.LIBCMT ref: 004016F9
                                                  • _wprintf.LIBCMT ref: 0040170F
                                                    • Part of subcall function 0043FC61: __stbuf.LIBCMT ref: 0043FCAD
                                                    • Part of subcall function 0043FC61: __ftbuf.LIBCMT ref: 0043FCDB
                                                  • _wprintf.LIBCMT ref: 0040171E
                                                  • _wprintf.LIBCMT ref: 0040172C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _wprintf$ConsoleHandle$AttributeBufferInfoScreenText__ftbuf__stbuf
                                                  • String ID: %s$ %s v%s by SecurityXploded$****************************************************************$3.6$Browser Password Dump$http://securityxploded.com/browser-password-dump.php
                                                  • API String ID: 3262292661-2707220801
                                                  • Opcode ID: 5447e342bb2f0d0d2bd48b39043acf3e802c0da38949aaefccc19599d071dbf8
                                                  • Instruction ID: a409156368bf1bcbdcae675f3f8ab299bc7e4653fc204e6ee928556ec92c6265
                                                  • Opcode Fuzzy Hash: 5447e342bb2f0d0d2bd48b39043acf3e802c0da38949aaefccc19599d071dbf8
                                                  • Instruction Fuzzy Hash: D9E04F21FC820467D51132665C87B2E05441B86F1BF28243FFC857A1C3DEBEA809225E
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _memset.LIBCMT ref: 0044172D
                                                    • Part of subcall function 00442B74: __getptd_noexit.LIBCMT ref: 00442B74
                                                  • __gmtime64_s.LIBCMT ref: 004417C6
                                                  • __gmtime64_s.LIBCMT ref: 004417FC
                                                  • __gmtime64_s.LIBCMT ref: 00441819
                                                  • __allrem.LIBCMT ref: 0044186F
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0044188B
                                                  • __allrem.LIBCMT ref: 004418A2
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004418C0
                                                  • __allrem.LIBCMT ref: 004418D7
                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004418F5
                                                  • __invoke_watson.LIBCMT ref: 00441966
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                  • String ID:
                                                  • API String ID: 384356119-0
                                                  • Opcode ID: ae82f0fd8c9ff6e8a7891d6cb4873f4c4660e46dfe4aa069f5c3141344118efc
                                                  • Instruction ID: 1c2e9f3b440315e897b9ff87a854a8ffd95e2cb4517053983eaf464a08567440
                                                  • Opcode Fuzzy Hash: ae82f0fd8c9ff6e8a7891d6cb4873f4c4660e46dfe4aa069f5c3141344118efc
                                                  • Instruction Fuzzy Hash: DE71B5B2A00716ABF714AE79CC41B6BB3A8AF50364F14422FF514D7791EB78DD808798
                                                  Uniqueness

                                                  Uniqueness Score: 0.50%

                                                  APIs
                                                    • Part of subcall function 0040A347: GetVersionExA.KERNEL32(?), ref: 0040A375
                                                  • GetFullPathNameW.KERNEL32(00000000,00000000,00000000,00000000,00000200,-00000003,?,?,?,0040B024,?,?,00000104,?,?,-00000003), ref: 0040AF45
                                                  • _free.LIBCMT ref: 0040AF62
                                                    • Part of subcall function 0043EE47: HeapFree.KERNEL32(00000000,00000000), ref: 0043EE5B
                                                    • Part of subcall function 0043EE47: GetLastError.KERNEL32(00000000,?,00443875,00000000,004011BE,?), ref: 0043EE6D
                                                  • GetFullPathNameW.KERNEL32(00000000,?,00000000,00000000,?,0040B024,?,?,00000104,?,?,-00000003,?), ref: 0040AF76
                                                  • _free.LIBCMT ref: 0040AF7D
                                                  • _malloc.LIBCMT ref: 0040AF55
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • GetFullPathNameA.KERNEL32(00000000,00000000,00000000,00000000,00000200,-00000003,?,?,?,0040B024,?,?,00000104,?,?,-00000003), ref: 0040AF8D
                                                  • _malloc.LIBCMT ref: 0040AF97
                                                  • GetFullPathNameA.KERNEL32(00000000,00000003,00000000,00000000,?,0040B024,?,?,00000104,?,?,-00000003,?), ref: 0040AFA8
                                                  • _free.LIBCMT ref: 0040AFAF
                                                  • _free.LIBCMT ref: 0040AFC2
                                                  • _free.LIBCMT ref: 0040AFE1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _free$FullNamePath$Heap_malloc$AllocateErrorFreeLastVersion
                                                  • String ID:
                                                  • API String ID: 645363056-0
                                                  • Opcode ID: 6da4d3a8b43ce5b528262e305468534b56f73ae5207b229ec103a782ae74f653
                                                  • Instruction ID: d742aad1ca6b0d95ee89a1469e0c604fbe1e913a3baf9d69510f4047d6236f8c
                                                  • Opcode Fuzzy Hash: 6da4d3a8b43ce5b528262e305468534b56f73ae5207b229ec103a782ae74f653
                                                  • Instruction Fuzzy Hash: 3A11D172502201BACA117BB39C4AD9F3A6C9E89758724002EF501A61C2CF388941D6BE
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000), ref: 004026C2
                                                  • _strstr.LIBCMT ref: 004026F6
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000), ref: 00402721
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000), ref: 00402742
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000100,00000000,00000000,?,?,?,00000000,00000000,00000000,?), ref: 004027AF
                                                  • _wprintf.LIBCMT ref: 00402870
                                                  Strings
                                                  • internet explorer, xrefs: 004026F0
                                                  • Cannot close vault. Error (%d), xrefs: 0040286B
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharMultiWide$_strstr_wprintf
                                                  • String ID: Cannot close vault. Error (%d)$internet explorer
                                                  • API String ID: 3592056907-3867191668
                                                  • Opcode ID: e0d95461d60af1d80551beaa2207679d3590da8dd3dfda26e7310912d5bead65
                                                  • Instruction ID: 4d1387c0489efbbed01cc8ecebd86d00daa755a9ff9f5732f260aac85b03a66a
                                                  • Opcode Fuzzy Hash: e0d95461d60af1d80551beaa2207679d3590da8dd3dfda26e7310912d5bead65
                                                  • Instruction Fuzzy Hash: 958164B59002189FDB249F14DD89BEA7778EB04304F0442FEE655B21D1EAB5AEC5CF28
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • LockFile.KERNEL32(?,00000000,00000001,00000000), ref: 0040A88A
                                                  • Sleep.KERNEL32(00000001), ref: 0040A898
                                                  • GetLastError.KERNEL32 ref: 0040A8AC
                                                  • UnlockFile.KERNEL32(?,00000000,00000001,00000000), ref: 0040A97C
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: File$ErrorLastLockSleepUnlock
                                                  • String ID:
                                                  • API String ID: 3015003838-0
                                                  • Opcode ID: 62345021a42c811d69a35d635617d63fc90c33a13fe622fac9dbd771e8aa61d1
                                                  • Instruction ID: 5200b90f86f007a39e823dd3879f571a5de07d9b63de6ea6e7cd21047070f3ad
                                                  • Opcode Fuzzy Hash: 62345021a42c811d69a35d635617d63fc90c33a13fe622fac9dbd771e8aa61d1
                                                  • Instruction Fuzzy Hash: E241D372600300EFDB119F658844AAB7BB5EF84765F25C43BE905EB381D674C990CB5A
                                                  Uniqueness

                                                  Uniqueness Score: 10.55%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: -$-x0$0123456789ABCDEF0123456789abcdef$NaN
                                                  • API String ID: 0-2453531638
                                                  • Opcode ID: 55b2cc0ee3bd0f046373cec794fd564e6419ef9d905cce7ada30a437b01eef5e
                                                  • Instruction ID: fc2e395650303f2015b8f21f557fa234a39a92dafd7fa64f784ae61352e62576
                                                  • Opcode Fuzzy Hash: 55b2cc0ee3bd0f046373cec794fd564e6419ef9d905cce7ada30a437b01eef5e
                                                  • Instruction Fuzzy Hash: C0E1D53090C7918ED725CF29865022BBBE1AFDA744F18496FE8C5B7381DA38CD45CB5A
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __aulldvrm$__aullrem
                                                  • String ID: -$-x0$0123456789ABCDEF0123456789abcdef$NaN
                                                  • API String ID: 643879872-2453531638
                                                  • Opcode ID: 0d1f107aeaa83dd19ef11860727706a088e957c550ea1df9cf5d2528cf25f715
                                                  • Instruction ID: 9c5d48a71091faf85c448d0ca60df465a89945800782f15cd516962cc0f64dce
                                                  • Opcode Fuzzy Hash: 0d1f107aeaa83dd19ef11860727706a088e957c550ea1df9cf5d2528cf25f715
                                                  • Instruction Fuzzy Hash: 03D1C13090C7918ED725CF29865022BBBE1AFDA744F18496FE8C5B7381DA38CD45CB5A
                                                  Uniqueness

                                                  Uniqueness Score: 1.01%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID: sqlite_master$sqlite_sequence$sqlite_temp_master$table %T already exists$temporary table name must be unqualified$there is already an index named %s
                                                  • API String ID: 2931989736-1813104722
                                                  • Opcode ID: 3b76c39e5e3c594712d3fc83f5cb47401b625eb702156300072680cd920b053c
                                                  • Instruction ID: 58ef7e257e15ed6154c117595b1478aa7c678a9611e551a17e3b9a2697547543
                                                  • Opcode Fuzzy Hash: 3b76c39e5e3c594712d3fc83f5cb47401b625eb702156300072680cd920b053c
                                                  • Instruction Fuzzy Hash: 24B1C371B00615ABDB14DF25EC82BAE7BA5EF44314F14802EF905EB382E7789E41C788
                                                  Uniqueness

                                                  Uniqueness Score: 23.02%

                                                  APIs
                                                  • __mtinitlocknum.LIBCMT ref: 0044C607
                                                    • Part of subcall function 00447437: __FF_MSGBANNER.LIBCMT ref: 0044744C
                                                    • Part of subcall function 00447437: __NMSG_WRITE.LIBCMT ref: 00447453
                                                    • Part of subcall function 00447437: __malloc_crt.LIBCMT ref: 00447473
                                                  • __lock.LIBCMT ref: 0044C61A
                                                  • __lock.LIBCMT ref: 0044C666
                                                  • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00461F38,00000018,0044D781,?,00000000,00000109), ref: 0044C682
                                                  • RtlEnterCriticalSection.NTDLL(8000000C), ref: 0044C69F
                                                  • RtlLeaveCriticalSection.NTDLL(8000000C), ref: 0044C6AF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                  • String ID:
                                                  • API String ID: 1422805418-0
                                                  • Opcode ID: 2777f9be84accda15934c1206faa3214c9007091238da4775ee96c70499a5d45
                                                  • Instruction ID: f15da3cdad859abfb39d24ddf1a27fbb9ce526781c42851f8fedebdd7e6f4bc9
                                                  • Opcode Fuzzy Hash: 2777f9be84accda15934c1206faa3214c9007091238da4775ee96c70499a5d45
                                                  • Instruction Fuzzy Hash: 034144719026068BFB509F68D8C4798B7A0AF01329F29C32FE424A72D0D7BC9941CF8D
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AttributesErrorFileLastSleep$_free
                                                  • String ID:
                                                  • API String ID: 2444173395-0
                                                  • Opcode ID: 434892edc9e8e9016767f646181a2222951ca68531e8e9fe41f251948c378ceb
                                                  • Instruction ID: 3936e97007680c8efaf154f7c210fee210911028383bae2b4257a56c3e796688
                                                  • Opcode Fuzzy Hash: 434892edc9e8e9016767f646181a2222951ca68531e8e9fe41f251948c378ceb
                                                  • Instruction Fuzzy Hash: 3811DA35940310AFCB1067B5E88C56F7A74EB9576AF30013AF512F62D1C7388991D69B
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 0040A4B8
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000), ref: 0040A4CE
                                                  • _malloc.LIBCMT ref: 0040A4DC
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,?,000000FF,00000000,00000000), ref: 0040A4F2
                                                  • _free.LIBCMT ref: 0040A4FD
                                                    • Part of subcall function 0043EE47: HeapFree.KERNEL32(00000000,00000000), ref: 0043EE5B
                                                    • Part of subcall function 0043EE47: GetLastError.KERNEL32(00000000,?,00443875,00000000,004011BE,?), ref: 0043EE6D
                                                  • _free.LIBCMT ref: 0040A513
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharHeapMultiWide_free$AllocateApisErrorFileFreeLast_malloc
                                                  • String ID:
                                                  • API String ID: 2311203463-0
                                                  • Opcode ID: e2344d725279bcfee8c9885f1dbe1695dc80f9ca08c32807d532c5bda50249e6
                                                  • Instruction ID: 5e09f4cc21b6fbf2d72a9be2d85707ca8ebcca328da7e8c4d71a804bd67823ec
                                                  • Opcode Fuzzy Hash: e2344d725279bcfee8c9885f1dbe1695dc80f9ca08c32807d532c5bda50249e6
                                                  • Instruction Fuzzy Hash: 0301A2722042217BD7112ABA5C49E7B61ADDAC5B78720023FF922E62C1EE788D0105A9
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • __init_pointers.LIBCMT ref: 00443937
                                                    • Part of subcall function 00440CD7: RtlEncodePointer.NTDLL(00000000), ref: 00440CDA
                                                    • Part of subcall function 00440CD7: __initp_misc_winsig.LIBCMT ref: 00440CFB
                                                    • Part of subcall function 00440CD7: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00446E11
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,FlsAlloc), ref: 00446E25
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,FlsFree), ref: 00446E38
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,FlsGetValue), ref: 00446E4B
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,FlsSetValue), ref: 00446E5E
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00446E71
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,CreateSemaphoreExW), ref: 00446E84
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00446E97
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00446EAA
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,SetThreadpoolTimer), ref: 00446EBD
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00446ED0
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00446EE3
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,CreateThreadpoolWait), ref: 00446EF6
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,SetThreadpoolWait), ref: 00446F09
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,CloseThreadpoolWait), ref: 00446F1C
                                                    • Part of subcall function 00440CD7: 74ECFFF6.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00446F2F
                                                  • __mtinitlocks.LIBCMT ref: 0044393C
                                                    • Part of subcall function 004474DE: InitializeCriticalSectionAndSpinCount.KERNEL32(}F,00000FA0,?,?,00443941,00441A89,00461BE0,00000014), ref: 004474FC
                                                  • __mtterm.LIBCMT ref: 00443945
                                                    • Part of subcall function 004439AD: RtlDeleteCriticalSection.NTDLL(00000000), ref: 004473FA
                                                    • Part of subcall function 004439AD: _free.LIBCMT ref: 00447401
                                                    • Part of subcall function 004439AD: RtlDeleteCriticalSection.NTDLL(}F), ref: 00447423
                                                  • __calloc_crt.LIBCMT ref: 0044396A
                                                  • GetCurrentThreadId.KERNEL32(00441A89,00461BE0,00000014), ref: 00443993
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalSection$Delete$CountCurrentEncodeHandleInitializeModulePointerSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                  • String ID:
                                                  • API String ID: 1640740328-0
                                                  • Opcode ID: 682a72679f917df7788b48916ace1b64c28311ed5db4ff6a133ca202e315478c
                                                  • Instruction ID: 324614e7229c1b0d08bf1577ff6068a6d1ea23f21144333d3afb6da943eea44f
                                                  • Opcode Fuzzy Hash: 682a72679f917df7788b48916ace1b64c28311ed5db4ff6a133ca202e315478c
                                                  • Instruction Fuzzy Hash: 96F0C27250D65169F2243E757C0765A26808F41F3AB35472FF050D52D2FA998A41805E
                                                  Uniqueness

                                                  Uniqueness Score: 6.84%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                  • String ID: 0@
                                                  • API String ID: 3877424927-1303110655
                                                  • Opcode ID: 974b2240a8778556eb8bfb83a1063411a92062d948c6a0cd6447012eeb183e3f
                                                  • Instruction ID: 47077695e67a6d1deb0ed2f2d0f6edbfec31a68f68ca7c2fcb65173594fd1430
                                                  • Opcode Fuzzy Hash: 974b2240a8778556eb8bfb83a1063411a92062d948c6a0cd6447012eeb183e3f
                                                  • Instruction Fuzzy Hash: 60510330E002059BDB249EA9C88566F77A1AF08320F24973FF826863E1D7789D198B09
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                    • Part of subcall function 004437FD: __getptd_noexit.LIBCMT ref: 004437FE
                                                  • __lock.LIBCMT ref: 0044320C
                                                  • InterlockedDecrement.KERNEL32(?), ref: 00443229
                                                  • _free.LIBCMT ref: 0044323C
                                                  • InterlockedIncrement.KERNEL32(00335B38), ref: 00443254
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                  • String ID: 8[3
                                                  • API String ID: 2704283638-866551987
                                                  • Opcode ID: 7658854817e16d360e3f04eee0476675de7bac337b83fa46574b2a0fbc31edba
                                                  • Instruction ID: b37f171f3e9423567e4c15a1ccdb6262562a9be69ab22a96f3c25e9a030f6c4b
                                                  • Opcode Fuzzy Hash: 7658854817e16d360e3f04eee0476675de7bac337b83fa46574b2a0fbc31edba
                                                  • Instruction Fuzzy Hash: 5401AD31901711ABE711AF66944675AB770BF44F26F14405BE810A7290CBBCAF81CBDE
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _malloc.LIBCMT ref: 00440EE0
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • std::exception::exception.LIBCMT ref: 00440EFC
                                                  • __CxxThrowException@8.LIBCMT ref: 00440F11
                                                    • Part of subcall function 00447D5A: RaiseException.KERNEL32(?,?,00000000,00461B8C,?,?,?,00440F16,00000000,00461B8C,?,00000001), ref: 00447DAB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateExceptionException@8HeapRaiseThrow_mallocstd::exception::exception
                                                  • String ID: bad allocation$EE
                                                  • API String ID: 3074076210-2916647398
                                                  • Opcode ID: b9add2d23ce35b457b4b2296b37a8905af98f4d3aa5a4dd94b75821cdf912b2e
                                                  • Instruction ID: 753e73b0023236463bdd8c6ba06f248c96c286899966e3d6f28493a62ba92273
                                                  • Opcode Fuzzy Hash: b9add2d23ce35b457b4b2296b37a8905af98f4d3aa5a4dd94b75821cdf912b2e
                                                  • Instruction Fuzzy Hash: C1F0F9B500411E67EB10FA96D801ADF7BAC9F40358F10445BFA00A5182EBB8CA6586AD
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • __lock.LIBCMT ref: 004438C8
                                                    • Part of subcall function 004473AF: __mtinitlocknum.LIBCMT ref: 004473C1
                                                    • Part of subcall function 004473AF: RtlEnterCriticalSection.NTDLL(?), ref: 004473DA
                                                  • InterlockedIncrement.KERNEL32(004634C8), ref: 004438D5
                                                  • __lock.LIBCMT ref: 004438E9
                                                  • ___addlocaleref.LIBCMT ref: 00443907
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                  • String ID: X8F
                                                  • API String ID: 1687444384-365887044
                                                  • Opcode ID: d564fb8d7663738c43d1c97814a621c8e5a9dbff5f4e0ece6ba0d566a6727f31
                                                  • Instruction ID: 2ac9016c9b851ad33c972360cd3abb7141d85e7ece6f5e6dd5110e595e1c1b1d
                                                  • Opcode Fuzzy Hash: d564fb8d7663738c43d1c97814a621c8e5a9dbff5f4e0ece6ba0d566a6727f31
                                                  • Instruction Fuzzy Hash: 78016171440B00DFE760EF66D406749F7F0EF94726F20890FE495972A1DBB8A644DB19
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _malloc.LIBCMT ref: 00441978
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • _free.LIBCMT ref: 0044198B
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocateHeap_free_malloc
                                                  • String ID:
                                                  • API String ID: 1020059152-0
                                                  • Opcode ID: fca934afab83a1f194cde9f8ce719e0efcda170d473eae208c081763a0ff9e36
                                                  • Instruction ID: 81d7bc9bfd6f4ee9c775d61b02ec3d6213037e86203d7a5af57264b4cb52a870
                                                  • Opcode Fuzzy Hash: fca934afab83a1f194cde9f8ce719e0efcda170d473eae208c081763a0ff9e36
                                                  • Instruction Fuzzy Hash: 2211C4B24046516BFF212F75AC5565B3BA4AB0436AF24012BF8489A2B1DB7C8CC0C69C
                                                  Uniqueness

                                                  Uniqueness Score: 1.64%

                                                  APIs
                                                  • AreFileApisANSI.KERNEL32 ref: 0040A457
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0040A46F
                                                  • _malloc.LIBCMT ref: 0040A479
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,?,000000FF,00000000,?,00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0040A492
                                                  • _free.LIBCMT ref: 0040A49D
                                                    • Part of subcall function 0043EE47: HeapFree.KERNEL32(00000000,00000000), ref: 0043EE5B
                                                    • Part of subcall function 0043EE47: GetLastError.KERNEL32(00000000,?,00443875,00000000,004011BE,?), ref: 0043EE6D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharHeapMultiWide$AllocateApisErrorFileFreeLast_free_malloc
                                                  • String ID:
                                                  • API String ID: 3450208898-0
                                                  • Opcode ID: 26d368211799babaaa1df4f6b0fdc6858b39187c5768f29f02cf7ccaa58f38db
                                                  • Instruction ID: e3564b5bd3916b5ec3d0e311abe6178587b1c2baf4c90fbd95f5c8bfc5521a71
                                                  • Opcode Fuzzy Hash: 26d368211799babaaa1df4f6b0fdc6858b39187c5768f29f02cf7ccaa58f38db
                                                  • Instruction Fuzzy Hash: 5FF0E9B76052247FA7215BBA9C4CC7B769CCA956B93214336FD11E62C0DE74CC4042B4
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • _malloc.LIBCMT ref: 00405CFD
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • _malloc.LIBCMT ref: 00405D58
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _malloc$AllocateHeap
                                                  • String ID: K[@
                                                  • API String ID: 680241177-2887614012
                                                  • Opcode ID: dfe42dd5c556dfe2899b8400e5fe01cf4c65390bd986653fef575c0e01115fa3
                                                  • Instruction ID: d2c23e731e3d18e7d6378810e15b13245ad9c54a5dc6b02591702e77cc2beb71
                                                  • Opcode Fuzzy Hash: dfe42dd5c556dfe2899b8400e5fe01cf4c65390bd986653fef575c0e01115fa3
                                                  • Instruction Fuzzy Hash: CC21D8B15046469ACB249F799C45A97B7B8EF49304F1044BFE245F31C1EE389D468F6C
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AdjustPointer_memmove
                                                  • String ID:
                                                  • API String ID: 1721217611-0
                                                  • Opcode ID: c5dd6a81d570133c8434133ccbae59f89956973b6ba090889aa11d516027c3e7
                                                  • Instruction ID: d2d43a392bec41ee59afa6625f52eb2343bd6451e3243071019d1fa4c9e54f77
                                                  • Opcode Fuzzy Hash: c5dd6a81d570133c8434133ccbae59f89956973b6ba090889aa11d516027c3e7
                                                  • Instruction Fuzzy Hash: 6A41A6362046039BEB289F26DA42B6737A49F02356F24001FFC80576D3DBB9DD89D66D
                                                  Uniqueness

                                                  Uniqueness Score: 1.09%

                                                  APIs
                                                  • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 0044D0C4
                                                  • __isleadbyte_l.LIBCMT ref: 0044D0F2
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,0043FA5D,00000001,00000000,00000000,?,00000000,00000000,?,?,0043FA5D,00000000), ref: 0044D120
                                                  • MultiByteToWideChar.KERNEL32(00000080,00000009,0043FA5D,00000001,00000000,00000000,?,00000000,00000000,?,?,0043FA5D,00000000), ref: 0044D156
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                  • String ID:
                                                  • API String ID: 3058430110-0
                                                  • Opcode ID: 2e1e42b74cb0f4f6fe44602032de51f19b833009c06114fa1bc3e03e930a0392
                                                  • Instruction ID: 0c0a4ca05fdc97972ddae4bb5c79401a2cc82774fad1c0a341a07d729254720b
                                                  • Opcode Fuzzy Hash: 2e1e42b74cb0f4f6fe44602032de51f19b833009c06114fa1bc3e03e930a0392
                                                  • Instruction Fuzzy Hash: 0F31CD31A04246AFEB218F75CC44BAB7BB5BF41354F15812AE8608B2A0D739DC42DB99
                                                  Uniqueness

                                                  Uniqueness Score: 0.05%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __ftbuf__getptd_noexit__lock_file__stbuf_strlen
                                                  • String ID:
                                                  • API String ID: 583463211-0
                                                  • Opcode ID: 924ebcb99d2e2c1fe40824c93e137d82a49660eed7528509fd54d2fc9e87068e
                                                  • Instruction ID: e863883cdbc37b4db647ca640b1791f232eb42fa9c56ec45f5ae143b723a231c
                                                  • Opcode Fuzzy Hash: 924ebcb99d2e2c1fe40824c93e137d82a49660eed7528509fd54d2fc9e87068e
                                                  • Instruction Fuzzy Hash: 7F213671D102049AFB14AA758D4176E25A1AFC9338F28937BFC348A2E1EB7C9946920D
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • SetFilePointer.KERNEL32(00000000,?,?,00000000), ref: 0040A618
                                                  • GetLastError.KERNEL32 ref: 0040A625
                                                  • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 0040A64D
                                                  • GetLastError.KERNEL32 ref: 0040A67F
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLast$PointerWrite
                                                  • String ID:
                                                  • API String ID: 2977825765-0
                                                  • Opcode ID: 0e76cd403cda56406276baf378ce353a06a0dbc1a532f0714945516e26367326
                                                  • Instruction ID: ab56a3a6b8db541f4ad2b644c59f43e432565aea499976e5542928b036b78eca
                                                  • Opcode Fuzzy Hash: 0e76cd403cda56406276baf378ce353a06a0dbc1a532f0714945516e26367326
                                                  • Instruction Fuzzy Hash: 1D21A132610705AFDB10CFA4D845BAE77B8EB04360F14463AE951EB3D0D775DD208BAA
                                                  Uniqueness

                                                  Uniqueness Score: 2.28%

                                                  APIs
                                                  • ___BuildCatchObject.LIBCMT ref: 00452687
                                                    • Part of subcall function 00452C98: ___AdjustPointer.LIBCMT ref: 00452CE1
                                                  • _UnwindNestedFrames.LIBCMT ref: 0045269E
                                                  • ___FrameUnwindToState.LIBCMT ref: 004526B0
                                                  • CallCatchBlock.LIBCMT ref: 004526D4
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                  • String ID:
                                                  • API String ID: 2633735394-0
                                                  • Opcode ID: d7491e60be52cc593744b93dc873b8f5dd604558d8cc2ceb373249e21f43cfd9
                                                  • Instruction ID: cbc161f39998ff51ad422183370e2dbb31bc21c8eeaf10ada42e737c64de8c8c
                                                  • Opcode Fuzzy Hash: d7491e60be52cc593744b93dc873b8f5dd604558d8cc2ceb373249e21f43cfd9
                                                  • Instruction Fuzzy Hash: 22011B32000109BBCF129F55CD01EDB3BA6AF4A755F05411BFE1865122D7B9E465DB98
                                                  Uniqueness

                                                  Uniqueness Score: 0.50%

                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                  • String ID:
                                                  • API String ID: 3016257755-0
                                                  • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                  • Instruction ID: 5c6a6e0db2d2d7a5e360b0d374596c526a184512da7cf426753b003541fdca59
                                                  • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                  • Instruction Fuzzy Hash: B8014B3640018ABBDF129E86CC06CEE7F66FF18354B588416FA1958131D23BD9B1AB85
                                                  Uniqueness

                                                  Uniqueness Score: 1.25%

                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0040A40E
                                                  • _malloc.LIBCMT ref: 0040A418
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0040A435
                                                  • _free.LIBCMT ref: 0040A440
                                                    • Part of subcall function 0043EE47: HeapFree.KERNEL32(00000000,00000000), ref: 0043EE5B
                                                    • Part of subcall function 0043EE47: GetLastError.KERNEL32(00000000,?,00443875,00000000,004011BE,?), ref: 0043EE6D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharHeapMultiWide$AllocateErrorFreeLast_free_malloc
                                                  • String ID:
                                                  • API String ID: 1203951092-0
                                                  • Opcode ID: 0a85c7e7e04f15a682d03fa05d59ab5083902d2d1fba9964cbb0f527b4b73926
                                                  • Instruction ID: 4f1cc2b5fb2ebe02b0e67dc9d84ca2db366ad293a624be42d6e6af037c41268e
                                                  • Opcode Fuzzy Hash: 0a85c7e7e04f15a682d03fa05d59ab5083902d2d1fba9964cbb0f527b4b73926
                                                  • Instruction Fuzzy Hash: 02F0ECB66052313F77207AB75C0DC7B395DDB91B75715033ABD10E61C0D9608C4052B5
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000), ref: 0040A3B7
                                                  • _malloc.LIBCMT ref: 0040A3C4
                                                    • Part of subcall function 0043EA05: __FF_MSGBANNER.LIBCMT ref: 0043EA1C
                                                    • Part of subcall function 0043EA05: __NMSG_WRITE.LIBCMT ref: 0043EA23
                                                    • Part of subcall function 0043EA05: RtlAllocateHeap.NTDLL(002F0000,00000000,00000001), ref: 0043EA48
                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,?,?,000000FF,00000000,00000000), ref: 0040A3DE
                                                  • _free.LIBCMT ref: 0040A3E9
                                                    • Part of subcall function 0043EE47: HeapFree.KERNEL32(00000000,00000000), ref: 0043EE5B
                                                    • Part of subcall function 0043EE47: GetLastError.KERNEL32(00000000,?,00443875,00000000,004011BE,?), ref: 0043EE6D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ByteCharHeapMultiWide$AllocateErrorFreeLast_free_malloc
                                                  • String ID:
                                                  • API String ID: 1203951092-0
                                                  • Opcode ID: 9bf91e39d4ad0661454959528e6e8edaa16dbcbac0baa8982baf8c8e9f6543a2
                                                  • Instruction ID: d5b62849417cbbbbe7359716c716e97c555ee2382e019e5e7ea4aa00c23b97bd
                                                  • Opcode Fuzzy Hash: 9bf91e39d4ad0661454959528e6e8edaa16dbcbac0baa8982baf8c8e9f6543a2
                                                  • Instruction Fuzzy Hash: EFF0AE716052217BDB3467A79C09D7B356DDB81B74B20033EB910EA1C0DD648D0051B9
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • SetFilePointer.KERNEL32(?,?,?,00000000), ref: 0040A6B5
                                                  • GetLastError.KERNEL32 ref: 0040A6C0
                                                  • SetEndOfFile.KERNEL32(?), ref: 0040A6D7
                                                  • GetLastError.KERNEL32 ref: 0040A6E1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: ErrorFileLast$Pointer
                                                  • String ID:
                                                  • API String ID: 1697706070-0
                                                  • Opcode ID: be482bdb4162838b08e6ca29971cf82f7cbf63ef4f969177271a8e810d79a483
                                                  • Instruction ID: 7d3559ee53e86c5fad19e01413ea1c169b2bae278669d1bf55926ae640a5af08
                                                  • Opcode Fuzzy Hash: be482bdb4162838b08e6ca29971cf82f7cbf63ef4f969177271a8e810d79a483
                                                  • Instruction Fuzzy Hash: 02F0F631100304DFCF008F74DC08A6A3BF8EB00361B184939F562E62D0DB35DD50AB0A
                                                  Uniqueness

                                                  Uniqueness Score: 2.48%

                                                  APIs
                                                  Strings
                                                  • variable number must be between ?1 and ?%d, xrefs: 00420BF2
                                                  • too many SQL variables, xrefs: 00420C22
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memcmp
                                                  • String ID: too many SQL variables$variable number must be between ?1 and ?%d
                                                  • API String ID: 2931989736-515162456
                                                  • Opcode ID: 1e4c99f0d457a2a18e7da22031c377f8cbadab9f221a63cffc69b587344cf166
                                                  • Instruction ID: b8e1cab4ee2ef3025f6cc72435d5da50e720821c0fe5fe7e45c4151712a4079e
                                                  • Opcode Fuzzy Hash: 1e4c99f0d457a2a18e7da22031c377f8cbadab9f221a63cffc69b587344cf166
                                                  • Instruction Fuzzy Hash: B441BBB0B01605EFD724DF6AD480A9AB7F1FF49304F60096ED496D7302D738AA41CB45
                                                  Uniqueness

                                                  Uniqueness Score: 6.12%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: _memset
                                                  • String ID: ;u@$;u@
                                                  • API String ID: 2102423945-401478870
                                                  • Opcode ID: 888ecfc6f08aeeef4c903cddae758c41831f822a52f155f03454d6d4ae90e8fe
                                                  • Instruction ID: 57798531a01efb49ef524f9d88143a5e370fed2c46581d2a62ec24beb8522097
                                                  • Opcode Fuzzy Hash: 888ecfc6f08aeeef4c903cddae758c41831f822a52f155f03454d6d4ae90e8fe
                                                  • Instruction Fuzzy Hash: E631B5B2E0C2108FC7149F29ED556113B66E782728724827FF421A72E0F7B9A401DB8F
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: __lock_file_memset
                                                  • String ID: 0@
                                                  • API String ID: 26237723-1303110655
                                                  • Opcode ID: 0c5c9ef0f79784355d4f15974e78ba8ced4abd1d3fde05c7eefab2108ba1be1b
                                                  • Instruction ID: 1047a9ebd3267a4a28e4d80f4a8b7c036847242b4eebb9ce82398d22af7e2fb0
                                                  • Opcode Fuzzy Hash: 0c5c9ef0f79784355d4f15974e78ba8ced4abd1d3fde05c7eefab2108ba1be1b
                                                  • Instruction Fuzzy Hash: 3201F731C01249EBDF11AFA68C0198F7B71BF86364F14822FFC1416161D7798A52DF59
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 2\E$yzu
                                                  • API String ID: 0-3135533648
                                                  • Opcode ID: e5f38ec28093de967b8fdf2f557bbd928adccfa690546e5b5d7c31691cbd1f73
                                                  • Instruction ID: 0360f099c9a4d9b9737682e5d2bcb6f9b779057197e748090c08a307d495fee5
                                                  • Opcode Fuzzy Hash: e5f38ec28093de967b8fdf2f557bbd928adccfa690546e5b5d7c31691cbd1f73
                                                  • Instruction Fuzzy Hash: 11F0A735210109AADB149F51C951AF933E8D744705F404026FD96CB5C0E6BCCAC1A769
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%

                                                  APIs
                                                  • __lock.LIBCMT ref: 004439E5
                                                    • Part of subcall function 004473AF: __mtinitlocknum.LIBCMT ref: 004473C1
                                                    • Part of subcall function 004473AF: RtlEnterCriticalSection.NTDLL(?), ref: 004473DA
                                                  • __updatetlocinfoEx_nolock.LIBCMT ref: 004439F5
                                                    • Part of subcall function 00442EC9: ___addlocaleref.LIBCMT ref: 00442EE5
                                                    • Part of subcall function 00442EC9: ___removelocaleref.LIBCMT ref: 00442EF0
                                                    • Part of subcall function 00442EC9: ___freetlocinfo.LIBCMT ref: 00442F04
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.14658008517.00400000.00000040.00000001.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.14658105826.0046F000.00000040.00000001.sdmp Download File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_vbc.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                                                  • String ID: X8F
                                                  • API String ID: 547918592-365887044
                                                  • Opcode ID: d46bb1a1468582485d50cee933ae37bf58127898f3c9fe648a25f317d8c66698
                                                  • Instruction ID: d178646ee48e186078be5d7728db2bbed76cf51608b1dc0a374a1d4da700d7c2
                                                  • Opcode Fuzzy Hash: d46bb1a1468582485d50cee933ae37bf58127898f3c9fe648a25f317d8c66698
                                                  • Instruction Fuzzy Hash: E0E08621581381A9FB90BFA26903B8D76E09B80B37F24411FF044770D1DAAC0A44915F
                                                  Uniqueness

                                                  Uniqueness Score: 100.00%